git-svn-id: svn://10.65.10.50/branches/R_10_00@23289 c028cbd2-c16b-5b4b-a496-9718f37d4682
		
			
				
	
	
		
			153 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			153 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /***************************************************************************
 | |
|  *                                  _   _ ____  _
 | |
|  *  Project                     ___| | | |  _ \| |
 | |
|  *                             / __| | | | |_) | |
 | |
|  *                            | (__| |_| |  _ <| |___
 | |
|  *                             \___|\___/|_| \_\_____|
 | |
|  *
 | |
|  * Copyright (C) 1998 - 2012, Daniel Stenberg, <daniel@haxx.se>, et al.
 | |
|  *
 | |
|  * This software is licensed as described in the file COPYING, which
 | |
|  * you should have received as part of this distribution. The terms
 | |
|  * are also available at http://curl.haxx.se/docs/copyright.html.
 | |
|  *
 | |
|  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
 | |
|  * copies of the Software, and permit persons to whom the Software is
 | |
|  * furnished to do so, under the terms of the COPYING file.
 | |
|  *
 | |
|  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
 | |
|  * KIND, either express or implied.
 | |
|  *
 | |
|  ***************************************************************************/
 | |
| /* argv1 = URL
 | |
|  * argv2 = main auth type
 | |
|  * argv3 = second auth type
 | |
|  */
 | |
| 
 | |
| #include "test.h"
 | |
| #include "strequal.h"
 | |
| #include "memdebug.h"
 | |
| 
 | |
| static CURLcode send_request(CURL *curl, const char *url, int seq,
 | |
|                              long auth_scheme, const char *userpwd)
 | |
| {
 | |
|   CURLcode res;
 | |
|   char* full_url = malloc(strlen(url) + 4 + 1);
 | |
|   if (!full_url) {
 | |
|     fprintf(stderr, "Not enough memory for full url\n");
 | |
|     return CURLE_OUT_OF_MEMORY;
 | |
|   }
 | |
| 
 | |
|   sprintf(full_url, "%s%04d", url, seq);
 | |
|   fprintf(stderr, "Sending new request %d to %s with credential %s "
 | |
|           "(auth %ld)\n", seq, full_url, userpwd, auth_scheme);
 | |
|   test_setopt(curl, CURLOPT_URL, full_url);
 | |
|   test_setopt(curl, CURLOPT_VERBOSE, 1L);
 | |
|   test_setopt(curl, CURLOPT_HEADER, 1L);
 | |
|   test_setopt(curl, CURLOPT_HTTPGET, 1L);
 | |
|   test_setopt(curl, CURLOPT_USERPWD, userpwd);
 | |
|   test_setopt(curl, CURLOPT_HTTPAUTH, auth_scheme);
 | |
| 
 | |
|   res = curl_easy_perform(curl);
 | |
| 
 | |
| test_cleanup:
 | |
|   free(full_url);
 | |
|   return res;
 | |
| }
 | |
| 
 | |
| static CURLcode send_wrong_password(CURL *curl, const char *url, int seq,
 | |
|                                     long auth_scheme)
 | |
| {
 | |
|     return send_request(curl, url, seq, auth_scheme, "testuser:wrongpass");
 | |
| }
 | |
| 
 | |
| static CURLcode send_right_password(CURL *curl, const char *url, int seq,
 | |
|                                     long auth_scheme)
 | |
| {
 | |
|     return send_request(curl, url, seq, auth_scheme, "testuser:testpass");
 | |
| }
 | |
| 
 | |
| static long parse_auth_name(const char *arg)
 | |
| {
 | |
|   if (!arg)
 | |
|     return CURLAUTH_NONE;
 | |
|   if (strequal(arg, "basic"))
 | |
|     return CURLAUTH_BASIC;
 | |
|   if (strequal(arg, "digest"))
 | |
|     return CURLAUTH_DIGEST;
 | |
|   if (strequal(arg, "ntlm"))
 | |
|     return CURLAUTH_NTLM;
 | |
|   return CURLAUTH_NONE;
 | |
| }
 | |
| 
 | |
| int test(char *url)
 | |
| {
 | |
|   CURLcode res;
 | |
|   CURL *curl = NULL;
 | |
| 
 | |
|   long main_auth_scheme = parse_auth_name(libtest_arg2);
 | |
|   long fallback_auth_scheme = parse_auth_name(libtest_arg3);
 | |
| 
 | |
|   if (main_auth_scheme == CURLAUTH_NONE ||
 | |
|       fallback_auth_scheme == CURLAUTH_NONE) {
 | |
|     fprintf(stderr, "auth schemes not found on commandline\n");
 | |
|     return TEST_ERR_MAJOR_BAD;
 | |
|   }
 | |
| 
 | |
|   if (curl_global_init(CURL_GLOBAL_ALL) != CURLE_OK) {
 | |
|     fprintf(stderr, "curl_global_init() failed\n");
 | |
|     return TEST_ERR_MAJOR_BAD;
 | |
|   }
 | |
| 
 | |
|   /* Send wrong password, then right password */
 | |
| 
 | |
|   if ((curl = curl_easy_init()) == NULL) {
 | |
|     fprintf(stderr, "curl_easy_init() failed\n");
 | |
|     curl_global_cleanup();
 | |
|     return TEST_ERR_MAJOR_BAD;
 | |
|   }
 | |
| 
 | |
|   res = send_wrong_password(curl, url, 100, main_auth_scheme);
 | |
|   if (res != CURLE_OK)
 | |
|       goto test_cleanup;
 | |
|   curl_easy_reset(curl);
 | |
| 
 | |
|   res = send_right_password(curl, url, 200, fallback_auth_scheme);
 | |
|   if (res != CURLE_OK)
 | |
|       goto test_cleanup;
 | |
|   curl_easy_reset(curl);
 | |
| 
 | |
|   curl_easy_cleanup(curl);
 | |
| 
 | |
|   /* Send wrong password twice, then right password */
 | |
| 
 | |
|   if ((curl = curl_easy_init()) == NULL) {
 | |
|     fprintf(stderr, "curl_easy_init() failed\n");
 | |
|     curl_global_cleanup();
 | |
|     return TEST_ERR_MAJOR_BAD;
 | |
|   }
 | |
| 
 | |
|   res = send_wrong_password(curl, url, 300, main_auth_scheme);
 | |
|   if (res != CURLE_OK)
 | |
|       goto test_cleanup;
 | |
|   curl_easy_reset(curl);
 | |
| 
 | |
|   res = send_wrong_password(curl, url, 400, fallback_auth_scheme);
 | |
|   if (res != CURLE_OK)
 | |
|       goto test_cleanup;
 | |
|   curl_easy_reset(curl);
 | |
| 
 | |
|   res = send_right_password(curl, url, 500, fallback_auth_scheme);
 | |
|   if (res != CURLE_OK)
 | |
|       goto test_cleanup;
 | |
|   curl_easy_reset(curl);
 | |
| 
 | |
| test_cleanup:
 | |
| 
 | |
|   curl_easy_cleanup(curl);
 | |
|   curl_global_cleanup();
 | |
| 
 | |
|   return (int)res;
 | |
| }
 | |
| 
 |