mirror of
https://gitlab.freedesktop.org/dbus/dbus.git
synced 2025-12-30 22:20:11 +01:00
We don't actually complete successful authentication, because that would require us to generate a cookie and compute the correct SHA1, which is difficult to do in a deterministic authentication script. However, we do assert that dbus#269 (CVE-2019-12749) has been fixed. Signed-off-by: Simon McVittie <smcv@collabora.com>
12 lines
357 B
Text
12 lines
357 B
Text
UNIX_ONLY
|
|
SERVER
|
|
SEND 'AUTH DBUS_COOKIE_SHA1 WRONG_USERNAME_HEX'
|
|
EXPECT_COMMAND REJECTED
|
|
EXPECT_STATE WAITING_FOR_INPUT
|
|
EXPECT_HAVE_NO_CREDENTIALS
|
|
SEND 'AUTH DBUS_COOKIE_SHA1 USERNAME_HEX'
|
|
EXPECT_COMMAND DATA
|
|
EXPECT_STATE WAITING_FOR_INPUT
|
|
EXPECT_HAVE_NO_CREDENTIALS
|
|
# We don't actually complete DBUS_COOKIE_SHA1 authentication, because
|
|
# it's non-trivial.
|