pam_panic/test/test.c

222 lines
5.2 KiB
C
Raw Normal View History

2018-05-11 02:18:34 +00:00
/*
FILENAME : test.c
DESCRIPTION : Test suites with CUnit for pam_panic
AUTHOR : Bandie
DATE : 2018-05-11T04:13:51+02:00
LICENSE : GNU-GPLv3
*/
#include <stdint.h>
#include <unistd.h>
#include <security/pam_modules.h>
2018-09-29 23:40:17 +00:00
#include "../lib/gettext.h"
#include "../src/pam_panic/pam_panic_authdevice.h"
#include "../src/pam_panic/pam_panic_reject.h"
2018-09-29 23:40:17 +00:00
#include "../src/pam_panic_pw/pam_panic_pw.h"
#include <CUnit/Basic.h>
#define STATE_GOOD 0
#define STATE_BAD 99
#define STATE_NA 1
#define STATE_REJ_SER 0
#define STATE_REJ_REB 1
#define STATE_REJ_POW 2
#define STATE_REJ_NA 3
2018-09-29 23:40:17 +00:00
#define STATE_PPP_WRITEPASSWORDS 0
#define GOODUUID "./good"
#define BADUUID "./bad"
2018-09-29 23:40:17 +00:00
#define PASSWORDFILE "./pwfile"
#define GOODPASSWORD "yip"
#define BADPASSWORD "69"
char* gU = GOODUUID;
char* bU = BADUUID;
int init_suite(void) {
return 0;
}
int clean_suite(void) {
return 0;
}
// pam_panic_authdevice tests
void test_authDeviceGood(void) {
FILE *f = fopen(gU, "w");
fclose(f);
int ret = authDevice(NULL, gU, bU, NULL, 0, 0, 0);
CU_ASSERT_EQUAL(ret, STATE_GOOD);
unlink(gU);
}
void test_authDeviceBad(void) {
FILE *f = fopen(bU, "w");
fclose(f);
int ret = authDevice(NULL, gU, bU, NULL, 0, 0, 0);
CU_ASSERT_EQUAL(ret, STATE_BAD);
unlink(bU);
}
void test_authDeviceNA(void) {
int ret = authDevice(NULL, gU, bU, NULL, 0, 0, 0);
CU_ASSERT_EQUAL(ret, STATE_NA);
}
// pam_panic_reject tests
void test_rejectSerious(void) {
int ret = reject(NULL, 1, 0, 0);
CU_ASSERT_EQUAL(ret, STATE_REJ_SER);
}
void test_rejectReboot(void) {
int ret = reject(NULL, 0, 1, 0);
CU_ASSERT_EQUAL(ret, STATE_REJ_REB);
}
void test_rejectPoweroff(void) {
int ret = reject(NULL, 0, 0, 1);
CU_ASSERT_EQUAL(ret, STATE_REJ_POW);
}
void test_rejectNA(void) {
int ret = reject(NULL, 0, 0, 0);
CU_ASSERT_EQUAL(ret, STATE_REJ_NA);
}
2018-09-29 23:40:17 +00:00
// pam_panic_pw tests
void test_writePassword(void) {
char encpw[2][256];
2018-09-29 23:40:17 +00:00
strcpy(encpw[0], crypt(GOODPASSWORD, "$6$somesalt"));
strcpy(encpw[1], crypt(BADPASSWORD, "$6$somesalt"));
int ret = writePasswords(encpw, PASSWORDFILE);
CU_ASSERT_EQUAL(ret, STATE_PPP_WRITEPASSWORDS);
}
void test_passwordCheckFromFile(void) {
int ret;
char buf[2][256];
char* line = NULL;
FILE *f = fopen(PASSWORDFILE, "r");
size_t len = 0;
if(f){
int i = 0;
while(getline(&line, &len, f)){
2018-09-29 23:40:17 +00:00
strncpy(buf[i], line, len);
if(++i > 1)
break;
}
if(ferror(f))
CU_FAIL("Some error occured with the password file.");
fclose(f);
}
ret = strcmp(strtok(buf[0], "\n"), crypt(GOODPASSWORD, buf[0])) == 0;
CU_ASSERT_TRUE(ret);
ret = strcmp(strtok(buf[1], "\n"), crypt(BADPASSWORD, buf[1])) == 0;
CU_ASSERT_TRUE(ret);
}
void test_badPasswordCheckFromFile(void) {
int ret;
char buf[2][256];
char* line = NULL;
FILE *f = fopen(PASSWORDFILE, "r");
size_t len = 0;
if(f){
int i = 0;
while(getline(&line, &len, f)){
strncpy(buf[i], line, len);
if(++i > 1)
break;
}
if(ferror(f))
CU_FAIL("Some error occured with the password file.");
fclose(f);
}
ret = strcmp(strtok(buf[0], "\n"), crypt(BADPASSWORD, buf[0])) == 0;
CU_ASSERT_FALSE(ret);
ret = strcmp(strtok(buf[1], "\n"), crypt(GOODPASSWORD, buf[1])) == 0;
CU_ASSERT_FALSE(ret);
}
int main(void) {
// no stdout buffering
//setbuf(stdout, NULL);
// init CUnit test registry
CU_pSuite pSuiteDevice = NULL;
CU_pSuite pSuiteReject = NULL;
2018-09-29 23:40:17 +00:00
CU_pSuite pSuitePasswordWrite = NULL;
if (CUE_SUCCESS != CU_initialize_registry())
return CU_get_error();
// Make suits
pSuiteDevice = CU_add_suite("Suite pam_panic_authdevice", init_suite, clean_suite);
pSuiteReject = CU_add_suite("Suite pam_panic_reject", init_suite, clean_suite);
2018-09-29 23:40:17 +00:00
pSuitePasswordWrite = CU_add_suite("Suite pam_panic_pw", init_suite, clean_suite);
if (pSuiteDevice == NULL
2018-09-29 23:40:17 +00:00
|| pSuiteReject == NULL || pSuitePasswordWrite == NULL) {
CU_cleanup_registry();
return CU_get_error();
}
// adding tests to all suits
// SuiteDevice
if ( (NULL == CU_add_test(pSuiteDevice, "Authenticate with good device?", test_authDeviceGood))
|| (NULL == CU_add_test(pSuiteDevice, "Authenticate with bad device?", test_authDeviceBad))
|| (NULL == CU_add_test(pSuiteDevice, "Authenticate with no device?", test_authDeviceNA))
2018-09-30 10:52:34 +00:00
|| (NULL == CU_add_test(pSuiteReject, "Serious function?", test_rejectSerious))
|| (NULL == CU_add_test(pSuiteReject, "Reboot function?", test_rejectReboot))
|| (NULL == CU_add_test(pSuiteReject, " Poweroff function?", test_rejectPoweroff))
|| (NULL == CU_add_test(pSuiteReject, " Nothing at all function?", test_rejectNA))
|| (NULL == CU_add_test(pSuitePasswordWrite, "Write a password into a file?", test_writePassword))
|| (NULL == CU_add_test(pSuitePasswordWrite, "Check password file with right passwords?", test_passwordCheckFromFile))
|| (NULL == CU_add_test(pSuitePasswordWrite, "Check password file with wrong passwords?", test_badPasswordCheckFromFile))
) {
CU_cleanup_registry();
return CU_get_error();
}
/* Run all tests */
CU_basic_set_mode(CU_BRM_VERBOSE);
CU_basic_run_tests();
int fail = CU_get_number_of_failures();
CU_cleanup_registry();
if(fail)
return 1;
return CU_get_error();
}