forked from yamahata/glibc
-
Notifications
You must be signed in to change notification settings - Fork 0
/
tst-getpw.c
114 lines (95 loc) · 2.99 KB
/
tst-getpw.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
/* Copyright (C) 1999-2019 Free Software Foundation, Inc.
This file is part of the GNU C Library.
The GNU C Library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
The GNU C Library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with the GNU C Library; if not, see
<http://www.gnu.org/licenses/>. */
#include <stdio.h>
#include <pwd.h>
#include <errno.h>
#include <stdbool.h>
/* We want to test getpw by calling it with a uid that does
exist and one that doesn't exist. We track if we've met those
conditions and exit. We also track if we've failed due to lack
of memory. That constitutes all of the standard failure cases. */
bool seen_hit;
bool seen_miss;
bool seen_oom;
/* How many errors we've had while running the test. */
int errors;
static void
check (uid_t uid)
{
int ret;
char buf[1024];
ret = getpw (uid, buf);
/* Successfully read a password line. */
if (ret == 0 && !seen_hit)
{
printf ("PASS: Read a password line given a uid.\n");
seen_hit = true;
}
/* Failed to read a password line. Why? */
if (ret == -1)
{
/* No entry? Technically the errno could be any number
of values including ESRCH, EBADP or EPERM depending
on the quality of the nss module that implements the
underlying lookup. It should be 0 for getpw.*/
if (errno == 0 && !seen_miss)
{
printf ("PASS: Found an invalid uid.\n");
seen_miss = true;
return;
}
/* Out of memory? */
if (errno == ENOMEM && !seen_oom)
{
printf ("FAIL: Failed with ENOMEM.\n");
seen_oom = true;
errors++;
}
/* We don't expect any other values for errno. */
if (errno != ENOMEM && errno != 0)
errors++;
}
}
static int
do_test (void)
{
int ret;
uid_t uid;
/* Should return -1 and set errnot to EINVAL. */
ret = getpw (0, NULL);
if (ret == -1 && errno == EINVAL)
{
printf ("PASS: NULL buffer returns -1 and sets errno to EINVAL.\n");
}
else
{
printf ("FAIL: NULL buffer did not return -1 or set errno to EINVAL.\n");
errors++;
}
/* Look for one matching uid, one non-found uid and then stop.
Set an upper limit at the 16-bit UID mark; no need to go farther. */
for (uid = 0; uid < ((uid_t) 65535); ++uid)
{
check (uid);
if (seen_miss && seen_hit)
break;
}
if (!seen_hit)
printf ("FAIL: Did not read even one password line given a uid.\n");
if (!seen_miss)
printf ("FAIL: Did not find even one invalid uid.\n");
return errors;
}
#define TEST_FUNCTION do_test ()
#include "../test-skeleton.c"