1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
|
/* -*- Mode: C; indent-tabs-mode: t; c-basic-offset: 8; tab-width: 8 -*- */
/* unit-test-pam-setup.c: Setup for PAM tests
Copyright (C) 2007 Stefan Walter
The Gnome Keyring Library is free software; you can redistribute it and/or
modify it under the terms of the GNU Library General Public License as
published by the Free Software Foundation; either version 2 of the
License, or (at your option) any later version.
The Gnome Keyring Library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Library General Public License for more details.
You should have received a copy of the GNU Library General Public
License along with the Gnome Library; see the file COPYING.LIB. If not,
write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
Boston, MA 02111-1307, USA.
Author: Stef Walter <stef@memberwebs.com>
*/
#include <sys/types.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <signal.h>
#include <unistd.h>
#include "run-auto-test.h"
#include <security/pam_appl.h>
/*
* Each test looks like (on one line):
* void unit_test_xxxxx (CuTest* cu)
*
* Each setup looks like (on one line):
* void unit_setup_xxxxx (void);
*
* Each teardown looks like (on one line):
* void unit_teardown_xxxxx (void);
*
* Tests be run in the order specified here.
*/
/* Used directly by the other tests */
pam_handle_t *test_pamh = NULL;
static int
conv_func (int n, const struct pam_message **msg,
struct pam_response **resp, void *arg)
{
struct pam_response *aresp;
int i;
g_assert (n > 0 && n < PAM_MAX_NUM_MSG);
aresp = g_new0(struct pam_response, n);
for (i = 0; i < n; ++i) {
aresp[i].resp_retcode = 0;
aresp[i].resp = NULL;
switch (msg[i]->msg_style) {
case PAM_PROMPT_ECHO_OFF:
aresp[i].resp = getpass (msg[i]->msg);
g_assert (aresp[i].resp != NULL);
break;
case PAM_PROMPT_ECHO_ON:
aresp[i].resp = getpass (msg[i]->msg);
g_assert (aresp[i].resp != NULL);
break;
case PAM_ERROR_MSG:
fputs(msg[i]->msg, stderr);
if (strlen(msg[i]->msg) > 0 &&
msg[i]->msg[strlen(msg[i]->msg) - 1] != '\n')
fputc('\n', stderr);
break;
case PAM_TEXT_INFO:
fputs(msg[i]->msg, stdout);
if (strlen(msg[i]->msg) > 0 &&
msg[i]->msg[strlen(msg[i]->msg) - 1] != '\n')
fputc('\n', stdout);
break;
default:
return PAM_CONV_ERR;
}
}
*resp = aresp;
return PAM_SUCCESS;
}
struct pam_conv conv = { conv_func, NULL };
void unit_setup_pam (void)
{
char user[1024];
int ret;
printf ("Make sure the PAM module is installed by doing:\n"
"# make install-pam\n"
"\n"
"Then make /etc/pam.d/testgkr contains:\n"
"\n"
"auth required pam_unix.so nullok_secure\n"
"auth optional pam_gnome_keyring.so try_first_pass\n"
"session required pam_unix.so\n"
"session optional pam_gnome_keyring.so\n"
"\n");
sleep (1);
printf ("User: ");
fgets (user, sizeof (user), stdin);
g_strstrip (user);
ret = pam_start ("testgkr", user[0] ? user : g_get_user_name (), &conv, &test_pamh);
if (ret != PAM_SUCCESS)
g_error ("couldn't initialize pam");
g_assert (test_pamh);
}
void unit_teardown_pam (void)
{
g_assert (test_pamh);
pam_end (test_pamh, PAM_SUCCESS);
}
|