(root)/
Linux-PAM-1.5.3/
modules/
pam_faildelay/
tst-pam_faildelay-retval.c
       1  /*
       2   * Check pam_faildelay return values.
       3   *
       4   * Copyright (c) 2020 Dmitry V. Levin <ldv@altlinux.org>
       5   */
       6  
       7  #include "test_assert.h"
       8  
       9  #include <limits.h>
      10  #include <stdio.h>
      11  #include <string.h>
      12  #include <unistd.h>
      13  #include <security/pam_appl.h>
      14  
      15  #define MODULE_NAME "pam_faildelay"
      16  #define TEST_NAME "tst-" MODULE_NAME "-retval"
      17  
      18  static const char service_file[] = TEST_NAME ".service";
      19  static const char user_name[] = "";
      20  static struct pam_conv conv;
      21  
      22  int
      23  main(void)
      24  {
      25  	pam_handle_t *pamh = NULL;
      26  	FILE *fp;
      27  	char cwd[PATH_MAX];
      28  
      29  	ASSERT_NE(NULL, getcwd(cwd, sizeof(cwd)));
      30  
      31  	/* PAM_IGNORE -> PAM_PERM_DENIED */
      32  	ASSERT_NE(NULL, fp = fopen(service_file, "w"));
      33  	ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
      34  			     "auth required %s/.libs/%s.so delay=1\n"
      35  			     "account required %s/.libs/%s.so delay=1\n"
      36  			     "password required %s/.libs/%s.so delay=1\n"
      37  			     "session required %s/.libs/%s.so delay=1\n",
      38  			     cwd, MODULE_NAME,
      39  			     cwd, MODULE_NAME,
      40  			     cwd, MODULE_NAME,
      41  			     cwd, MODULE_NAME));
      42  	ASSERT_EQ(0, fclose(fp));
      43  
      44  	ASSERT_EQ(PAM_SUCCESS,
      45  		  pam_start_confdir(service_file, user_name, &conv, ".", &pamh));
      46  	ASSERT_NE(NULL, pamh);
      47  	ASSERT_EQ(PAM_PERM_DENIED, pam_authenticate(pamh, 0));
      48  	ASSERT_EQ(PAM_PERM_DENIED, pam_setcred(pamh, 0));
      49  	ASSERT_EQ(PAM_MODULE_UNKNOWN, pam_acct_mgmt(pamh, 0));
      50  	ASSERT_EQ(PAM_MODULE_UNKNOWN, pam_chauthtok(pamh, 0));
      51  	ASSERT_EQ(PAM_MODULE_UNKNOWN, pam_open_session(pamh, 0));
      52  	ASSERT_EQ(PAM_MODULE_UNKNOWN, pam_close_session(pamh, 0));
      53  	ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
      54  	pamh = NULL;
      55  
      56  	/* PAM_IGNORE -> PAM_SUCCESS */
      57  	ASSERT_NE(NULL, fp = fopen(service_file, "w"));
      58  	ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
      59  			     "auth required %s/.libs/%s.so delay=1\n"
      60  			     "auth required %s/../pam_permit/.libs/pam_permit.so\n"
      61  			     "account required %s/.libs/%s.so delay=1\n"
      62  			     "account required %s/../pam_permit/.libs/pam_permit.so\n"
      63  			     "password required %s/.libs/%s.so delay=1\n"
      64  			     "password required %s/../pam_permit/.libs/pam_permit.so\n"
      65  			     "session required %s/.libs/%s.so delay=1\n"
      66  			     "session required %s/../pam_permit/.libs/pam_permit.so\n",
      67  			     cwd, MODULE_NAME, cwd,
      68  			     cwd, MODULE_NAME, cwd,
      69  			     cwd, MODULE_NAME, cwd,
      70  			     cwd, MODULE_NAME, cwd));
      71  	ASSERT_EQ(0, fclose(fp));
      72  
      73  	ASSERT_EQ(PAM_SUCCESS,
      74  		  pam_start_confdir(service_file, user_name, &conv, ".", &pamh));
      75  	ASSERT_NE(NULL, pamh);
      76  	ASSERT_EQ(PAM_SUCCESS, pam_authenticate(pamh, 0));
      77  	ASSERT_EQ(PAM_SUCCESS, pam_setcred(pamh, 0));
      78  	ASSERT_EQ(PAM_MODULE_UNKNOWN, pam_acct_mgmt(pamh, 0));
      79  	ASSERT_EQ(PAM_MODULE_UNKNOWN, pam_chauthtok(pamh, 0));
      80  	ASSERT_EQ(PAM_MODULE_UNKNOWN, pam_open_session(pamh, 0));
      81  	ASSERT_EQ(PAM_MODULE_UNKNOWN, pam_close_session(pamh, 0));
      82  	ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
      83  	pamh = NULL;
      84  
      85  	ASSERT_EQ(0, unlink(service_file));
      86  
      87  	return 0;
      88  }