| /*************************************************************************** | 
 |  *                                  _   _ ____  _ | 
 |  *  Project                     ___| | | |  _ \| | | 
 |  *                             / __| | | | |_) | | | 
 |  *                            | (__| |_| |  _ <| |___ | 
 |  *                             \___|\___/|_| \_\_____| | 
 |  * | 
 |  * Copyright (C) 1998 - 2022, Daniel Stenberg, <daniel@haxx.se>, et al. | 
 |  * | 
 |  * This software is licensed as described in the file COPYING, which | 
 |  * you should have received as part of this distribution. The terms | 
 |  * are also available at https://curl.se/docs/copyright.html. | 
 |  * | 
 |  * You may opt to use, copy, modify, merge, publish, distribute and/or sell | 
 |  * copies of the Software, and permit persons to whom the Software is | 
 |  * furnished to do so, under the terms of the COPYING file. | 
 |  * | 
 |  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY | 
 |  * KIND, either express or implied. | 
 |  * | 
 |  * SPDX-License-Identifier: curl | 
 |  * | 
 |  ***************************************************************************/ | 
 | /* argv1 = URL | 
 |  * argv2 = main auth type | 
 |  * argv3 = second auth type | 
 |  */ | 
 |  | 
 | #include "test.h" | 
 | #include "memdebug.h" | 
 |  | 
 | static CURLcode send_request(CURL *curl, const char *url, int seq, | 
 |                              long auth_scheme, const char *userpwd) | 
 | { | 
 |   CURLcode res; | 
 |   size_t len = strlen(url) + 4 + 1; | 
 |   char *full_url = malloc(len); | 
 |   if(!full_url) { | 
 |     fprintf(stderr, "Not enough memory for full url\n"); | 
 |     return CURLE_OUT_OF_MEMORY; | 
 |   } | 
 |  | 
 |   msnprintf(full_url, len, "%s%04d", url, seq); | 
 |   fprintf(stderr, "Sending new request %d to %s with credential %s " | 
 |           "(auth %ld)\n", seq, full_url, userpwd, auth_scheme); | 
 |   test_setopt(curl, CURLOPT_URL, full_url); | 
 |   test_setopt(curl, CURLOPT_VERBOSE, 1L); | 
 |   test_setopt(curl, CURLOPT_HEADER, 1L); | 
 |   test_setopt(curl, CURLOPT_HTTPGET, 1L); | 
 |   test_setopt(curl, CURLOPT_USERPWD, userpwd); | 
 |   test_setopt(curl, CURLOPT_HTTPAUTH, auth_scheme); | 
 |  | 
 |   res = curl_easy_perform(curl); | 
 |  | 
 | test_cleanup: | 
 |   free(full_url); | 
 |   return res; | 
 | } | 
 |  | 
 | static CURLcode send_wrong_password(CURL *curl, const char *url, int seq, | 
 |                                     long auth_scheme) | 
 | { | 
 |     return send_request(curl, url, seq, auth_scheme, "testuser:wrongpass"); | 
 | } | 
 |  | 
 | static CURLcode send_right_password(CURL *curl, const char *url, int seq, | 
 |                                     long auth_scheme) | 
 | { | 
 |     return send_request(curl, url, seq, auth_scheme, "testuser:testpass"); | 
 | } | 
 |  | 
 | static long parse_auth_name(const char *arg) | 
 | { | 
 |   if(!arg) | 
 |     return CURLAUTH_NONE; | 
 |   if(curl_strequal(arg, "basic")) | 
 |     return CURLAUTH_BASIC; | 
 |   if(curl_strequal(arg, "digest")) | 
 |     return CURLAUTH_DIGEST; | 
 |   if(curl_strequal(arg, "ntlm")) | 
 |     return CURLAUTH_NTLM; | 
 |   return CURLAUTH_NONE; | 
 | } | 
 |  | 
 | int test(char *url) | 
 | { | 
 |   CURLcode res; | 
 |   CURL *curl = NULL; | 
 |  | 
 |   long main_auth_scheme = parse_auth_name(libtest_arg2); | 
 |   long fallback_auth_scheme = parse_auth_name(libtest_arg3); | 
 |  | 
 |   if(main_auth_scheme == CURLAUTH_NONE || | 
 |       fallback_auth_scheme == CURLAUTH_NONE) { | 
 |     fprintf(stderr, "auth schemes not found on commandline\n"); | 
 |     return TEST_ERR_MAJOR_BAD; | 
 |   } | 
 |  | 
 |   if(curl_global_init(CURL_GLOBAL_ALL) != CURLE_OK) { | 
 |     fprintf(stderr, "curl_global_init() failed\n"); | 
 |     return TEST_ERR_MAJOR_BAD; | 
 |   } | 
 |  | 
 |   /* Send wrong password, then right password */ | 
 |  | 
 |   curl = curl_easy_init(); | 
 |   if(!curl) { | 
 |     fprintf(stderr, "curl_easy_init() failed\n"); | 
 |     curl_global_cleanup(); | 
 |     return TEST_ERR_MAJOR_BAD; | 
 |   } | 
 |  | 
 |   res = send_wrong_password(curl, url, 100, main_auth_scheme); | 
 |   if(res != CURLE_OK) | 
 |     goto test_cleanup; | 
 |  | 
 |   res = send_right_password(curl, url, 200, fallback_auth_scheme); | 
 |   if(res != CURLE_OK) | 
 |     goto test_cleanup; | 
 |  | 
 |   curl_easy_cleanup(curl); | 
 |  | 
 |   /* Send wrong password twice, then right password */ | 
 |   curl = curl_easy_init(); | 
 |   if(!curl) { | 
 |     fprintf(stderr, "curl_easy_init() failed\n"); | 
 |     curl_global_cleanup(); | 
 |     return TEST_ERR_MAJOR_BAD; | 
 |   } | 
 |  | 
 |   res = send_wrong_password(curl, url, 300, main_auth_scheme); | 
 |   if(res != CURLE_OK) | 
 |     goto test_cleanup; | 
 |  | 
 |   res = send_wrong_password(curl, url, 400, fallback_auth_scheme); | 
 |   if(res != CURLE_OK) | 
 |     goto test_cleanup; | 
 |  | 
 |   res = send_right_password(curl, url, 500, fallback_auth_scheme); | 
 |   if(res != CURLE_OK) | 
 |     goto test_cleanup; | 
 |  | 
 | test_cleanup: | 
 |  | 
 |   curl_easy_cleanup(curl); | 
 |   curl_global_cleanup(); | 
 |  | 
 |   return (int)res; | 
 | } |