xref: /openbsd-src/regress/lib/libc/sys/t_getlogin.c (revision 49a6e16f2c2c8e509184b1f777366d1a6f337e1c)
1*49a6e16fSderaadt /*	$OpenBSD: t_getlogin.c,v 1.2 2021/12/13 16:56:48 deraadt Exp $	*/
2a545a52cSbluhm /* $NetBSD: t_getlogin.c,v 1.1 2011/07/07 06:57:53 jruoho Exp $ */
3a545a52cSbluhm 
4a545a52cSbluhm /*-
5a545a52cSbluhm  * Copyright (c) 2011 The NetBSD Foundation, Inc.
6a545a52cSbluhm  * All rights reserved.
7a545a52cSbluhm  *
8a545a52cSbluhm  * This code is derived from software contributed to The NetBSD Foundation
9a545a52cSbluhm  * by Jukka Ruohonen.
10a545a52cSbluhm  *
11a545a52cSbluhm  * Redistribution and use in source and binary forms, with or without
12a545a52cSbluhm  * modification, are permitted provided that the following conditions
13a545a52cSbluhm  * are met:
14a545a52cSbluhm  * 1. Redistributions of source code must retain the above copyright
15a545a52cSbluhm  *    notice, this list of conditions and the following disclaimer.
16a545a52cSbluhm  * 2. Redistributions in binary form must reproduce the above copyright
17a545a52cSbluhm  *    notice, this list of conditions and the following disclaimer in the
18a545a52cSbluhm  *    documentation and/or other materials provided with the distribution.
19a545a52cSbluhm  *
20a545a52cSbluhm  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
21a545a52cSbluhm  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22a545a52cSbluhm  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23a545a52cSbluhm  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
24a545a52cSbluhm  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25a545a52cSbluhm  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26a545a52cSbluhm  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27a545a52cSbluhm  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28a545a52cSbluhm  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29a545a52cSbluhm  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30a545a52cSbluhm  * POSSIBILITY OF SUCH DAMAGE.
31a545a52cSbluhm  */
32a545a52cSbluhm 
33a545a52cSbluhm #include "macros.h"
34a545a52cSbluhm 
35a545a52cSbluhm #include <sys/wait.h>
36a545a52cSbluhm 
37a545a52cSbluhm #include "atf-c.h"
38a545a52cSbluhm #include <errno.h>
39a545a52cSbluhm #include <stdlib.h>
40a545a52cSbluhm #include <string.h>
41*49a6e16fSderaadt #include <limits.h>
42a545a52cSbluhm #include <unistd.h>
43a545a52cSbluhm 
44a545a52cSbluhm ATF_TC(getlogin_r_err);
ATF_TC_HEAD(getlogin_r_err,tc)45a545a52cSbluhm ATF_TC_HEAD(getlogin_r_err, tc)
46a545a52cSbluhm {
47a545a52cSbluhm 	atf_tc_set_md_var(tc, "descr", "Test errors from getlogin_r(2)");
48a545a52cSbluhm }
49a545a52cSbluhm 
ATF_TC_BODY(getlogin_r_err,tc)50a545a52cSbluhm ATF_TC_BODY(getlogin_r_err, tc)
51a545a52cSbluhm {
52a545a52cSbluhm 	char small[0];
53a545a52cSbluhm 
54a545a52cSbluhm 	ATF_REQUIRE(getlogin_r(small, sizeof(small)) == ERANGE);
55a545a52cSbluhm }
56a545a52cSbluhm 
57a545a52cSbluhm ATF_TC(getlogin_same);
ATF_TC_HEAD(getlogin_same,tc)58a545a52cSbluhm ATF_TC_HEAD(getlogin_same, tc)
59a545a52cSbluhm {
60a545a52cSbluhm 	atf_tc_set_md_var(tc, "descr", "getlogin(2) vs. getlogin_r(2)");
61a545a52cSbluhm }
62a545a52cSbluhm 
ATF_TC_BODY(getlogin_same,tc)63a545a52cSbluhm ATF_TC_BODY(getlogin_same, tc)
64a545a52cSbluhm {
65*49a6e16fSderaadt 	char buf[LOGIN_NAME_MAX];
66a545a52cSbluhm 	char *str;
67a545a52cSbluhm 
68a545a52cSbluhm 	str = getlogin();
69a545a52cSbluhm 
70a545a52cSbluhm 	if (str == NULL)
71a545a52cSbluhm 		return;
72a545a52cSbluhm 
73a545a52cSbluhm 	ATF_REQUIRE(getlogin_r(buf, sizeof(buf)) == 0);
74a545a52cSbluhm 
75a545a52cSbluhm 	if (strcmp(str, buf) != 0)
76a545a52cSbluhm 		atf_tc_fail("getlogin(2) and getlogin_r(2) differ");
77a545a52cSbluhm }
78a545a52cSbluhm 
79a545a52cSbluhm ATF_TC(setlogin_basic);
ATF_TC_HEAD(setlogin_basic,tc)80a545a52cSbluhm ATF_TC_HEAD(setlogin_basic, tc)
81a545a52cSbluhm {
82a545a52cSbluhm 	atf_tc_set_md_var(tc, "descr", "Test that setlogin(2) works");
83a545a52cSbluhm 	atf_tc_set_md_var(tc, "require.user", "root");
84a545a52cSbluhm }
85a545a52cSbluhm 
ATF_TC_BODY(setlogin_basic,tc)86a545a52cSbluhm ATF_TC_BODY(setlogin_basic, tc)
87a545a52cSbluhm {
88a545a52cSbluhm 	char *name;
89a545a52cSbluhm 	pid_t pid;
90a545a52cSbluhm 	int sta;
91a545a52cSbluhm 
92a545a52cSbluhm 	pid = fork();
93a545a52cSbluhm 	ATF_REQUIRE(pid >= 0);
94a545a52cSbluhm 
95a545a52cSbluhm 	if (pid == 0) {
96a545a52cSbluhm 
97a545a52cSbluhm 		(void)setsid();
98a545a52cSbluhm 
99a545a52cSbluhm 		if (setlogin("foobar") != 0)
100a545a52cSbluhm 			_exit(EXIT_FAILURE);
101a545a52cSbluhm 
102a545a52cSbluhm 		name = getlogin();
103a545a52cSbluhm 
104a545a52cSbluhm 		if (name == NULL)
105a545a52cSbluhm 			_exit(EXIT_FAILURE);
106a545a52cSbluhm 
107a545a52cSbluhm 		if (strcmp(name, "foobar") != 0)
108a545a52cSbluhm 			_exit(EXIT_FAILURE);
109a545a52cSbluhm 
110a545a52cSbluhm 		_exit(EXIT_SUCCESS);
111a545a52cSbluhm 	}
112a545a52cSbluhm 
113a545a52cSbluhm 	(void)wait(&sta);
114a545a52cSbluhm 
115a545a52cSbluhm 	if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS)
116a545a52cSbluhm 		atf_tc_fail("setlogin(2) failed to set login name");
117a545a52cSbluhm }
118a545a52cSbluhm 
119a545a52cSbluhm ATF_TC(setlogin_err);
ATF_TC_HEAD(setlogin_err,tc)120a545a52cSbluhm ATF_TC_HEAD(setlogin_err, tc)
121a545a52cSbluhm {
122a545a52cSbluhm 	atf_tc_set_md_var(tc, "descr", "Test errors from setlogin(2)");
123a545a52cSbluhm 	atf_tc_set_md_var(tc, "require.user", "root");
124a545a52cSbluhm }
125a545a52cSbluhm 
ATF_TC_BODY(setlogin_err,tc)126a545a52cSbluhm ATF_TC_BODY(setlogin_err, tc)
127a545a52cSbluhm {
128*49a6e16fSderaadt 	char buf[LOGIN_NAME_MAX + 1];
129a545a52cSbluhm 	char *name;
130a545a52cSbluhm 	pid_t pid;
131a545a52cSbluhm 	int sta;
132a545a52cSbluhm 
133a545a52cSbluhm 	pid = fork();
134a545a52cSbluhm 	ATF_REQUIRE(pid >= 0);
135a545a52cSbluhm 
136a545a52cSbluhm 	(void)memset(buf, 'x', sizeof(buf));
137a545a52cSbluhm 
138a545a52cSbluhm 	if (pid == 0) {
139a545a52cSbluhm 
140a545a52cSbluhm 		(void)setsid();
141a545a52cSbluhm 
142a545a52cSbluhm 		errno = 0;
143a545a52cSbluhm 
144a545a52cSbluhm 		if (setlogin(buf) != -1)
145a545a52cSbluhm 			_exit(EINVAL);
146a545a52cSbluhm 
147a545a52cSbluhm 		if (errno != EINVAL)
148a545a52cSbluhm 			_exit(EINVAL);
149a545a52cSbluhm 
150a545a52cSbluhm 		errno = 0;
151a545a52cSbluhm 
152a545a52cSbluhm 		if (setlogin((void *)-1) != -1)
153a545a52cSbluhm 			_exit(EFAULT);
154a545a52cSbluhm 
155a545a52cSbluhm 		if (errno != EFAULT)
156a545a52cSbluhm 			_exit(EFAULT);
157a545a52cSbluhm 
158a545a52cSbluhm 		name = getlogin();
159a545a52cSbluhm 
160a545a52cSbluhm 		if (name == NULL)
161a545a52cSbluhm 			_exit(EXIT_FAILURE);
162a545a52cSbluhm 
163a545a52cSbluhm 		if (strcmp(name, "foobar") == 0)
164a545a52cSbluhm 			_exit(EXIT_FAILURE);
165a545a52cSbluhm 
166a545a52cSbluhm 		_exit(EXIT_SUCCESS);
167a545a52cSbluhm 	}
168a545a52cSbluhm 
169a545a52cSbluhm 	(void)wait(&sta);
170a545a52cSbluhm 
171a545a52cSbluhm 	if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS) {
172a545a52cSbluhm 
173a545a52cSbluhm 		if (WEXITSTATUS(sta) == EFAULT)
174a545a52cSbluhm 			atf_tc_fail("expected EFAULT, but the call succeeded");
175a545a52cSbluhm 
176a545a52cSbluhm 		if (WEXITSTATUS(sta) == EINVAL)
177a545a52cSbluhm 			atf_tc_fail("expected EINVAL, but the call succeeded");
178a545a52cSbluhm 
179a545a52cSbluhm 		atf_tc_fail("setlogin(2) failed, but login name was set");
180a545a52cSbluhm 	}
181a545a52cSbluhm }
182a545a52cSbluhm 
183a545a52cSbluhm ATF_TC(setlogin_perm);
ATF_TC_HEAD(setlogin_perm,tc)184a545a52cSbluhm ATF_TC_HEAD(setlogin_perm, tc)
185a545a52cSbluhm {
186a545a52cSbluhm 	atf_tc_set_md_var(tc, "descr", "Test setlogin(2) as normal user");
187a545a52cSbluhm 	atf_tc_set_md_var(tc, "require.user", "unprivileged");
188a545a52cSbluhm }
189a545a52cSbluhm 
ATF_TC_BODY(setlogin_perm,tc)190a545a52cSbluhm ATF_TC_BODY(setlogin_perm, tc)
191a545a52cSbluhm {
192a545a52cSbluhm 	char *name;
193a545a52cSbluhm 	pid_t pid;
194a545a52cSbluhm 	int sta;
195a545a52cSbluhm 
196a545a52cSbluhm 	pid = fork();
197a545a52cSbluhm 	ATF_REQUIRE(pid >= 0);
198a545a52cSbluhm 
199a545a52cSbluhm 	if (pid == 0) {
200a545a52cSbluhm 
201a545a52cSbluhm 		(void)setsid();
202a545a52cSbluhm 
203a545a52cSbluhm 		errno = 0;
204a545a52cSbluhm 
205a545a52cSbluhm 		if (setlogin("foobar") != -1)
206a545a52cSbluhm 			_exit(EXIT_FAILURE);
207a545a52cSbluhm 
208a545a52cSbluhm 		if (errno != EPERM)
209a545a52cSbluhm 			_exit(EXIT_FAILURE);
210a545a52cSbluhm 
211a545a52cSbluhm 		name = getlogin();
212a545a52cSbluhm 
213a545a52cSbluhm 		if (name == NULL)
214a545a52cSbluhm 			_exit(EXIT_FAILURE);
215a545a52cSbluhm 
216a545a52cSbluhm 		if (strcmp(name, "foobar") == 0)
217a545a52cSbluhm 			_exit(EXIT_FAILURE);
218a545a52cSbluhm 
219a545a52cSbluhm 		_exit(EXIT_SUCCESS);
220a545a52cSbluhm 	}
221a545a52cSbluhm 
222a545a52cSbluhm 	(void)wait(&sta);
223a545a52cSbluhm 
224a545a52cSbluhm 	if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS)
225a545a52cSbluhm 		atf_tc_fail("login name was set as an unprivileged user");
226a545a52cSbluhm }
227a545a52cSbluhm 
ATF_TP_ADD_TCS(tp)228a545a52cSbluhm ATF_TP_ADD_TCS(tp)
229a545a52cSbluhm {
230a545a52cSbluhm 
231a545a52cSbluhm 	ATF_TP_ADD_TC(tp, getlogin_r_err);
232a545a52cSbluhm 	ATF_TP_ADD_TC(tp, getlogin_same);
233a545a52cSbluhm 	ATF_TP_ADD_TC(tp, setlogin_basic);
234a545a52cSbluhm 	ATF_TP_ADD_TC(tp, setlogin_err);
235a545a52cSbluhm 	ATF_TP_ADD_TC(tp, setlogin_perm);
236a545a52cSbluhm 
237a545a52cSbluhm 	return atf_no_error();
238a545a52cSbluhm }
239