1 /*************************************************************************** 2 * _ _ ____ _ 3 * Project ___| | | | _ \| | 4 * / __| | | | |_) | | 5 * | (__| |_| | _ <| |___ 6 * \___|\___/|_| \_\_____| 7 * 8 * Copyright (C) 1998 - 2016, Daniel Stenberg, <daniel (at) haxx.se>, et al. 9 * 10 * This software is licensed as described in the file COPYING, which 11 * you should have received as part of this distribution. The terms 12 * are also available at https://curl.haxx.se/docs/copyright.html. 13 * 14 * You may opt to use, copy, modify, merge, publish, distribute and/or sell 15 * copies of the Software, and permit persons to whom the Software is 16 * furnished to do so, under the terms of the COPYING file. 17 * 18 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY 19 * KIND, either express or implied. 20 * 21 ***************************************************************************/ 22 /* argv1 = URL 23 * argv2 = main auth type 24 * argv3 = second auth type 25 */ 26 27 #include "test.h" 28 #include "strequal.h" 29 #include "memdebug.h" 30 31 static CURLcode send_request(CURL *curl, const char *url, int seq, 32 long auth_scheme, const char *userpwd) 33 { 34 CURLcode res; 35 size_t len = strlen(url) + 4 + 1; 36 char* full_url = malloc(len); 37 if(!full_url) { 38 fprintf(stderr, "Not enough memory for full url\n"); 39 return CURLE_OUT_OF_MEMORY; 40 } 41 42 snprintf(full_url, len, "%s%04d", url, seq); 43 fprintf(stderr, "Sending new request %d to %s with credential %s " 44 "(auth %ld)\n", seq, full_url, userpwd, auth_scheme); 45 test_setopt(curl, CURLOPT_URL, full_url); 46 test_setopt(curl, CURLOPT_VERBOSE, 1L); 47 test_setopt(curl, CURLOPT_HEADER, 1L); 48 test_setopt(curl, CURLOPT_HTTPGET, 1L); 49 test_setopt(curl, CURLOPT_USERPWD, userpwd); 50 test_setopt(curl, CURLOPT_HTTPAUTH, auth_scheme); 51 52 res = curl_easy_perform(curl); 53 54 test_cleanup: 55 free(full_url); 56 return res; 57 } 58 59 static CURLcode send_wrong_password(CURL *curl, const char *url, int seq, 60 long auth_scheme) 61 { 62 return send_request(curl, url, seq, auth_scheme, "testuser:wrongpass"); 63 } 64 65 static CURLcode send_right_password(CURL *curl, const char *url, int seq, 66 long auth_scheme) 67 { 68 return send_request(curl, url, seq, auth_scheme, "testuser:testpass"); 69 } 70 71 static long parse_auth_name(const char *arg) 72 { 73 if(!arg) 74 return CURLAUTH_NONE; 75 if(strequal(arg, "basic")) 76 return CURLAUTH_BASIC; 77 if(strequal(arg, "digest")) 78 return CURLAUTH_DIGEST; 79 if(strequal(arg, "ntlm")) 80 return CURLAUTH_NTLM; 81 return CURLAUTH_NONE; 82 } 83 84 int test(char *url) 85 { 86 CURLcode res; 87 CURL *curl = NULL; 88 89 long main_auth_scheme = parse_auth_name(libtest_arg2); 90 long fallback_auth_scheme = parse_auth_name(libtest_arg3); 91 92 if(main_auth_scheme == CURLAUTH_NONE || 93 fallback_auth_scheme == CURLAUTH_NONE) { 94 fprintf(stderr, "auth schemes not found on commandline\n"); 95 return TEST_ERR_MAJOR_BAD; 96 } 97 98 if(curl_global_init(CURL_GLOBAL_ALL) != CURLE_OK) { 99 fprintf(stderr, "curl_global_init() failed\n"); 100 return TEST_ERR_MAJOR_BAD; 101 } 102 103 /* Send wrong password, then right password */ 104 105 if((curl = curl_easy_init()) == NULL) { 106 fprintf(stderr, "curl_easy_init() failed\n"); 107 curl_global_cleanup(); 108 return TEST_ERR_MAJOR_BAD; 109 } 110 111 res = send_wrong_password(curl, url, 100, main_auth_scheme); 112 if(res != CURLE_OK) 113 goto test_cleanup; 114 curl_easy_reset(curl); 115 116 res = send_right_password(curl, url, 200, fallback_auth_scheme); 117 if(res != CURLE_OK) 118 goto test_cleanup; 119 curl_easy_reset(curl); 120 121 curl_easy_cleanup(curl); 122 123 /* Send wrong password twice, then right password */ 124 125 if((curl = curl_easy_init()) == NULL) { 126 fprintf(stderr, "curl_easy_init() failed\n"); 127 curl_global_cleanup(); 128 return TEST_ERR_MAJOR_BAD; 129 } 130 131 res = send_wrong_password(curl, url, 300, main_auth_scheme); 132 if(res != CURLE_OK) 133 goto test_cleanup; 134 curl_easy_reset(curl); 135 136 res = send_wrong_password(curl, url, 400, fallback_auth_scheme); 137 if(res != CURLE_OK) 138 goto test_cleanup; 139 curl_easy_reset(curl); 140 141 res = send_right_password(curl, url, 500, fallback_auth_scheme); 142 if(res != CURLE_OK) 143 goto test_cleanup; 144 curl_easy_reset(curl); 145 146 test_cleanup: 147 148 curl_easy_cleanup(curl); 149 curl_global_cleanup(); 150 151 return (int)res; 152 } 153 154