diff options
Diffstat (limited to 'src/tests/cmocka/test_pam_srv.c')
-rw-r--r-- | src/tests/cmocka/test_pam_srv.c | 32 |
1 files changed, 21 insertions, 11 deletions
diff --git a/src/tests/cmocka/test_pam_srv.c b/src/tests/cmocka/test_pam_srv.c index 75411feee..24ecc5a4a 100644 --- a/src/tests/cmocka/test_pam_srv.c +++ b/src/tests/cmocka/test_pam_srv.c @@ -1034,7 +1034,8 @@ void test_pam_offline_auth_success(void **state) { int ret; - ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345"); + ret = sysdb_cache_password(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345"); assert_int_equal(ret, EOK); mock_input_pam(pam_test_ctx, "pamuser", "12345", NULL); @@ -1058,7 +1059,7 @@ void test_pam_offline_auth_wrong_pw(void **state) { int ret; - ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345"); + ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser@"TEST_DOM_NAME, "12345"); assert_int_equal(ret, EOK); mock_input_pam(pam_test_ctx, "pamuser", "11111", NULL); @@ -1082,7 +1083,8 @@ void test_pam_offline_auth_success_2fa(void **state) { int ret; - ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345"); + ret = sysdb_cache_password(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345"); assert_int_equal(ret, EOK); mock_input_pam(pam_test_ctx, "pamuser", "12345", "abcde"); @@ -1106,7 +1108,8 @@ void test_pam_offline_auth_failed_2fa(void **state) { int ret; - ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345"); + ret = sysdb_cache_password(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345"); assert_int_equal(ret, EOK); mock_input_pam(pam_test_ctx, "pamuser", "11111", "abcde"); @@ -1130,7 +1133,8 @@ void test_pam_offline_auth_success_2fa_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1155,7 +1159,8 @@ void test_pam_offline_auth_failed_2fa_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1180,7 +1185,8 @@ void test_pam_offline_auth_success_pw_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1205,7 +1211,8 @@ void test_pam_offline_auth_failed_pw_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1230,7 +1237,8 @@ void test_pam_offline_auth_success_combined_pw_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345678", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1255,7 +1263,8 @@ void test_pam_offline_auth_failed_combined_pw_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345678", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1280,7 +1289,8 @@ void test_pam_offline_auth_failed_wrong_2fa_size_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345678", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); |