1 /*
2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that the following conditions
4 * are met:
5 * 1. Redistributions of source code must retain the above copyright
6 * notice, and the entire permission notice in its entirety,
7 * including the disclaimer of warranties.
8 * 2. Redistributions in binary form must reproduce the above copyright
9 * notice, this list of conditions and the following disclaimer in the
10 * documentation and/or other materials provided with the distribution.
11 * 3. The name of the author may not be used to endorse or promote
12 * products derived from this software without specific prior
13 * written permission.
14 *
15 * ALTERNATIVELY, this product may be distributed under the terms of
16 * the GNU Public License, in which case the provisions of the GPL are
17 * required INSTEAD OF the above restrictions. (This clause is
18 * necessary due to a potential bad interaction between the GPL and
19 * the restrictions contained in a BSD-style copyright.)
20 *
21 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
22 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
23 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
25 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
27 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
29 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
31 * OF THE POSSIBILITY OF SUCH DAMAGE.
32 */
33
34 /*
35 test case:
36
37 Check the following line in PAM config file:
38
39 auth required pam_succeed_if.so user in tstpamtest:pamtest
40
41 User is pamtest or tstpamtest, both should succeed.
42 */
43
44 #ifdef HAVE_CONFIG_H
45 #include <config.h>
46 #endif
47
48 #include <stdio.h>
49 #include <stdlib.h>
50 #include <string.h>
51 #include <security/pam_appl.h>
52
53 /* A conversation function which uses an internally-stored value for
54 the responses. */
55 static int
56 fake_conv (int num_msg, const struct pam_message **msgm UNUSED,
57 struct pam_response **response, void *appdata_ptr UNUSED)
58 {
59 struct pam_response *reply;
60 int count;
61
62 /* Sanity test. */
63 if (num_msg <= 0)
64 return PAM_CONV_ERR;
65
66 /* Allocate memory for the responses. */
67 reply = calloc (num_msg, sizeof (struct pam_response));
68 if (reply == NULL)
69 return PAM_CONV_ERR;
70
71 /* Each prompt elicits the same response. */
72 for (count = 0; count < num_msg; ++count)
73 {
74 reply[count].resp_retcode = 0;
75 reply[count].resp = strdup ("!!");
76 }
77
78 /* Set the pointers in the response structure and return. */
79 *response = reply;
80 return PAM_SUCCESS;
81 }
82
83 static struct pam_conv conv = {
84 fake_conv,
85 NULL
86 };
87
88 static int debug = 0;
89
90 static int
91 test_with_user (const char *user)
92 {
93 pam_handle_t *pamh = NULL;
94 int retval;
95
96 retval = pam_start("tst-pam_succeed_if1", user, &conv, &pamh);
97 if (retval != PAM_SUCCESS)
98 {
99 if (debug)
100 fprintf (stderr, "pam_succeed_if1: pam_start returned %d\n", retval);
101 return 1;
102 }
103
104 retval = pam_authenticate (pamh, 0);
105 if (retval != PAM_SUCCESS)
106 {
107 if (debug)
108 fprintf (stderr, "pam_access1: pam_authenticate(%s) returned %d\n",
109 user, retval);
110 return 1;
111 }
112
113 retval = pam_end (pamh, retval);
114 if (retval != PAM_SUCCESS)
115 {
116 if (debug)
117 fprintf (stderr, "pam_access1: pam_end returned %d\n", retval);
118 return 1;
119 }
120 return 0;
121 }
122
123 int
124 main(int argc, char *argv[])
125 {
126 const char *user1 = "tstpamtest";
127 const char *user2 = "pamtest";
128 int retval;
129
130 if (argc > 1 && strcmp (argv[1], "-d") == 0)
131 debug = 1;
132
133 retval = test_with_user (user1);
134 if (retval == 0)
135 retval = test_with_user (user2);
136
137 return retval;
138 }