2012-07-20 01:58:10 +08:00
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2018-11-22 16:01:24 +08:00
|
|
|
* Copyright (C) 1998 - 2018, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2012-07-20 01:58:10 +08:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2016-02-03 07:19:02 +08:00
|
|
|
* are also available at https://curl.haxx.se/docs/copyright.html.
|
2012-07-20 01:58:10 +08:00
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
|
|
|
***************************************************************************/
|
|
|
|
/* argv1 = URL
|
|
|
|
* argv2 = main auth type
|
|
|
|
* argv3 = second auth type
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "test.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "memdebug.h"
|
2012-07-20 01:58:10 +08:00
|
|
|
|
2012-11-26 23:23:02 +08:00
|
|
|
static CURLcode send_request(CURL *curl, const char *url, int seq,
|
|
|
|
long auth_scheme, const char *userpwd)
|
2012-07-20 01:58:10 +08:00
|
|
|
{
|
|
|
|
CURLcode res;
|
2016-04-01 16:14:06 +08:00
|
|
|
size_t len = strlen(url) + 4 + 1;
|
2016-11-23 14:53:24 +08:00
|
|
|
char *full_url = malloc(len);
|
2016-04-03 17:57:34 +08:00
|
|
|
if(!full_url) {
|
2012-07-20 01:58:10 +08:00
|
|
|
fprintf(stderr, "Not enough memory for full url\n");
|
2014-01-31 06:18:20 +08:00
|
|
|
return CURLE_OUT_OF_MEMORY;
|
2012-07-20 01:58:10 +08:00
|
|
|
}
|
|
|
|
|
2018-11-22 16:01:24 +08:00
|
|
|
msnprintf(full_url, len, "%s%04d", url, seq);
|
2012-11-06 05:02:56 +08:00
|
|
|
fprintf(stderr, "Sending new request %d to %s with credential %s "
|
|
|
|
"(auth %ld)\n", seq, full_url, userpwd, auth_scheme);
|
2012-07-20 01:58:10 +08:00
|
|
|
test_setopt(curl, CURLOPT_URL, full_url);
|
|
|
|
test_setopt(curl, CURLOPT_VERBOSE, 1L);
|
|
|
|
test_setopt(curl, CURLOPT_HEADER, 1L);
|
|
|
|
test_setopt(curl, CURLOPT_HTTPGET, 1L);
|
|
|
|
test_setopt(curl, CURLOPT_USERPWD, userpwd);
|
|
|
|
test_setopt(curl, CURLOPT_HTTPAUTH, auth_scheme);
|
|
|
|
|
|
|
|
res = curl_easy_perform(curl);
|
|
|
|
|
|
|
|
test_cleanup:
|
2012-11-06 05:02:56 +08:00
|
|
|
free(full_url);
|
2012-07-20 01:58:10 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2012-11-26 23:23:02 +08:00
|
|
|
static CURLcode send_wrong_password(CURL *curl, const char *url, int seq,
|
|
|
|
long auth_scheme)
|
2012-07-20 01:58:10 +08:00
|
|
|
{
|
|
|
|
return send_request(curl, url, seq, auth_scheme, "testuser:wrongpass");
|
|
|
|
}
|
|
|
|
|
2012-11-26 23:23:02 +08:00
|
|
|
static CURLcode send_right_password(CURL *curl, const char *url, int seq,
|
|
|
|
long auth_scheme)
|
2012-07-20 01:58:10 +08:00
|
|
|
{
|
|
|
|
return send_request(curl, url, seq, auth_scheme, "testuser:testpass");
|
|
|
|
}
|
|
|
|
|
|
|
|
static long parse_auth_name(const char *arg)
|
|
|
|
{
|
2016-04-03 17:57:34 +08:00
|
|
|
if(!arg)
|
2012-07-20 01:58:10 +08:00
|
|
|
return CURLAUTH_NONE;
|
2016-10-31 19:42:47 +08:00
|
|
|
if(curl_strequal(arg, "basic"))
|
2012-07-20 01:58:10 +08:00
|
|
|
return CURLAUTH_BASIC;
|
2016-10-31 19:42:47 +08:00
|
|
|
if(curl_strequal(arg, "digest"))
|
2012-07-20 01:58:10 +08:00
|
|
|
return CURLAUTH_DIGEST;
|
2016-10-31 19:42:47 +08:00
|
|
|
if(curl_strequal(arg, "ntlm"))
|
2012-07-20 01:58:10 +08:00
|
|
|
return CURLAUTH_NTLM;
|
|
|
|
return CURLAUTH_NONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
int test(char *url)
|
|
|
|
{
|
|
|
|
CURLcode res;
|
|
|
|
CURL *curl = NULL;
|
|
|
|
|
|
|
|
long main_auth_scheme = parse_auth_name(libtest_arg2);
|
|
|
|
long fallback_auth_scheme = parse_auth_name(libtest_arg3);
|
|
|
|
|
2016-04-03 17:57:34 +08:00
|
|
|
if(main_auth_scheme == CURLAUTH_NONE ||
|
2012-11-06 05:02:56 +08:00
|
|
|
fallback_auth_scheme == CURLAUTH_NONE) {
|
2012-07-20 01:58:10 +08:00
|
|
|
fprintf(stderr, "auth schemes not found on commandline\n");
|
2012-11-26 23:23:02 +08:00
|
|
|
return TEST_ERR_MAJOR_BAD;
|
2012-07-20 01:58:10 +08:00
|
|
|
}
|
|
|
|
|
2016-04-03 17:57:34 +08:00
|
|
|
if(curl_global_init(CURL_GLOBAL_ALL) != CURLE_OK) {
|
2012-07-20 01:58:10 +08:00
|
|
|
fprintf(stderr, "curl_global_init() failed\n");
|
2012-11-26 23:23:02 +08:00
|
|
|
return TEST_ERR_MAJOR_BAD;
|
2012-07-20 01:58:10 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Send wrong password, then right password */
|
|
|
|
|
2016-12-14 08:29:44 +08:00
|
|
|
curl = curl_easy_init();
|
|
|
|
if(!curl) {
|
2012-07-20 01:58:10 +08:00
|
|
|
fprintf(stderr, "curl_easy_init() failed\n");
|
2012-11-26 23:23:02 +08:00
|
|
|
curl_global_cleanup();
|
|
|
|
return TEST_ERR_MAJOR_BAD;
|
2012-07-20 01:58:10 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
res = send_wrong_password(curl, url, 100, main_auth_scheme);
|
2016-04-03 17:57:34 +08:00
|
|
|
if(res != CURLE_OK)
|
|
|
|
goto test_cleanup;
|
2012-11-26 23:23:02 +08:00
|
|
|
|
2012-07-20 01:58:10 +08:00
|
|
|
res = send_right_password(curl, url, 200, fallback_auth_scheme);
|
2016-04-03 17:57:34 +08:00
|
|
|
if(res != CURLE_OK)
|
|
|
|
goto test_cleanup;
|
2012-07-20 01:58:10 +08:00
|
|
|
|
|
|
|
curl_easy_cleanup(curl);
|
|
|
|
|
|
|
|
/* Send wrong password twice, then right password */
|
2016-12-14 08:29:44 +08:00
|
|
|
curl = curl_easy_init();
|
|
|
|
if(!curl) {
|
2012-07-20 01:58:10 +08:00
|
|
|
fprintf(stderr, "curl_easy_init() failed\n");
|
2012-11-26 23:23:02 +08:00
|
|
|
curl_global_cleanup();
|
|
|
|
return TEST_ERR_MAJOR_BAD;
|
2012-07-20 01:58:10 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
res = send_wrong_password(curl, url, 300, main_auth_scheme);
|
2016-04-03 17:57:34 +08:00
|
|
|
if(res != CURLE_OK)
|
|
|
|
goto test_cleanup;
|
2012-07-20 01:58:10 +08:00
|
|
|
|
|
|
|
res = send_wrong_password(curl, url, 400, fallback_auth_scheme);
|
2016-04-03 17:57:34 +08:00
|
|
|
if(res != CURLE_OK)
|
|
|
|
goto test_cleanup;
|
2012-11-26 23:23:02 +08:00
|
|
|
|
2012-07-20 01:58:10 +08:00
|
|
|
res = send_right_password(curl, url, 500, fallback_auth_scheme);
|
2016-04-03 17:57:34 +08:00
|
|
|
if(res != CURLE_OK)
|
|
|
|
goto test_cleanup;
|
2012-07-20 01:58:10 +08:00
|
|
|
|
|
|
|
test_cleanup:
|
|
|
|
|
2012-11-26 23:23:02 +08:00
|
|
|
curl_easy_cleanup(curl);
|
|
|
|
curl_global_cleanup();
|
2012-07-20 01:58:10 +08:00
|
|
|
|
|
|
|
return (int)res;
|
|
|
|
}
|