1 /***************************************************************************
3 * Project ___| | | | _ \| |
5 * | (__| |_| | _ <| |___
6 * \___|\___/|_| \_\_____|
8 * Copyright (C) 1998 - 2012, Daniel Stenberg, <daniel@haxx.se>, et al.
10 * This software is licensed as described in the file COPYING, which
11 * you should have received as part of this distribution. The terms
12 * are also available at http://curl.haxx.se/docs/copyright.html.
14 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15 * copies of the Software, and permit persons to whom the Software is
16 * furnished to do so, under the terms of the COPYING file.
18 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19 * KIND, either express or implied.
21 ***************************************************************************/
23 * argv2 = main auth type
24 * argv3 = second auth type
31 static CURLcode send_request(CURL *curl, const char *url, int seq,
32 long auth_scheme, const char *userpwd)
35 char* full_url = malloc(strlen(url) + 4 + 1);
37 fprintf(stderr, "Not enough memory for full url\n");
38 res = CURLE_OUT_OF_MEMORY;
42 sprintf(full_url, "%s%04d", url, seq);
43 fprintf(stderr, "Sending new request %d to %s with credential %s "
44 "(auth %ld)\n", seq, full_url, userpwd, auth_scheme);
45 test_setopt(curl, CURLOPT_URL, full_url);
46 test_setopt(curl, CURLOPT_VERBOSE, 1L);
47 test_setopt(curl, CURLOPT_HEADER, 1L);
48 test_setopt(curl, CURLOPT_HTTPGET, 1L);
49 test_setopt(curl, CURLOPT_USERPWD, userpwd);
50 test_setopt(curl, CURLOPT_HTTPAUTH, auth_scheme);
52 res = curl_easy_perform(curl);
59 static CURLcode send_wrong_password(CURL *curl, const char *url, int seq,
62 return send_request(curl, url, seq, auth_scheme, "testuser:wrongpass");
65 static CURLcode send_right_password(CURL *curl, const char *url, int seq,
68 return send_request(curl, url, seq, auth_scheme, "testuser:testpass");
71 static long parse_auth_name(const char *arg)
75 if (strequal(arg, "basic"))
76 return CURLAUTH_BASIC;
77 if (strequal(arg, "digest"))
78 return CURLAUTH_DIGEST;
79 if (strequal(arg, "ntlm"))
89 long main_auth_scheme = parse_auth_name(libtest_arg2);
90 long fallback_auth_scheme = parse_auth_name(libtest_arg3);
92 if (main_auth_scheme == CURLAUTH_NONE ||
93 fallback_auth_scheme == CURLAUTH_NONE) {
94 fprintf(stderr, "auth schemes not found on commandline\n");
95 return TEST_ERR_MAJOR_BAD;
98 if (curl_global_init(CURL_GLOBAL_ALL) != CURLE_OK) {
99 fprintf(stderr, "curl_global_init() failed\n");
100 return TEST_ERR_MAJOR_BAD;
103 /* Send wrong password, then right password */
105 if ((curl = curl_easy_init()) == NULL) {
106 fprintf(stderr, "curl_easy_init() failed\n");
107 curl_global_cleanup();
108 return TEST_ERR_MAJOR_BAD;
111 res = send_wrong_password(curl, url, 100, main_auth_scheme);
114 curl_easy_reset(curl);
116 res = send_right_password(curl, url, 200, fallback_auth_scheme);
119 curl_easy_reset(curl);
121 curl_easy_cleanup(curl);
123 /* Send wrong password twice, then right password */
125 if ((curl = curl_easy_init()) == NULL) {
126 fprintf(stderr, "curl_easy_init() failed\n");
127 curl_global_cleanup();
128 return TEST_ERR_MAJOR_BAD;
131 res = send_wrong_password(curl, url, 300, main_auth_scheme);
134 curl_easy_reset(curl);
136 res = send_wrong_password(curl, url, 400, fallback_auth_scheme);
139 curl_easy_reset(curl);
141 res = send_right_password(curl, url, 500, fallback_auth_scheme);
144 curl_easy_reset(curl);
148 curl_easy_cleanup(curl);
149 curl_global_cleanup();