1 /***************************************************************************
2 * _ _ ____ _
3 * Project ___| | | | _ \| |
4 * / __| | | | |_) | |
5 * | (__| |_| | _ <| |___
6 * \___|\___/|_| \_\_____|
7 *
8 * Copyright (C) 1998 - 2018, Daniel Stenberg, <daniel@haxx.se>, et al.
9 *
10 * This software is licensed as described in the file COPYING, which
11 * you should have received as part of this distribution. The terms
12 * are also available at https://curl.haxx.se/docs/copyright.html.
13 *
14 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15 * copies of the Software, and permit persons to whom the Software is
16 * furnished to do so, under the terms of the COPYING file.
17 *
18 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19 * KIND, either express or implied.
20 *
21 ***************************************************************************/
22 #include "curlcheck.h"
23
24 #include "tool_cfgable.h"
25 #include "tool_doswin.h"
26
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30
31 #include "memdebug.h" /* LAST include file */
32
unit_setup(void)33 static CURLcode unit_setup(void)
34 {
35 return CURLE_OK;
36 }
37
unit_stop(void)38 static void unit_stop(void)
39 {
40
41 }
42
43 #if defined(MSDOS) || defined(WIN32)
44
getflagstr(int flags)45 static char *getflagstr(int flags)
46 {
47 char *buf = malloc(256);
48 if(buf) {
49 msnprintf(buf, 256, "%s,%s,%s,%s",
50 ((flags & SANITIZE_ALLOW_COLONS) ?
51 "SANITIZE_ALLOW_COLONS" : ""),
52 ((flags & SANITIZE_ALLOW_PATH) ?
53 "SANITIZE_ALLOW_PATH" : ""),
54 ((flags & SANITIZE_ALLOW_RESERVED) ?
55 "SANITIZE_ALLOW_RESERVED" : ""),
56 ((flags & SANITIZE_ALLOW_TRUNCATE) ?
57 "SANITIZE_ALLOW_TRUNCATE" : ""));
58 }
59 return buf;
60 }
61
getcurlcodestr(int cc)62 static char *getcurlcodestr(int cc)
63 {
64 char *buf = malloc(256);
65 if(buf) {
66 msnprintf(buf, 256, "%s (%d)",
67 (cc == SANITIZE_ERR_OK ? "SANITIZE_ERR_OK" :
68 cc == SANITIZE_ERR_BAD_ARGUMENT ? "SANITIZE_ERR_BAD_ARGUMENT" :
69 cc == SANITIZE_ERR_INVALID_PATH ? "SANITIZE_ERR_INVALID_PATH" :
70 cc == SANITIZE_ERR_OUT_OF_MEMORY ? "SANITIZE_ERR_OUT_OF_MEMORY":
71 "unexpected error code - add name"),
72 cc);
73 }
74 return buf;
75 }
76
77 struct data {
78 const char *input;
79 int flags;
80 const char *expected_output;
81 CURLcode expected_result;
82 };
83
84 UNITTEST_START
85
86 { /* START sanitize_file_name */
87 struct data data[] = {
88 { "", 0,
89 "", SANITIZE_ERR_OK
90 },
91 { "normal filename", 0,
92 "normal filename", SANITIZE_ERR_OK
93 },
94 { "control\tchar", 0,
95 "control_char", SANITIZE_ERR_OK
96 },
97 { "banned*char", 0,
98 "banned_char", SANITIZE_ERR_OK
99 },
100 { "f:foo", 0,
101 "f_foo", SANITIZE_ERR_OK
102 },
103 { "f:foo", SANITIZE_ALLOW_COLONS,
104 "f:foo", SANITIZE_ERR_OK
105 },
106 { "f:foo", SANITIZE_ALLOW_PATH,
107 "f:foo", SANITIZE_ERR_OK
108 },
109 { "f:\\foo", 0,
110 "f__foo", SANITIZE_ERR_OK
111 },
112 { "f:\\foo", SANITIZE_ALLOW_PATH,
113 "f:\\foo", SANITIZE_ERR_OK
114 },
115 { "f:/foo", 0,
116 "f__foo", SANITIZE_ERR_OK
117 },
118 { "f:/foo", SANITIZE_ALLOW_PATH,
119 "f:/foo", SANITIZE_ERR_OK
120 },
121 #ifndef MSDOS
122 { "\\\\?\\C:\\foo", SANITIZE_ALLOW_PATH,
123 "\\\\?\\C:\\foo", SANITIZE_ERR_OK
124 },
125 { "\\\\?\\C:\\foo", 0,
126 "____C__foo", SANITIZE_ERR_OK
127 },
128 #endif
129 { "foo:bar", 0,
130 "foo_bar", SANITIZE_ERR_OK
131 },
132 { "foo|<>/bar\\\":?*baz", 0,
133 "foo____bar_____baz", SANITIZE_ERR_OK
134 },
135 { "f:foo::$DATA", 0,
136 "f_foo__$DATA", SANITIZE_ERR_OK
137 },
138 { "con . air", 0,
139 "con _ air", SANITIZE_ERR_OK
140 },
141 { "con.air", 0,
142 "con_air", SANITIZE_ERR_OK
143 },
144 { "con:/x", 0,
145 "con__x", SANITIZE_ERR_OK
146 },
147 { "file . . . . .. .", 0,
148 "file", SANITIZE_ERR_OK
149 },
150 { "foo . . ? . . ", 0,
151 "foo . . _", SANITIZE_ERR_OK
152 },
153 { "com1", 0,
154 "_com1", SANITIZE_ERR_OK
155 },
156 { "com1", SANITIZE_ALLOW_RESERVED,
157 "com1", SANITIZE_ERR_OK
158 },
159 { "f:\\com1", 0,
160 "f__com1", SANITIZE_ERR_OK
161 },
162 { "f:\\com1", SANITIZE_ALLOW_PATH,
163 "f:\\_com1", SANITIZE_ERR_OK
164 },
165 { "f:\\com1", SANITIZE_ALLOW_RESERVED,
166 "f__com1", SANITIZE_ERR_OK
167 },
168 { "f:\\com1", SANITIZE_ALLOW_RESERVED | SANITIZE_ALLOW_COLONS,
169 "f:_com1", SANITIZE_ERR_OK
170 },
171 { "f:\\com1", SANITIZE_ALLOW_RESERVED | SANITIZE_ALLOW_PATH,
172 "f:\\com1", SANITIZE_ERR_OK
173 },
174 { "com1:\\com1", SANITIZE_ALLOW_PATH,
175 "_com1:\\_com1", SANITIZE_ERR_OK
176 },
177 { "com1:\\com1", SANITIZE_ALLOW_RESERVED | SANITIZE_ALLOW_PATH,
178 "com1:\\com1", SANITIZE_ERR_OK
179 },
180 { "com1:\\com1", SANITIZE_ALLOW_RESERVED,
181 "com1__com1", SANITIZE_ERR_OK
182 },
183 #ifndef MSDOS
184 { "\\com1", SANITIZE_ALLOW_PATH,
185 "\\_com1", SANITIZE_ERR_OK
186 },
187 { "\\\\com1", SANITIZE_ALLOW_PATH,
188 "\\\\com1", SANITIZE_ERR_OK
189 },
190 { "\\\\?\\C:\\com1", SANITIZE_ALLOW_PATH,
191 "\\\\?\\C:\\com1", SANITIZE_ERR_OK
192 },
193 #endif
194 { "CoM1", 0,
195 "_CoM1", SANITIZE_ERR_OK
196 },
197 { "CoM1", SANITIZE_ALLOW_RESERVED,
198 "CoM1", SANITIZE_ERR_OK
199 },
200 { "COM56", 0,
201 "COM56", SANITIZE_ERR_OK
202 },
203 /* At the moment we expect a maximum path length of 259. I assume MSDOS
204 has variable max path lengths depending on compiler that are shorter
205 so currently these "good" truncate tests won't run on MSDOS */
206 #ifndef MSDOS
207 { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
208 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
209 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
210 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
211 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
212 "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
213 SANITIZE_ALLOW_TRUNCATE,
214 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
215 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
216 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
217 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
218 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
219 "FFFFF", SANITIZE_ERR_OK
220 },
221 { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
222 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
223 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
224 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
225 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
226 "FFF\\FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
227 SANITIZE_ALLOW_TRUNCATE | SANITIZE_ALLOW_PATH,
228 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
229 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
230 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
231 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
232 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
233 "FFF\\FFFFF", SANITIZE_ERR_OK
234 },
235 { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
236 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
237 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
238 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
239 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
240 "FFF\\FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
241 SANITIZE_ALLOW_TRUNCATE,
242 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
243 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
244 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
245 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
246 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
247 "FFF_F", SANITIZE_ERR_OK
248 },
249 #endif /* !MSDOS */
250 { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
251 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
252 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
253 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
254 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
255 "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
256 0,
257 NULL, SANITIZE_ERR_INVALID_PATH
258 },
259 { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
260 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
261 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
262 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
263 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
264 "FFFF\\FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
265 SANITIZE_ALLOW_TRUNCATE,
266 NULL, SANITIZE_ERR_INVALID_PATH
267 },
268 { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
269 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
270 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
271 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
272 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
273 "FFFFFFFFFFFFFFFFFFFFFFFFF\\FFFFFFFFFFFFFFFFFFFFFFFF",
274 SANITIZE_ALLOW_TRUNCATE | SANITIZE_ALLOW_PATH,
275 NULL, SANITIZE_ERR_INVALID_PATH
276 },
277 { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
278 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
279 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
280 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
281 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
282 "FFF\\FFFFFFFFFFFFFFFFFFFFF:FFFFFFFFFFFFFFFFFFFFFFFF",
283 SANITIZE_ALLOW_TRUNCATE | SANITIZE_ALLOW_PATH,
284 NULL, SANITIZE_ERR_INVALID_PATH
285 },
286 { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
287 "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
288 "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
289 "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
290 "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
291 "FF\\F:FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
292 SANITIZE_ALLOW_TRUNCATE | SANITIZE_ALLOW_PATH,
293 NULL, SANITIZE_ERR_INVALID_PATH
294 },
295 { NULL, 0,
296 NULL, SANITIZE_ERR_BAD_ARGUMENT
297 },
298 };
299
300 size_t i;
301
302 for(i = 0; i < sizeof(data) / sizeof(data[0]); ++i) {
303 char *output = NULL;
304 char *flagstr = NULL;
305 char *received_ccstr = NULL;
306 char *expected_ccstr = NULL;
307
308 CURLcode res = sanitize_file_name(&output, data[i].input, data[i].flags);
309
310 if(res == data[i].expected_result &&
311 ((!output && !data[i].expected_output) ||
312 (output && data[i].expected_output &&
313 !strcmp(output, data[i].expected_output)))) { /* OK */
314 free(output);
315 continue;
316 }
317
318 flagstr = getflagstr(data[i].flags);
319 abort_unless(flagstr, "out of memory");
320 received_ccstr = getcurlcodestr(res);
321 abort_unless(received_ccstr, "out of memory");
322 expected_ccstr = getcurlcodestr(data[i].expected_result);
323 abort_unless(expected_ccstr, "out of memory");
324
325 unitfail++;
326 fprintf(stderr, "\n"
327 "%s:%d sanitize_file_name failed.\n"
328 "input: %s\n"
329 "flags: %s\n"
330 "output: %s\n"
331 "result: %s\n"
332 "expected output: %s\n"
333 "expected result: %s\n",
334 __FILE__, __LINE__,
335 data[i].input,
336 flagstr,
337 (output ? output : "(null)"),
338 received_ccstr,
339 (data[i].expected_output ? data[i].expected_output : "(null)"),
340 expected_ccstr);
341
342 free(output);
343 free(flagstr);
344 free(received_ccstr);
345 free(expected_ccstr);
346 }
347 } /* END sanitize_file_name */
348
349 #else
350 UNITTEST_START
351
352 {
353 fprintf(stderr, "Skipped test not for this platform\n");
354 }
355 #endif /* MSDOS || WIN32 */
356
357 UNITTEST_STOP
358