tst-pam_rootok-retval.c 1.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172
  1. /*
  2. * Check pam_rootok return values.
  3. *
  4. * Copyright (c) 2020 Dmitry V. Levin <ldv@altlinux.org>
  5. */
  6. #include "test_assert.h"
  7. #include <limits.h>
  8. #include <stdio.h>
  9. #include <string.h>
  10. #include <unistd.h>
  11. #include <security/pam_appl.h>
  12. #define MODULE_NAME "pam_rootok"
  13. #define TEST_NAME "tst-" MODULE_NAME "-retval"
  14. static const char service_file[] = TEST_NAME ".service";
  15. static const char user_name[] = "";
  16. static struct pam_conv conv;
  17. int
  18. main(void)
  19. {
  20. pam_handle_t *pamh = NULL;
  21. FILE *fp;
  22. char cwd[PATH_MAX];
  23. ASSERT_NE(NULL, getcwd(cwd, sizeof(cwd)));
  24. ASSERT_NE(NULL, fp = fopen(service_file, "w"));
  25. ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
  26. "auth required %s/.libs/%s.so\n"
  27. "account required %s/.libs/%s.so\n"
  28. "password required %s/.libs/%s.so\n"
  29. "session required %s/.libs/%s.so\n",
  30. cwd, MODULE_NAME,
  31. cwd, MODULE_NAME,
  32. cwd, MODULE_NAME,
  33. cwd, MODULE_NAME));
  34. ASSERT_EQ(0, fclose(fp));
  35. ASSERT_EQ(PAM_SUCCESS,
  36. pam_start_confdir(service_file, user_name, &conv, ".", &pamh));
  37. ASSERT_NE(NULL, pamh);
  38. ASSERT_EQ(PAM_SUCCESS, pam_setcred(pamh, 0));
  39. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  40. pamh = NULL;
  41. ASSERT_EQ(PAM_SUCCESS,
  42. pam_start_confdir(service_file, user_name, &conv, ".", &pamh));
  43. ASSERT_NE(NULL, pamh);
  44. if (getuid() == 0) {
  45. ASSERT_EQ(PAM_SUCCESS, pam_authenticate(pamh, 0));
  46. ASSERT_EQ(PAM_SUCCESS, pam_setcred(pamh, 0));
  47. ASSERT_EQ(PAM_SUCCESS, pam_acct_mgmt(pamh, 0));
  48. ASSERT_EQ(PAM_SUCCESS, pam_chauthtok(pamh, 0));
  49. } else {
  50. ASSERT_EQ(PAM_AUTH_ERR, pam_authenticate(pamh, 0));
  51. ASSERT_EQ(PAM_PERM_DENIED, pam_setcred(pamh, 0));
  52. ASSERT_EQ(PAM_AUTH_ERR, pam_acct_mgmt(pamh, 0));
  53. ASSERT_EQ(PAM_AUTH_ERR, pam_chauthtok(pamh, 0));
  54. }
  55. ASSERT_EQ(PAM_MODULE_UNKNOWN, pam_open_session(pamh, 0));
  56. ASSERT_EQ(PAM_MODULE_UNKNOWN, pam_close_session(pamh, 0));
  57. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  58. pamh = NULL;
  59. ASSERT_EQ(0, unlink(service_file));
  60. return 0;
  61. }