Home | History | Annotate | Download | only in libtest
      1 /***************************************************************************
      2  *                                  _   _ ____  _
      3  *  Project                     ___| | | |  _ \| |
      4  *                             / __| | | | |_) | |
      5  *                            | (__| |_| |  _ <| |___
      6  *                             \___|\___/|_| \_\_____|
      7  *
      8  * Copyright (C) 1998 - 2016, Daniel Stenberg, <daniel (at) haxx.se>, et al.
      9  *
     10  * This software is licensed as described in the file COPYING, which
     11  * you should have received as part of this distribution. The terms
     12  * are also available at https://curl.haxx.se/docs/copyright.html.
     13  *
     14  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
     15  * copies of the Software, and permit persons to whom the Software is
     16  * furnished to do so, under the terms of the COPYING file.
     17  *
     18  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
     19  * KIND, either express or implied.
     20  *
     21  ***************************************************************************/
     22 /* argv1 = URL
     23  * argv2 = main auth type
     24  * argv3 = second auth type
     25  */
     26 
     27 #include "test.h"
     28 #include "memdebug.h"
     29 
     30 static CURLcode send_request(CURL *curl, const char *url, int seq,
     31                              long auth_scheme, const char *userpwd)
     32 {
     33   CURLcode res;
     34   size_t len = strlen(url) + 4 + 1;
     35   char *full_url = malloc(len);
     36   if(!full_url) {
     37     fprintf(stderr, "Not enough memory for full url\n");
     38     return CURLE_OUT_OF_MEMORY;
     39   }
     40 
     41   snprintf(full_url, len, "%s%04d", url, seq);
     42   fprintf(stderr, "Sending new request %d to %s with credential %s "
     43           "(auth %ld)\n", seq, full_url, userpwd, auth_scheme);
     44   test_setopt(curl, CURLOPT_URL, full_url);
     45   test_setopt(curl, CURLOPT_VERBOSE, 1L);
     46   test_setopt(curl, CURLOPT_HEADER, 1L);
     47   test_setopt(curl, CURLOPT_HTTPGET, 1L);
     48   test_setopt(curl, CURLOPT_USERPWD, userpwd);
     49   test_setopt(curl, CURLOPT_HTTPAUTH, auth_scheme);
     50 
     51   res = curl_easy_perform(curl);
     52 
     53 test_cleanup:
     54   free(full_url);
     55   return res;
     56 }
     57 
     58 static CURLcode send_wrong_password(CURL *curl, const char *url, int seq,
     59                                     long auth_scheme)
     60 {
     61     return send_request(curl, url, seq, auth_scheme, "testuser:wrongpass");
     62 }
     63 
     64 static CURLcode send_right_password(CURL *curl, const char *url, int seq,
     65                                     long auth_scheme)
     66 {
     67     return send_request(curl, url, seq, auth_scheme, "testuser:testpass");
     68 }
     69 
     70 static long parse_auth_name(const char *arg)
     71 {
     72   if(!arg)
     73     return CURLAUTH_NONE;
     74   if(curl_strequal(arg, "basic"))
     75     return CURLAUTH_BASIC;
     76   if(curl_strequal(arg, "digest"))
     77     return CURLAUTH_DIGEST;
     78   if(curl_strequal(arg, "ntlm"))
     79     return CURLAUTH_NTLM;
     80   return CURLAUTH_NONE;
     81 }
     82 
     83 int test(char *url)
     84 {
     85   CURLcode res;
     86   CURL *curl = NULL;
     87 
     88   long main_auth_scheme = parse_auth_name(libtest_arg2);
     89   long fallback_auth_scheme = parse_auth_name(libtest_arg3);
     90 
     91   if(main_auth_scheme == CURLAUTH_NONE ||
     92       fallback_auth_scheme == CURLAUTH_NONE) {
     93     fprintf(stderr, "auth schemes not found on commandline\n");
     94     return TEST_ERR_MAJOR_BAD;
     95   }
     96 
     97   if(curl_global_init(CURL_GLOBAL_ALL) != CURLE_OK) {
     98     fprintf(stderr, "curl_global_init() failed\n");
     99     return TEST_ERR_MAJOR_BAD;
    100   }
    101 
    102   /* Send wrong password, then right password */
    103 
    104   curl = curl_easy_init();
    105   if(!curl) {
    106     fprintf(stderr, "curl_easy_init() failed\n");
    107     curl_global_cleanup();
    108     return TEST_ERR_MAJOR_BAD;
    109   }
    110 
    111   res = send_wrong_password(curl, url, 100, main_auth_scheme);
    112   if(res != CURLE_OK)
    113     goto test_cleanup;
    114 
    115   res = send_right_password(curl, url, 200, fallback_auth_scheme);
    116   if(res != CURLE_OK)
    117     goto test_cleanup;
    118 
    119   curl_easy_cleanup(curl);
    120 
    121   /* Send wrong password twice, then right password */
    122   curl = curl_easy_init();
    123   if(!curl) {
    124     fprintf(stderr, "curl_easy_init() failed\n");
    125     curl_global_cleanup();
    126     return TEST_ERR_MAJOR_BAD;
    127   }
    128 
    129   res = send_wrong_password(curl, url, 300, main_auth_scheme);
    130   if(res != CURLE_OK)
    131     goto test_cleanup;
    132 
    133   res = send_wrong_password(curl, url, 400, fallback_auth_scheme);
    134   if(res != CURLE_OK)
    135     goto test_cleanup;
    136 
    137   res = send_right_password(curl, url, 500, fallback_auth_scheme);
    138   if(res != CURLE_OK)
    139     goto test_cleanup;
    140 
    141 test_cleanup:
    142 
    143   curl_easy_cleanup(curl);
    144   curl_global_cleanup();
    145 
    146   return (int)res;
    147 }
    148 
    149