File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / curl / tests / libtest / libauthretry.c
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Wed Jun 3 10:01:16 2020 UTC (5 years ago) by misho
Branches: curl, MAIN
CVS tags: v7_70_0p4, HEAD
curl

    1: /***************************************************************************
    2:  *                                  _   _ ____  _
    3:  *  Project                     ___| | | |  _ \| |
    4:  *                             / __| | | | |_) | |
    5:  *                            | (__| |_| |  _ <| |___
    6:  *                             \___|\___/|_| \_\_____|
    7:  *
    8:  * Copyright (C) 1998 - 2018, Daniel Stenberg, <daniel@haxx.se>, et al.
    9:  *
   10:  * This software is licensed as described in the file COPYING, which
   11:  * you should have received as part of this distribution. The terms
   12:  * are also available at https://curl.haxx.se/docs/copyright.html.
   13:  *
   14:  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
   15:  * copies of the Software, and permit persons to whom the Software is
   16:  * furnished to do so, under the terms of the COPYING file.
   17:  *
   18:  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
   19:  * KIND, either express or implied.
   20:  *
   21:  ***************************************************************************/
   22: /* argv1 = URL
   23:  * argv2 = main auth type
   24:  * argv3 = second auth type
   25:  */
   26: 
   27: #include "test.h"
   28: #include "memdebug.h"
   29: 
   30: static CURLcode send_request(CURL *curl, const char *url, int seq,
   31:                              long auth_scheme, const char *userpwd)
   32: {
   33:   CURLcode res;
   34:   size_t len = strlen(url) + 4 + 1;
   35:   char *full_url = malloc(len);
   36:   if(!full_url) {
   37:     fprintf(stderr, "Not enough memory for full url\n");
   38:     return CURLE_OUT_OF_MEMORY;
   39:   }
   40: 
   41:   msnprintf(full_url, len, "%s%04d", url, seq);
   42:   fprintf(stderr, "Sending new request %d to %s with credential %s "
   43:           "(auth %ld)\n", seq, full_url, userpwd, auth_scheme);
   44:   test_setopt(curl, CURLOPT_URL, full_url);
   45:   test_setopt(curl, CURLOPT_VERBOSE, 1L);
   46:   test_setopt(curl, CURLOPT_HEADER, 1L);
   47:   test_setopt(curl, CURLOPT_HTTPGET, 1L);
   48:   test_setopt(curl, CURLOPT_USERPWD, userpwd);
   49:   test_setopt(curl, CURLOPT_HTTPAUTH, auth_scheme);
   50: 
   51:   res = curl_easy_perform(curl);
   52: 
   53: test_cleanup:
   54:   free(full_url);
   55:   return res;
   56: }
   57: 
   58: static CURLcode send_wrong_password(CURL *curl, const char *url, int seq,
   59:                                     long auth_scheme)
   60: {
   61:     return send_request(curl, url, seq, auth_scheme, "testuser:wrongpass");
   62: }
   63: 
   64: static CURLcode send_right_password(CURL *curl, const char *url, int seq,
   65:                                     long auth_scheme)
   66: {
   67:     return send_request(curl, url, seq, auth_scheme, "testuser:testpass");
   68: }
   69: 
   70: static long parse_auth_name(const char *arg)
   71: {
   72:   if(!arg)
   73:     return CURLAUTH_NONE;
   74:   if(curl_strequal(arg, "basic"))
   75:     return CURLAUTH_BASIC;
   76:   if(curl_strequal(arg, "digest"))
   77:     return CURLAUTH_DIGEST;
   78:   if(curl_strequal(arg, "ntlm"))
   79:     return CURLAUTH_NTLM;
   80:   return CURLAUTH_NONE;
   81: }
   82: 
   83: int test(char *url)
   84: {
   85:   CURLcode res;
   86:   CURL *curl = NULL;
   87: 
   88:   long main_auth_scheme = parse_auth_name(libtest_arg2);
   89:   long fallback_auth_scheme = parse_auth_name(libtest_arg3);
   90: 
   91:   if(main_auth_scheme == CURLAUTH_NONE ||
   92:       fallback_auth_scheme == CURLAUTH_NONE) {
   93:     fprintf(stderr, "auth schemes not found on commandline\n");
   94:     return TEST_ERR_MAJOR_BAD;
   95:   }
   96: 
   97:   if(curl_global_init(CURL_GLOBAL_ALL) != CURLE_OK) {
   98:     fprintf(stderr, "curl_global_init() failed\n");
   99:     return TEST_ERR_MAJOR_BAD;
  100:   }
  101: 
  102:   /* Send wrong password, then right password */
  103: 
  104:   curl = curl_easy_init();
  105:   if(!curl) {
  106:     fprintf(stderr, "curl_easy_init() failed\n");
  107:     curl_global_cleanup();
  108:     return TEST_ERR_MAJOR_BAD;
  109:   }
  110: 
  111:   res = send_wrong_password(curl, url, 100, main_auth_scheme);
  112:   if(res != CURLE_OK)
  113:     goto test_cleanup;
  114: 
  115:   res = send_right_password(curl, url, 200, fallback_auth_scheme);
  116:   if(res != CURLE_OK)
  117:     goto test_cleanup;
  118: 
  119:   curl_easy_cleanup(curl);
  120: 
  121:   /* Send wrong password twice, then right password */
  122:   curl = curl_easy_init();
  123:   if(!curl) {
  124:     fprintf(stderr, "curl_easy_init() failed\n");
  125:     curl_global_cleanup();
  126:     return TEST_ERR_MAJOR_BAD;
  127:   }
  128: 
  129:   res = send_wrong_password(curl, url, 300, main_auth_scheme);
  130:   if(res != CURLE_OK)
  131:     goto test_cleanup;
  132: 
  133:   res = send_wrong_password(curl, url, 400, fallback_auth_scheme);
  134:   if(res != CURLE_OK)
  135:     goto test_cleanup;
  136: 
  137:   res = send_right_password(curl, url, 500, fallback_auth_scheme);
  138:   if(res != CURLE_OK)
  139:     goto test_cleanup;
  140: 
  141: test_cleanup:
  142: 
  143:   curl_easy_cleanup(curl);
  144:   curl_global_cleanup();
  145: 
  146:   return (int)res;
  147: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>