tst-pam_warn-retval.c 2.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788
  1. /*
  2. * Check pam_warn return values.
  3. *
  4. * Copyright (c) 2020 Dmitry V. Levin <ldv@altlinux.org>
  5. */
  6. #include "test_assert.h"
  7. #include <limits.h>
  8. #include <stdio.h>
  9. #include <string.h>
  10. #include <unistd.h>
  11. #include <security/pam_appl.h>
  12. #define MODULE_NAME "pam_warn"
  13. #define TEST_NAME "tst-" MODULE_NAME "-retval"
  14. static const char service_file[] = TEST_NAME ".service";
  15. static const char user_name[] = "";
  16. static struct pam_conv conv;
  17. int
  18. main(void)
  19. {
  20. pam_handle_t *pamh = NULL;
  21. FILE *fp;
  22. char cwd[PATH_MAX];
  23. ASSERT_NE(NULL, getcwd(cwd, sizeof(cwd)));
  24. /* PAM_IGNORE -> PAM_PERM_DENIED */
  25. ASSERT_NE(NULL, fp = fopen(service_file, "w"));
  26. ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
  27. "auth required %s/.libs/%s.so\n"
  28. "account required %s/.libs/%s.so\n"
  29. "password required %s/.libs/%s.so\n"
  30. "session required %s/.libs/%s.so\n",
  31. cwd, MODULE_NAME,
  32. cwd, MODULE_NAME,
  33. cwd, MODULE_NAME,
  34. cwd, MODULE_NAME));
  35. ASSERT_EQ(0, fclose(fp));
  36. ASSERT_EQ(PAM_SUCCESS,
  37. pam_start_confdir(service_file, user_name, &conv, ".", &pamh));
  38. ASSERT_NE(NULL, pamh);
  39. ASSERT_EQ(PAM_PERM_DENIED, pam_authenticate(pamh, 0));
  40. ASSERT_EQ(PAM_PERM_DENIED, pam_setcred(pamh, 0));
  41. ASSERT_EQ(PAM_PERM_DENIED, pam_acct_mgmt(pamh, 0));
  42. ASSERT_EQ(PAM_PERM_DENIED, pam_chauthtok(pamh, 0));
  43. ASSERT_EQ(PAM_PERM_DENIED, pam_open_session(pamh, 0));
  44. ASSERT_EQ(PAM_PERM_DENIED, pam_close_session(pamh, 0));
  45. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  46. pamh = NULL;
  47. /* PAM_IGNORE -> PAM_SUCCESS */
  48. ASSERT_NE(NULL, fp = fopen(service_file, "w"));
  49. ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
  50. "auth required %s/.libs/%s.so\n"
  51. "auth required %s/../pam_permit/.libs/pam_permit.so\n"
  52. "account required %s/.libs/%s.so\n"
  53. "account required %s/../pam_permit/.libs/pam_permit.so\n"
  54. "password required %s/.libs/%s.so\n"
  55. "password required %s/../pam_permit/.libs/pam_permit.so\n"
  56. "session required %s/.libs/%s.so\n"
  57. "session required %s/../pam_permit/.libs/pam_permit.so\n",
  58. cwd, MODULE_NAME, cwd,
  59. cwd, MODULE_NAME, cwd,
  60. cwd, MODULE_NAME, cwd,
  61. cwd, MODULE_NAME, cwd));
  62. ASSERT_EQ(0, fclose(fp));
  63. ASSERT_EQ(PAM_SUCCESS,
  64. pam_start_confdir(service_file, user_name, &conv, ".", &pamh));
  65. ASSERT_NE(NULL, pamh);
  66. ASSERT_EQ(PAM_SUCCESS, pam_authenticate(pamh, 0));
  67. ASSERT_EQ(PAM_SUCCESS, pam_setcred(pamh, 0));
  68. ASSERT_EQ(PAM_SUCCESS, pam_acct_mgmt(pamh, 0));
  69. ASSERT_EQ(PAM_SUCCESS, pam_chauthtok(pamh, 0));
  70. ASSERT_EQ(PAM_SUCCESS, pam_open_session(pamh, 0));
  71. ASSERT_EQ(PAM_SUCCESS, pam_close_session(pamh, 0));
  72. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  73. pamh = NULL;
  74. ASSERT_EQ(0, unlink(service_file));
  75. return 0;
  76. }