2 * Copyright (c) 2015-2017 Dag-Erling Smørgrav
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. The name of the author may not be used to endorse or promote
14 * products derived from this software without specific prior written
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * $OpenPAM: t_openpam_dispatch.c 938 2017-04-30 21:34:42Z des $
43 #include <cryb/test.h>
45 #include <security/pam_appl.h>
46 #include <security/openpam.h>
48 #include "openpam_impl.h"
49 #include "t_pam_conv.h"
51 #define T_FUNC(n, d) \
52 static const char *t_ ## n ## _desc = d; \
53 static int t_ ## n ## _func(OPENPAM_UNUSED(char **desc), \
54 OPENPAM_UNUSED(void *arg))
57 t_add_test(&t_ ## n ## _func, NULL, "%s", t_ ## n ## _desc)
59 const char *pam_return_so;
61 T_FUNC(empty_policy, "empty policy")
63 struct t_pam_conv_script script;
69 memset(&script, 0, sizeof script);
70 pamc.conv = &t_pam_conv;
71 pamc.appdata_ptr = &script;
73 t_fprintf(tf, "# empty policy\n");
74 pam_err = pam_start(tf->name, "test", &pamc, &pamh);
75 if (pam_err != PAM_SUCCESS) {
76 t_printv("pam_start() returned %d\n", pam_err);
80 * Note: openpam_dispatch() currently returns PAM_SYSTEM_ERR when
81 * the chain is empty, it should possibly return PAM_SERVICE_ERR
84 pam_err = pam_authenticate(pamh, 0);
85 t_printv("pam_authenticate() returned %d\n", pam_err);
86 ret = (pam_err == PAM_SYSTEM_ERR);
87 pam_err = pam_setcred(pamh, 0);
88 t_printv("pam_setcred() returned %d\n", pam_err);
89 ret &= (pam_err == PAM_SYSTEM_ERR);
90 pam_err = pam_acct_mgmt(pamh, 0);
91 t_printv("pam_acct_mgmt() returned %d\n", pam_err);
92 ret &= (pam_err == PAM_SYSTEM_ERR);
93 pam_err = pam_chauthtok(pamh, 0);
94 t_printv("pam_chauthtok() returned %d\n", pam_err);
95 ret &= (pam_err == PAM_SYSTEM_ERR);
96 pam_err = pam_open_session(pamh, 0);
97 t_printv("pam_open_session() returned %d\n", pam_err);
98 ret &= (pam_err == PAM_SYSTEM_ERR);
99 pam_err = pam_close_session(pamh, 0);
100 t_printv("pam_close_session() returned %d\n", pam_err);
101 ret &= (pam_err == PAM_SYSTEM_ERR);
102 pam_end(pamh, pam_err);
107 static struct t_pam_return_case {
116 } t_pam_return_cases[] = {
118 PAM_AUTH, PAM_SM_AUTHENTICATE, 0,
120 { PAM_REQUIRED, PAM_SUCCESS },
121 { PAM_REQUIRED, PAM_SUCCESS },
127 T_FUNC(mod_return, "module return value")
129 struct t_pam_return_case *tc;
130 struct t_pam_conv_script script;
131 struct pam_conv pamc;
134 unsigned int i, j, n;
137 memset(&script, 0, sizeof script);
138 pamc.conv = &t_pam_conv;
139 pamc.appdata_ptr = &script;
140 n = sizeof t_pam_return_cases / sizeof t_pam_return_cases[0];
141 for (i = 0; i < n; ++i) {
142 tc = &t_pam_return_cases[i];
144 for (j = 0; j < 2; ++j) {
145 t_fprintf(tf, "%s %s %s error=%s\n",
146 pam_facility_name[tc->facility],
147 pam_control_flag_name[tc->mod[j].ctlflag],
149 pam_err_name[tc->mod[j].modret]);
151 pam_err = pam_start(tf->name, "test", &pamc, &pamh);
152 if (pam_err != PAM_SUCCESS) {
153 t_printv("pam_start() returned %d\n", pam_err);
157 switch (tc->primitive) {
158 case PAM_SM_AUTHENTICATE:
159 pam_err = pam_authenticate(pamh, tc->flags);
162 pam_err = pam_setcred(pamh, tc->flags);
164 case PAM_SM_ACCT_MGMT:
165 pam_err = pam_acct_mgmt(pamh, tc->flags);
167 case PAM_SM_OPEN_SESSION:
168 pam_err = pam_open_session(pamh, tc->flags);
170 case PAM_SM_CLOSE_SESSION:
171 pam_err = pam_close_session(pamh, tc->flags);
173 case PAM_SM_CHAUTHTOK:
174 pam_err = pam_chauthtok(pamh, tc->flags);
177 t_printv("%s returned %d\n",
178 pam_func_name[tc->primitive], pam_err);
179 pam_end(pamh, pam_err);
187 /***************************************************************************
192 t_prepare(int argc, char *argv[])
198 if ((pam_return_so = getenv("PAM_RETURN_SO")) == NULL) {
199 t_printv("define PAM_RETURN_SO before running these tests\n");
203 openpam_set_feature(OPENPAM_RESTRICT_MODULE_NAME, 0);
204 openpam_set_feature(OPENPAM_VERIFY_MODULE_FILE, 0);
205 openpam_set_feature(OPENPAM_RESTRICT_SERVICE_NAME, 0);
206 openpam_set_feature(OPENPAM_VERIFY_POLICY_FILE, 0);
207 openpam_set_feature(OPENPAM_FALLBACK_TO_OTHER, 0);
216 main(int argc, char *argv[])
219 t_main(t_prepare, NULL, argc, argv);