• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /***************************************************************************
2  *                                  _   _ ____  _
3  *  Project                     ___| | | |  _ \| |
4  *                             / __| | | | |_) | |
5  *                            | (__| |_| |  _ <| |___
6  *                             \___|\___/|_| \_\_____|
7  *
8  * Copyright (C) 1998 - 2016, Daniel Stenberg, <daniel@haxx.se>, et al.
9  *
10  * This software is licensed as described in the file COPYING, which
11  * you should have received as part of this distribution. The terms
12  * are also available at https://curl.haxx.se/docs/copyright.html.
13  *
14  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15  * copies of the Software, and permit persons to whom the Software is
16  * furnished to do so, under the terms of the COPYING file.
17  *
18  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19  * KIND, either express or implied.
20  *
21  ***************************************************************************/
22 /* argv1 = URL
23  * argv2 = main auth type
24  * argv3 = second auth type
25  */
26 
27 #include "test.h"
28 #include "memdebug.h"
29 
send_request(CURL * curl,const char * url,int seq,long auth_scheme,const char * userpwd)30 static CURLcode send_request(CURL *curl, const char *url, int seq,
31                              long auth_scheme, const char *userpwd)
32 {
33   CURLcode res;
34   size_t len = strlen(url) + 4 + 1;
35   char *full_url = malloc(len);
36   if(!full_url) {
37     fprintf(stderr, "Not enough memory for full url\n");
38     return CURLE_OUT_OF_MEMORY;
39   }
40 
41   snprintf(full_url, len, "%s%04d", url, seq);
42   fprintf(stderr, "Sending new request %d to %s with credential %s "
43           "(auth %ld)\n", seq, full_url, userpwd, auth_scheme);
44   test_setopt(curl, CURLOPT_URL, full_url);
45   test_setopt(curl, CURLOPT_VERBOSE, 1L);
46   test_setopt(curl, CURLOPT_HEADER, 1L);
47   test_setopt(curl, CURLOPT_HTTPGET, 1L);
48   test_setopt(curl, CURLOPT_USERPWD, userpwd);
49   test_setopt(curl, CURLOPT_HTTPAUTH, auth_scheme);
50 
51   res = curl_easy_perform(curl);
52 
53 test_cleanup:
54   free(full_url);
55   return res;
56 }
57 
send_wrong_password(CURL * curl,const char * url,int seq,long auth_scheme)58 static CURLcode send_wrong_password(CURL *curl, const char *url, int seq,
59                                     long auth_scheme)
60 {
61     return send_request(curl, url, seq, auth_scheme, "testuser:wrongpass");
62 }
63 
send_right_password(CURL * curl,const char * url,int seq,long auth_scheme)64 static CURLcode send_right_password(CURL *curl, const char *url, int seq,
65                                     long auth_scheme)
66 {
67     return send_request(curl, url, seq, auth_scheme, "testuser:testpass");
68 }
69 
parse_auth_name(const char * arg)70 static long parse_auth_name(const char *arg)
71 {
72   if(!arg)
73     return CURLAUTH_NONE;
74   if(curl_strequal(arg, "basic"))
75     return CURLAUTH_BASIC;
76   if(curl_strequal(arg, "digest"))
77     return CURLAUTH_DIGEST;
78   if(curl_strequal(arg, "ntlm"))
79     return CURLAUTH_NTLM;
80   return CURLAUTH_NONE;
81 }
82 
test(char * url)83 int test(char *url)
84 {
85   CURLcode res;
86   CURL *curl = NULL;
87 
88   long main_auth_scheme = parse_auth_name(libtest_arg2);
89   long fallback_auth_scheme = parse_auth_name(libtest_arg3);
90 
91   if(main_auth_scheme == CURLAUTH_NONE ||
92       fallback_auth_scheme == CURLAUTH_NONE) {
93     fprintf(stderr, "auth schemes not found on commandline\n");
94     return TEST_ERR_MAJOR_BAD;
95   }
96 
97   if(curl_global_init(CURL_GLOBAL_ALL) != CURLE_OK) {
98     fprintf(stderr, "curl_global_init() failed\n");
99     return TEST_ERR_MAJOR_BAD;
100   }
101 
102   /* Send wrong password, then right password */
103 
104   if((curl = curl_easy_init()) == NULL) {
105     fprintf(stderr, "curl_easy_init() failed\n");
106     curl_global_cleanup();
107     return TEST_ERR_MAJOR_BAD;
108   }
109 
110   res = send_wrong_password(curl, url, 100, main_auth_scheme);
111   if(res != CURLE_OK)
112     goto test_cleanup;
113   curl_easy_reset(curl);
114 
115   res = send_right_password(curl, url, 200, fallback_auth_scheme);
116   if(res != CURLE_OK)
117     goto test_cleanup;
118   curl_easy_reset(curl);
119 
120   curl_easy_cleanup(curl);
121 
122   /* Send wrong password twice, then right password */
123 
124   if((curl = curl_easy_init()) == NULL) {
125     fprintf(stderr, "curl_easy_init() failed\n");
126     curl_global_cleanup();
127     return TEST_ERR_MAJOR_BAD;
128   }
129 
130   res = send_wrong_password(curl, url, 300, main_auth_scheme);
131   if(res != CURLE_OK)
132     goto test_cleanup;
133   curl_easy_reset(curl);
134 
135   res = send_wrong_password(curl, url, 400, fallback_auth_scheme);
136   if(res != CURLE_OK)
137     goto test_cleanup;
138   curl_easy_reset(curl);
139 
140   res = send_right_password(curl, url, 500, fallback_auth_scheme);
141   if(res != CURLE_OK)
142     goto test_cleanup;
143   curl_easy_reset(curl);
144 
145 test_cleanup:
146 
147   curl_easy_cleanup(curl);
148   curl_global_cleanup();
149 
150   return (int)res;
151 }
152 
153