diff options
author | Michal Zidek <mzidek@redhat.com> | 2016-04-05 12:53:06 +0200 |
---|---|---|
committer | Jakub Hrozek <jhrozek@redhat.com> | 2016-07-07 10:26:14 +0200 |
commit | 29071a9e2df823a2cdc13cea996ece1c996e1172 (patch) | |
tree | 863f04b413e78768d8a0eacfd6332bcb62abbe29 /src | |
parent | 9decb708802b6483de58ec27feb310baa7892ed9 (diff) | |
download | sssd-29071a9e2df823a2cdc13cea996ece1c996e1172.tar.gz sssd-29071a9e2df823a2cdc13cea996ece1c996e1172.tar.xz sssd-29071a9e2df823a2cdc13cea996ece1c996e1172.zip |
TESTS: Start fixing the PAM responder tests for fully qualified names in sysdb
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Diffstat (limited to 'src')
-rw-r--r-- | src/tests/cmocka/test_pam_srv.c | 32 |
1 files changed, 21 insertions, 11 deletions
diff --git a/src/tests/cmocka/test_pam_srv.c b/src/tests/cmocka/test_pam_srv.c index 6f56071f8..4d53c22d8 100644 --- a/src/tests/cmocka/test_pam_srv.c +++ b/src/tests/cmocka/test_pam_srv.c @@ -1074,7 +1074,8 @@ void test_pam_offline_auth_success(void **state) { int ret; - ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345"); + ret = sysdb_cache_password(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345"); assert_int_equal(ret, EOK); mock_input_pam(pam_test_ctx, "pamuser", "12345", NULL); @@ -1098,7 +1099,7 @@ void test_pam_offline_auth_wrong_pw(void **state) { int ret; - ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345"); + ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser@"TEST_DOM_NAME, "12345"); assert_int_equal(ret, EOK); mock_input_pam(pam_test_ctx, "pamuser", "11111", NULL); @@ -1122,7 +1123,8 @@ void test_pam_offline_auth_success_2fa(void **state) { int ret; - ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345"); + ret = sysdb_cache_password(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345"); assert_int_equal(ret, EOK); mock_input_pam(pam_test_ctx, "pamuser", "12345", "abcde"); @@ -1146,7 +1148,8 @@ void test_pam_offline_auth_failed_2fa(void **state) { int ret; - ret = sysdb_cache_password(pam_test_ctx->tctx->dom, "pamuser", "12345"); + ret = sysdb_cache_password(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345"); assert_int_equal(ret, EOK); mock_input_pam(pam_test_ctx, "pamuser", "11111", "abcde"); @@ -1170,7 +1173,8 @@ void test_pam_offline_auth_success_2fa_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1195,7 +1199,8 @@ void test_pam_offline_auth_failed_2fa_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1220,7 +1225,8 @@ void test_pam_offline_auth_success_pw_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1245,7 +1251,8 @@ void test_pam_offline_auth_failed_pw_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", "12345", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1270,7 +1277,8 @@ void test_pam_offline_auth_success_combined_pw_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345678", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1295,7 +1303,8 @@ void test_pam_offline_auth_failed_combined_pw_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345678", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); @@ -1320,7 +1329,8 @@ void test_pam_offline_auth_failed_wrong_2fa_size_with_cached_2fa(void **state) { int ret; - ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, "pamuser", + ret = sysdb_cache_password_ex(pam_test_ctx->tctx->dom, + "pamuser@"TEST_DOM_NAME, "12345678", SSS_AUTHTOK_TYPE_2FA, 5); assert_int_equal(ret, EOK); |