summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorMichal Zidek <mzidek@redhat.com>2016-04-05 12:53:06 +0200
committerJakub Hrozek <jhrozek@redhat.com>2016-07-07 10:26:14 +0200
commit29071a9e2df823a2cdc13cea996ece1c996e1172 (patch)
tree863f04b413e78768d8a0eacfd6332bcb62abbe29 /src
parent9decb708802b6483de58ec27feb310baa7892ed9 (diff)
downloadsssd-29071a9e2df823a2cdc13cea996ece1c996e1172.tar.gz
sssd-29071a9e2df823a2cdc13cea996ece1c996e1172.tar.xz
sssd-29071a9e2df823a2cdc13cea996ece1c996e1172.zip
TESTS: Start fixing the PAM responder tests for fully qualified names in sysdb
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Diffstat (limited to 'src')
-rw-r--r--src/tests/cmocka/test_pam_srv.c32
1 files changed, 21 insertions, 11 deletions
diff --git a/src/tests/cmocka/test_pam_srv.c b/src/tests/cmocka/test_pam_srv.c
index 6f56071f8..4d53c22d8 100644
--- a/src/tests/cmocka/test_pam_srv.c
+++ b/src/tests/cmocka/test_pam_srv.c
@@ -1074,7 +1074,8 @@ void test_pam_offline_auth_success(void **state)
{
int ret;
- ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345");
+ ret = sysdb_cache_password(pam_test_ctx->tctx->dom,
+ "pamuser@"TEST_DOM_NAME, "12345");
assert_int_equal(ret, EOK);
mock_input_pam(pam_test_ctx, "pamuser", "12345", NULL);
@@ -1098,7 +1099,7 @@ void test_pam_offline_auth_wrong_pw(void **state)
{
int ret;
- ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345");
+ ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser@"TEST_DOM_NAME, "12345");
assert_int_equal(ret, EOK);
mock_input_pam(pam_test_ctx, "pamuser", "11111", NULL);
@@ -1122,7 +1123,8 @@ void test_pam_offline_auth_success_2fa(void **state)
{
int ret;
- ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345");
+ ret = sysdb_cache_password(pam_test_ctx->tctx->dom,
+ "pamuser@"TEST_DOM_NAME, "12345");
assert_int_equal(ret, EOK);
mock_input_pam(pam_test_ctx, "pamuser", "12345", "abcde");
@@ -1146,7 +1148,8 @@ void test_pam_offline_auth_failed_2fa(void **state)
{
int ret;
- ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345");
+ ret = sysdb_cache_password(pam_test_ctx->tctx->dom,
+ "pamuser@"TEST_DOM_NAME, "12345");
assert_int_equal(ret, EOK);
mock_input_pam(pam_test_ctx, "pamuser", "11111", "abcde");
@@ -1170,7 +1173,8 @@ void test_pam_offline_auth_success_2fa_with_cached_2fa(void **state)
{
int ret;
- ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345",
+ ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom,
+ "pamuser@"TEST_DOM_NAME, "12345",
SSS_AUTHTOK_TYPE_2FA, 5);
assert_int_equal(ret, EOK);
@@ -1195,7 +1199,8 @@ void test_pam_offline_auth_failed_2fa_with_cached_2fa(void **state)
{
int ret;
- ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345",
+ ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom,
+ "pamuser@"TEST_DOM_NAME, "12345",
SSS_AUTHTOK_TYPE_2FA, 5);
assert_int_equal(ret, EOK);
@@ -1220,7 +1225,8 @@ void test_pam_offline_auth_success_pw_with_cached_2fa(void **state)
{
int ret;
- ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345",
+ ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom,
+ "pamuser@"TEST_DOM_NAME, "12345",
SSS_AUTHTOK_TYPE_2FA, 5);
assert_int_equal(ret, EOK);
@@ -1245,7 +1251,8 @@ void test_pam_offline_auth_failed_pw_with_cached_2fa(void **state)
{
int ret;
- ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345",
+ ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom,
+ "pamuser@"TEST_DOM_NAME, "12345",
SSS_AUTHTOK_TYPE_2FA, 5);
assert_int_equal(ret, EOK);
@@ -1270,7 +1277,8 @@ void test_pam_offline_auth_success_combined_pw_with_cached_2fa(void **state)
{
int ret;
- ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser",
+ ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom,
+ "pamuser@"TEST_DOM_NAME,
"12345678", SSS_AUTHTOK_TYPE_2FA, 5);
assert_int_equal(ret, EOK);
@@ -1295,7 +1303,8 @@ void test_pam_offline_auth_failed_combined_pw_with_cached_2fa(void **state)
{
int ret;
- ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser",
+ ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom,
+ "pamuser@"TEST_DOM_NAME,
"12345678", SSS_AUTHTOK_TYPE_2FA, 5);
assert_int_equal(ret, EOK);
@@ -1320,7 +1329,8 @@ void test_pam_offline_auth_failed_wrong_2fa_size_with_cached_2fa(void **state)
{
int ret;
- ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser",
+ ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom,
+ "pamuser@"TEST_DOM_NAME,
"12345678", SSS_AUTHTOK_TYPE_2FA, 5);
assert_int_equal(ret, EOK);