Annotation of embedaddon/curl/tests/libtest/libauthretry.c, revision 1.1.1.1
1.1 misho 1: /***************************************************************************
2: * _ _ ____ _
3: * Project ___| | | | _ \| |
4: * / __| | | | |_) | |
5: * | (__| |_| | _ <| |___
6: * \___|\___/|_| \_\_____|
7: *
8: * Copyright (C) 1998 - 2018, Daniel Stenberg, <daniel@haxx.se>, et al.
9: *
10: * This software is licensed as described in the file COPYING, which
11: * you should have received as part of this distribution. The terms
12: * are also available at https://curl.haxx.se/docs/copyright.html.
13: *
14: * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15: * copies of the Software, and permit persons to whom the Software is
16: * furnished to do so, under the terms of the COPYING file.
17: *
18: * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19: * KIND, either express or implied.
20: *
21: ***************************************************************************/
22: /* argv1 = URL
23: * argv2 = main auth type
24: * argv3 = second auth type
25: */
26:
27: #include "test.h"
28: #include "memdebug.h"
29:
30: static CURLcode send_request(CURL *curl, const char *url, int seq,
31: long auth_scheme, const char *userpwd)
32: {
33: CURLcode res;
34: size_t len = strlen(url) + 4 + 1;
35: char *full_url = malloc(len);
36: if(!full_url) {
37: fprintf(stderr, "Not enough memory for full url\n");
38: return CURLE_OUT_OF_MEMORY;
39: }
40:
41: msnprintf(full_url, len, "%s%04d", url, seq);
42: fprintf(stderr, "Sending new request %d to %s with credential %s "
43: "(auth %ld)\n", seq, full_url, userpwd, auth_scheme);
44: test_setopt(curl, CURLOPT_URL, full_url);
45: test_setopt(curl, CURLOPT_VERBOSE, 1L);
46: test_setopt(curl, CURLOPT_HEADER, 1L);
47: test_setopt(curl, CURLOPT_HTTPGET, 1L);
48: test_setopt(curl, CURLOPT_USERPWD, userpwd);
49: test_setopt(curl, CURLOPT_HTTPAUTH, auth_scheme);
50:
51: res = curl_easy_perform(curl);
52:
53: test_cleanup:
54: free(full_url);
55: return res;
56: }
57:
58: static CURLcode send_wrong_password(CURL *curl, const char *url, int seq,
59: long auth_scheme)
60: {
61: return send_request(curl, url, seq, auth_scheme, "testuser:wrongpass");
62: }
63:
64: static CURLcode send_right_password(CURL *curl, const char *url, int seq,
65: long auth_scheme)
66: {
67: return send_request(curl, url, seq, auth_scheme, "testuser:testpass");
68: }
69:
70: static long parse_auth_name(const char *arg)
71: {
72: if(!arg)
73: return CURLAUTH_NONE;
74: if(curl_strequal(arg, "basic"))
75: return CURLAUTH_BASIC;
76: if(curl_strequal(arg, "digest"))
77: return CURLAUTH_DIGEST;
78: if(curl_strequal(arg, "ntlm"))
79: return CURLAUTH_NTLM;
80: return CURLAUTH_NONE;
81: }
82:
83: int test(char *url)
84: {
85: CURLcode res;
86: CURL *curl = NULL;
87:
88: long main_auth_scheme = parse_auth_name(libtest_arg2);
89: long fallback_auth_scheme = parse_auth_name(libtest_arg3);
90:
91: if(main_auth_scheme == CURLAUTH_NONE ||
92: fallback_auth_scheme == CURLAUTH_NONE) {
93: fprintf(stderr, "auth schemes not found on commandline\n");
94: return TEST_ERR_MAJOR_BAD;
95: }
96:
97: if(curl_global_init(CURL_GLOBAL_ALL) != CURLE_OK) {
98: fprintf(stderr, "curl_global_init() failed\n");
99: return TEST_ERR_MAJOR_BAD;
100: }
101:
102: /* Send wrong password, then right password */
103:
104: curl = curl_easy_init();
105: if(!curl) {
106: fprintf(stderr, "curl_easy_init() failed\n");
107: curl_global_cleanup();
108: return TEST_ERR_MAJOR_BAD;
109: }
110:
111: res = send_wrong_password(curl, url, 100, main_auth_scheme);
112: if(res != CURLE_OK)
113: goto test_cleanup;
114:
115: res = send_right_password(curl, url, 200, fallback_auth_scheme);
116: if(res != CURLE_OK)
117: goto test_cleanup;
118:
119: curl_easy_cleanup(curl);
120:
121: /* Send wrong password twice, then right password */
122: curl = curl_easy_init();
123: if(!curl) {
124: fprintf(stderr, "curl_easy_init() failed\n");
125: curl_global_cleanup();
126: return TEST_ERR_MAJOR_BAD;
127: }
128:
129: res = send_wrong_password(curl, url, 300, main_auth_scheme);
130: if(res != CURLE_OK)
131: goto test_cleanup;
132:
133: res = send_wrong_password(curl, url, 400, fallback_auth_scheme);
134: if(res != CURLE_OK)
135: goto test_cleanup;
136:
137: res = send_right_password(curl, url, 500, fallback_auth_scheme);
138: if(res != CURLE_OK)
139: goto test_cleanup;
140:
141: test_cleanup:
142:
143: curl_easy_cleanup(curl);
144: curl_global_cleanup();
145:
146: return (int)res;
147: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>