/*************************************************************************** * _ _ ____ _ * Project ___| | | | _ \| | * / __| | | | |_) | | * | (__| |_| | _ <| |___ * \___|\___/|_| \_\_____| * * Copyright (C) 1998 - 2016, Daniel Stenberg, <daniel@haxx.se>, et al. * * This software is licensed as described in the file COPYING, which * you should have received as part of this distribution. The terms * are also available at https://curl.haxx.se/docs/copyright.html. * * You may opt to use, copy, modify, merge, publish, distribute and/or sell * copies of the Software, and permit persons to whom the Software is * furnished to do so, under the terms of the COPYING file. * * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY * KIND, either express or implied. * ***************************************************************************/ /* argv1 = URL * argv2 = main auth type * argv3 = second auth type */ #include "test.h" #include "memdebug.h" static CURLcode send_request(CURL *curl, const char *url, int seq, long auth_scheme, const char *userpwd) { CURLcode res; size_t len = strlen(url) + 4 + 1; char *full_url = malloc(len); if(!full_url) { fprintf(stderr, "Not enough memory for full url\n"); return CURLE_OUT_OF_MEMORY; } snprintf(full_url, len, "%s%04d", url, seq); fprintf(stderr, "Sending new request %d to %s with credential %s " "(auth %ld)\n", seq, full_url, userpwd, auth_scheme); test_setopt(curl, CURLOPT_URL, full_url); test_setopt(curl, CURLOPT_VERBOSE, 1L); test_setopt(curl, CURLOPT_HEADER, 1L); test_setopt(curl, CURLOPT_HTTPGET, 1L); test_setopt(curl, CURLOPT_USERPWD, userpwd); test_setopt(curl, CURLOPT_HTTPAUTH, auth_scheme); res = curl_easy_perform(curl); test_cleanup: free(full_url); return res; } static CURLcode send_wrong_password(CURL *curl, const char *url, int seq, long auth_scheme) { return send_request(curl, url, seq, auth_scheme, "testuser:wrongpass"); } static CURLcode send_right_password(CURL *curl, const char *url, int seq, long auth_scheme) { return send_request(curl, url, seq, auth_scheme, "testuser:testpass"); } static long parse_auth_name(const char *arg) { if(!arg) return CURLAUTH_NONE; if(curl_strequal(arg, "basic")) return CURLAUTH_BASIC; if(curl_strequal(arg, "digest")) return CURLAUTH_DIGEST; if(curl_strequal(arg, "ntlm")) return CURLAUTH_NTLM; return CURLAUTH_NONE; } int test(char *url) { CURLcode res; CURL *curl = NULL; long main_auth_scheme = parse_auth_name(libtest_arg2); long fallback_auth_scheme = parse_auth_name(libtest_arg3); if(main_auth_scheme == CURLAUTH_NONE || fallback_auth_scheme == CURLAUTH_NONE) { fprintf(stderr, "auth schemes not found on commandline\n"); return TEST_ERR_MAJOR_BAD; } if(curl_global_init(CURL_GLOBAL_ALL) != CURLE_OK) { fprintf(stderr, "curl_global_init() failed\n"); return TEST_ERR_MAJOR_BAD; } /* Send wrong password, then right password */ curl = curl_easy_init(); if(!curl) { fprintf(stderr, "curl_easy_init() failed\n"); curl_global_cleanup(); return TEST_ERR_MAJOR_BAD; } res = send_wrong_password(curl, url, 100, main_auth_scheme); if(res != CURLE_OK) goto test_cleanup; res = send_right_password(curl, url, 200, fallback_auth_scheme); if(res != CURLE_OK) goto test_cleanup; curl_easy_cleanup(curl); /* Send wrong password twice, then right password */ curl = curl_easy_init(); if(!curl) { fprintf(stderr, "curl_easy_init() failed\n"); curl_global_cleanup(); return TEST_ERR_MAJOR_BAD; } res = send_wrong_password(curl, url, 300, main_auth_scheme); if(res != CURLE_OK) goto test_cleanup; res = send_wrong_password(curl, url, 400, fallback_auth_scheme); if(res != CURLE_OK) goto test_cleanup; res = send_right_password(curl, url, 500, fallback_auth_scheme); if(res != CURLE_OK) goto test_cleanup; test_cleanup: curl_easy_cleanup(curl); curl_global_cleanup(); return (int)res; }