source: openpam/trunk/t/t_openpam_dispatch.c @ 935

Last change on this file since 935 was 935, checked in by Dag-Erling Smørgrav, 4 years ago

Bump copyright year.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 6.0 KB
Line 
1/*-
2 * Copyright (c) 2015-2017 Dag-Erling Smørgrav
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 3. The name of the author may not be used to endorse or promote
14 *    products derived from this software without specific prior written
15 *    permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 *
29 * $Id: t_openpam_dispatch.c 935 2017-04-26 21:04:10Z des $
30 */
31
32#ifdef HAVE_CONFIG_H
33# include "config.h"
34#endif
35
36#include <err.h>
37#include <stdint.h>
38#include <stdio.h>
39#include <stdlib.h>
40#include <string.h>
41#include <unistd.h>
42
43#include <cryb/test.h>
44
45#include <security/pam_appl.h>
46#include <security/openpam.h>
47
48#include "openpam_impl.h"
49#include "t_pam_conv.h"
50
51#define T_FUNC(n, d)                                                    \
52        static const char *t_ ## n ## _desc = d;                        \
53        static int t_ ## n ## _func(OPENPAM_UNUSED(char **desc),        \
54            OPENPAM_UNUSED(void *arg))
55
56#define T(n)                                                            \
57        t_add_test(&t_ ## n ## _func, NULL, "%s", t_ ## n ## _desc)
58
59const char *pam_return_so;
60
61T_FUNC(empty_policy, "empty policy")
62{
63        struct t_pam_conv_script script;
64        struct pam_conv pamc;
65        struct t_file *tf;
66        pam_handle_t *pamh;
67        int pam_err, ret;
68
69        memset(&script, 0, sizeof script);
70        pamc.conv = &t_pam_conv;
71        pamc.appdata_ptr = &script;
72        tf = t_fopen(NULL);
73        t_fprintf(tf, "# empty policy\n");
74        pam_err = pam_start(tf->name, "test", &pamc, &pamh);
75        if (pam_err != PAM_SUCCESS) {
76                t_printv("pam_start() returned %d\n", pam_err);
77                return (0);
78        }
79        /*
80         * Note: openpam_dispatch() currently returns PAM_SYSTEM_ERR when
81         * the chain is empty, it should possibly return PAM_SERVICE_ERR
82         * instead.
83         */
84        pam_err = pam_authenticate(pamh, 0);
85        t_printv("pam_authenticate() returned %d\n", pam_err);
86        ret = (pam_err == PAM_SYSTEM_ERR);
87        pam_err = pam_setcred(pamh, 0);
88        t_printv("pam_setcred() returned %d\n", pam_err);
89        ret &= (pam_err == PAM_SYSTEM_ERR);
90        pam_err = pam_acct_mgmt(pamh, 0);
91        t_printv("pam_acct_mgmt() returned %d\n", pam_err);
92        ret &= (pam_err == PAM_SYSTEM_ERR);
93        pam_err = pam_chauthtok(pamh, 0);
94        t_printv("pam_chauthtok() returned %d\n", pam_err);
95        ret &= (pam_err == PAM_SYSTEM_ERR);
96        pam_err = pam_open_session(pamh, 0);
97        t_printv("pam_open_session() returned %d\n", pam_err);
98        ret &= (pam_err == PAM_SYSTEM_ERR);
99        pam_err = pam_close_session(pamh, 0);
100        t_printv("pam_close_session() returned %d\n", pam_err);
101        ret &= (pam_err == PAM_SYSTEM_ERR);
102        pam_end(pamh, pam_err);
103        t_fclose(tf);
104        return (ret);
105}
106
107static struct t_pam_return_case {
108        int              facility;
109        int              primitive;
110        int              flags;
111        struct {
112                int              ctlflag;
113                int              modret;
114        } mod[2];
115        int              result;
116} t_pam_return_cases[] = {
117        {
118                PAM_AUTH, PAM_SM_AUTHENTICATE, 0,
119                {
120                        { PAM_REQUIRED, PAM_SUCCESS },
121                        { PAM_REQUIRED, PAM_SUCCESS },
122                },
123                PAM_SUCCESS,
124        },
125};
126
127T_FUNC(mod_return, "module return value")
128{
129        struct t_pam_return_case *tc;
130        struct t_pam_conv_script script;
131        struct pam_conv pamc;
132        struct t_file *tf;
133        pam_handle_t *pamh;
134        unsigned int i, j, n;
135        int pam_err;
136
137        memset(&script, 0, sizeof script);
138        pamc.conv = &t_pam_conv;
139        pamc.appdata_ptr = &script;
140        n = sizeof t_pam_return_cases / sizeof t_pam_return_cases[0];
141        for (i = 0; i < n; ++i) {
142                tc = &t_pam_return_cases[i];
143                tf = t_fopen(NULL);
144                for (j = 0; j < 2; ++j) {
145                        t_fprintf(tf, "%s %s %s error=%s\n",
146                            pam_facility_name[tc->facility],
147                            pam_control_flag_name[tc->mod[j].ctlflag],
148                            pam_return_so,
149                            pam_err_name[tc->mod[j].modret]);
150                }
151                pam_err = pam_start(tf->name, "test", &pamc, &pamh);
152                if (pam_err != PAM_SUCCESS) {
153                        t_printv("pam_start() returned %d\n", pam_err);
154                        t_fclose(tf);
155                        continue;
156                }
157                switch (tc->primitive) {
158                case PAM_SM_AUTHENTICATE:
159                        pam_err = pam_authenticate(pamh, tc->flags);
160                        break;
161                case PAM_SM_SETCRED:
162                        pam_err = pam_setcred(pamh, tc->flags);
163                        break;
164                case PAM_SM_ACCT_MGMT:
165                        pam_err = pam_acct_mgmt(pamh, tc->flags);
166                        break;
167                case PAM_SM_OPEN_SESSION:
168                        pam_err = pam_open_session(pamh, tc->flags);
169                        break;
170                case PAM_SM_CLOSE_SESSION:
171                        pam_err = pam_close_session(pamh, tc->flags);
172                        break;
173                case PAM_SM_CHAUTHTOK:
174                        pam_err = pam_chauthtok(pamh, tc->flags);
175                        break;
176                }
177                t_printv("%s returned %d\n",
178                    pam_func_name[tc->primitive], pam_err);
179                pam_end(pamh, pam_err);
180                t_printv("here\n");
181                t_fclose(tf);
182        }
183        return (1);
184}
185
186
187/***************************************************************************
188 * Boilerplate
189 */
190
191static int
192t_prepare(int argc, char *argv[])
193{
194
195        (void)argc;
196        (void)argv;
197
198        if ((pam_return_so = getenv("PAM_RETURN_SO")) == NULL) {
199                t_printv("define PAM_RETURN_SO before running these tests\n");
200                return (0);
201        }
202
203        openpam_set_feature(OPENPAM_RESTRICT_MODULE_NAME, 0);
204        openpam_set_feature(OPENPAM_VERIFY_MODULE_FILE, 0);
205        openpam_set_feature(OPENPAM_RESTRICT_SERVICE_NAME, 0);
206        openpam_set_feature(OPENPAM_VERIFY_POLICY_FILE, 0);
207        openpam_set_feature(OPENPAM_FALLBACK_TO_OTHER, 0);
208
209        T(empty_policy);
210        T(mod_return);
211
212        return (0);
213}
214
215int
216main(int argc, char *argv[])
217{
218
219        t_main(t_prepare, NULL, argc, argv);
220}
Note: See TracBrowser for help on using the repository browser.