#include "t_daemon.h"
#define EVENT_COUNT 6
static struct
{
int count;
struct event events[EVENT_COUNT];
} record;
static krad_attrset *set;
static krad_remote *rr;
static verto_ctx *vctx;
static void
callback(krb5_error_code retval, const krad_packet *request,
const krad_packet *response, void *data)
{
struct event *evt;
evt = &record.events[record.count++];
evt->error = retval != 0;
if (evt->error)
evt->result.retval = retval;
else
evt->result.code = krad_packet_get_code(response);
verto_break(vctx);
}
static void
remote_new(krb5_context kctx, krad_remote **remote)
{
struct addrinfo *ai = NULL, hints;
memset(&hints, 0, sizeof(hints));
hints.ai_family = AF_INET;
hints.ai_socktype = SOCK_DGRAM;
noerror(gai_error_code(getaddrinfo("127.0.0.1", "radius", &hints, &ai)));
noerror(kr_remote_new(kctx, vctx, ai, "foo", remote));
insist(kr_remote_equals(*remote, ai, "foo"));
freeaddrinfo(ai);
}
static krb5_error_code
do_auth(const char *password, const krad_packet **pkt)
{
const krad_packet *tmppkt;
krb5_error_code retval;
krb5_data tmp = string2data((char *)password);
retval = krad_attrset_add(set, KRAD_ATTR_USER_PASSWORD, &tmp);
if (retval != 0)
return retval;
retval = kr_remote_send(rr, KRAD_CODE_ACCESS_REQUEST, set, callback, NULL,
1000, 3, &tmppkt);
krad_attrset_del(set, KRAD_ATTR_USER_PASSWORD, 0);
if (retval != 0)
return retval;
if (pkt != NULL)
*pkt = tmppkt;
return 0;
}
static void
test_timeout(verto_ctx *ctx, verto_ev *ev)
{
static const krad_packet *pkt;
noerror(do_auth("accept", &pkt));
kr_remote_cancel(rr, pkt);
}
int
main(int argc, const char **argv)
{
krb5_context kctx = NULL;
krb5_data tmp;
if (!daemon_start(argc, argv)) {
fprintf(stderr, "Unable to start pyrad daemon, skipping test...\n");
return 0;
}
noerror(krb5_init_context(&kctx));
vctx = verto_new(NULL, VERTO_EV_TYPE_IO | VERTO_EV_TYPE_TIMEOUT);
insist(vctx != NULL);
remote_new(kctx, &rr);
noerror(krad_attrset_new(kctx, &set));
tmp = string2data("testUser");
noerror(krad_attrset_add(set, KRAD_ATTR_USER_NAME, &tmp));
noerror(do_auth("accept", NULL));
verto_run(vctx);
noerror(do_auth("reject", NULL));
verto_run(vctx);
insist(verto_add_timeout(vctx, VERTO_EV_FLAG_NONE, test_timeout, 0) !=
NULL);
verto_run(vctx);
daemon_stop();
noerror(do_auth("accept", NULL));
verto_run(vctx);
noerror(do_auth("accept", NULL));
kr_remote_free(rr);
krad_attrset_free(set);
insist(record.count == EVENT_COUNT);
insist(record.events[0].error == FALSE);
insist(record.events[0].result.code == KRAD_CODE_ACCESS_ACCEPT);
insist(record.events[1].error == FALSE);
insist(record.events[1].result.code == KRAD_CODE_ACCESS_REJECT);
insist(record.events[2].error == TRUE);
insist(record.events[2].result.retval == ECANCELED);
insist(record.events[3].error == TRUE);
insist(record.events[3].result.retval == ETIMEDOUT);
insist(record.events[4].error == TRUE);
insist(record.events[4].result.retval == ECANCELED);
insist(record.events[5].error == TRUE);
insist(record.events[5].result.retval == ECANCELED);
verto_free(vctx);
krb5_free_context(kctx);
return 0;
}