| /* |
| This file is part of libmicrohttpd |
| Copyright (C) 2010 Christian Grothoff |
| Copyright (C) 2016-2022 Evgeny Grin (Karlson2k) |
| |
| libmicrohttpd is free software; you can redistribute it and/or modify |
| it under the terms of the GNU General Public License as published |
| by the Free Software Foundation; either version 2, or (at your |
| option) any later version. |
| |
| libmicrohttpd is distributed in the hope that it will be useful, but |
| WITHOUT ANY WARRANTY; without even the implied warranty of |
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| General Public License for more details. |
| |
| You should have received a copy of the GNU General Public License |
| along with libmicrohttpd; see the file COPYING. If not, write to the |
| Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, |
| Boston, MA 02110-1301, USA. |
| */ |
| |
| /** |
| * @file test_digest2.c |
| * @brief Testcase for MHD Digest Authorisation |
| * @author Karlson2k (Evgeny Grin) |
| */ |
| |
| #include "mhd_options.h" |
| #include "platform.h" |
| #include <curl/curl.h> |
| #include <microhttpd.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <time.h> |
| |
| #if defined(MHD_HTTPS_REQUIRE_GCRYPT) && \ |
| (defined(MHD_SHA256_TLSLIB) || defined(MHD_MD5_TLSLIB)) |
| #define NEED_GCRYP_INIT 1 |
| #include <gcrypt.h> |
| #endif /* MHD_HTTPS_REQUIRE_GCRYPT && (MHD_SHA256_TLSLIB || MHD_MD5_TLSLIB) */ |
| |
| #ifndef _WIN32 |
| #include <sys/socket.h> |
| #include <unistd.h> |
| #else |
| #include <wincrypt.h> |
| #endif |
| |
| #include "mhd_has_param.h" |
| #include "mhd_has_in_name.h" |
| |
| #ifndef MHD_STATICSTR_LEN_ |
| /** |
| * Determine length of static string / macro strings at compile time. |
| */ |
| #define MHD_STATICSTR_LEN_(macro) (sizeof(macro) / sizeof(char) - 1) |
| #endif /* ! MHD_STATICSTR_LEN_ */ |
| |
| #ifndef CURL_VERSION_BITS |
| #define CURL_VERSION_BITS(x,y,z) ((x) << 16 | (y) << 8 | (z)) |
| #endif /* ! CURL_VERSION_BITS */ |
| #ifndef CURL_AT_LEAST_VERSION |
| #define CURL_AT_LEAST_VERSION(x,y,z) \ |
| (LIBCURL_VERSION_NUM >= CURL_VERSION_BITS (x, y, z)) |
| #endif /* ! CURL_AT_LEAST_VERSION */ |
| |
| #ifndef _MHD_INSTRMACRO |
| /* Quoted macro parameter */ |
| #define _MHD_INSTRMACRO(a) #a |
| #endif /* ! _MHD_INSTRMACRO */ |
| #ifndef _MHD_STRMACRO |
| /* Quoted expanded macro parameter */ |
| #define _MHD_STRMACRO(a) _MHD_INSTRMACRO (a) |
| #endif /* ! _MHD_STRMACRO */ |
| |
| #if defined(HAVE___FUNC__) |
| #define externalErrorExit(ignore) \ |
| _externalErrorExit_func (NULL, __func__, __LINE__) |
| #define externalErrorExitDesc(errDesc) \ |
| _externalErrorExit_func (errDesc, __func__, __LINE__) |
| #define libcurlErrorExit(ignore) \ |
| _libcurlErrorExit_func (NULL, __func__, __LINE__) |
| #define libcurlErrorExitDesc(errDesc) \ |
| _libcurlErrorExit_func (errDesc, __func__, __LINE__) |
| #define mhdErrorExit(ignore) \ |
| _mhdErrorExit_func (NULL, __func__, __LINE__) |
| #define mhdErrorExitDesc(errDesc) \ |
| _mhdErrorExit_func (errDesc, __func__, __LINE__) |
| #define checkCURLE_OK(libcurlcall) \ |
| _checkCURLE_OK_func ((libcurlcall), _MHD_STRMACRO (libcurlcall), \ |
| __func__, __LINE__) |
| #elif defined(HAVE___FUNCTION__) |
| #define externalErrorExit(ignore) \ |
| _externalErrorExit_func (NULL, __FUNCTION__, __LINE__) |
| #define externalErrorExitDesc(errDesc) \ |
| _externalErrorExit_func (errDesc, __FUNCTION__, __LINE__) |
| #define libcurlErrorExit(ignore) \ |
| _libcurlErrorExit_func (NULL, __FUNCTION__, __LINE__) |
| #define libcurlErrorExitDesc(errDesc) \ |
| _libcurlErrorExit_func (errDesc, __FUNCTION__, __LINE__) |
| #define mhdErrorExit(ignore) \ |
| _mhdErrorExit_func (NULL, __FUNCTION__, __LINE__) |
| #define mhdErrorExitDesc(errDesc) \ |
| _mhdErrorExit_func (errDesc, __FUNCTION__, __LINE__) |
| #define checkCURLE_OK(libcurlcall) \ |
| _checkCURLE_OK_func ((libcurlcall), _MHD_STRMACRO (libcurlcall), \ |
| __FUNCTION__, __LINE__) |
| #else |
| #define externalErrorExit(ignore) _externalErrorExit_func (NULL, NULL, __LINE__) |
| #define externalErrorExitDesc(errDesc) \ |
| _externalErrorExit_func (errDesc, NULL, __LINE__) |
| #define libcurlErrorExit(ignore) _libcurlErrorExit_func (NULL, NULL, __LINE__) |
| #define libcurlErrorExitDesc(errDesc) \ |
| _libcurlErrorExit_func (errDesc, NULL, __LINE__) |
| #define mhdErrorExit(ignore) _mhdErrorExit_func (NULL, NULL, __LINE__) |
| #define mhdErrorExitDesc(errDesc) _mhdErrorExit_func (errDesc, NULL, __LINE__) |
| #define checkCURLE_OK(libcurlcall) \ |
| _checkCURLE_OK_func ((libcurlcall), _MHD_STRMACRO (libcurlcall), NULL, \ |
| __LINE__) |
| #endif |
| |
| |
| _MHD_NORETURN static void |
| _externalErrorExit_func (const char *errDesc, const char *funcName, int lineNum) |
| { |
| fflush (stdout); |
| if ((NULL != errDesc) && (0 != errDesc[0])) |
| fprintf (stderr, "%s", errDesc); |
| else |
| fprintf (stderr, "System or external library call failed"); |
| if ((NULL != funcName) && (0 != funcName[0])) |
| fprintf (stderr, " in %s", funcName); |
| if (0 < lineNum) |
| fprintf (stderr, " at line %d", lineNum); |
| |
| fprintf (stderr, ".\nLast errno value: %d (%s)\n", (int) errno, |
| strerror (errno)); |
| #ifdef MHD_WINSOCK_SOCKETS |
| fprintf (stderr, "WSAGetLastError() value: %d\n", (int) WSAGetLastError ()); |
| #endif /* MHD_WINSOCK_SOCKETS */ |
| fflush (stderr); |
| exit (99); |
| } |
| |
| |
| /* Not actually used in this test */ |
| static char libcurl_errbuf[CURL_ERROR_SIZE] = ""; |
| |
| _MHD_NORETURN static void |
| _libcurlErrorExit_func (const char *errDesc, const char *funcName, int lineNum) |
| { |
| fflush (stdout); |
| if ((NULL != errDesc) && (0 != errDesc[0])) |
| fprintf (stderr, "%s", errDesc); |
| else |
| fprintf (stderr, "CURL library call failed"); |
| if ((NULL != funcName) && (0 != funcName[0])) |
| fprintf (stderr, " in %s", funcName); |
| if (0 < lineNum) |
| fprintf (stderr, " at line %d", lineNum); |
| |
| fprintf (stderr, ".\nLast errno value: %d (%s)\n", (int) errno, |
| strerror (errno)); |
| #ifdef MHD_WINSOCK_SOCKETS |
| fprintf (stderr, "WSAGetLastError() value: %d\n", (int) WSAGetLastError ()); |
| #endif /* MHD_WINSOCK_SOCKETS */ |
| if (0 != libcurl_errbuf[0]) |
| fprintf (stderr, "Last libcurl error description: %s\n", libcurl_errbuf); |
| |
| fflush (stderr); |
| exit (99); |
| } |
| |
| |
| _MHD_NORETURN static void |
| _mhdErrorExit_func (const char *errDesc, const char *funcName, int lineNum) |
| { |
| fflush (stdout); |
| if ((NULL != errDesc) && (0 != errDesc[0])) |
| fprintf (stderr, "%s", errDesc); |
| else |
| fprintf (stderr, "MHD unexpected error"); |
| if ((NULL != funcName) && (0 != funcName[0])) |
| fprintf (stderr, " in %s", funcName); |
| if (0 < lineNum) |
| fprintf (stderr, " at line %d", lineNum); |
| |
| fprintf (stderr, ".\nLast errno value: %d (%s)\n", (int) errno, |
| strerror (errno)); |
| #ifdef MHD_WINSOCK_SOCKETS |
| fprintf (stderr, "WSAGetLastError() value: %d\n", (int) WSAGetLastError ()); |
| #endif /* MHD_WINSOCK_SOCKETS */ |
| |
| fflush (stderr); |
| exit (8); |
| } |
| |
| |
| #if 0 |
| /* Function unused in this test */ |
| static void |
| _checkCURLE_OK_func (CURLcode code, const char *curlFunc, |
| const char *funcName, int lineNum) |
| { |
| if (CURLE_OK == code) |
| return; |
| |
| fflush (stdout); |
| if ((NULL != curlFunc) && (0 != curlFunc[0])) |
| fprintf (stderr, "'%s' resulted in '%s'", curlFunc, |
| curl_easy_strerror (code)); |
| else |
| fprintf (stderr, "libcurl function call resulted in '%s'", |
| curl_easy_strerror (code)); |
| if ((NULL != funcName) && (0 != funcName[0])) |
| fprintf (stderr, " in %s", funcName); |
| if (0 < lineNum) |
| fprintf (stderr, " at line %d", lineNum); |
| |
| fprintf (stderr, ".\nLast errno value: %d (%s)\n", (int) errno, |
| strerror (errno)); |
| if (0 != libcurl_errbuf[0]) |
| fprintf (stderr, "Last libcurl error description: %s\n", libcurl_errbuf); |
| |
| fflush (stderr); |
| exit (9); |
| } |
| |
| |
| #endif |
| |
| |
| /* Could be increased to facilitate debugging */ |
| #define TIMEOUTS_VAL 10 |
| |
| #define MHD_URI_BASE_PATH "/bar%20foo?key=value" |
| #define MHD_URI_BASE_PATH2 "/another_path" |
| /* Should not fit buffer in the stack */ |
| #define MHD_URI_BASE_PATH3 \ |
| "/long/long/long/long/long/long/long/long/long/long/long/long/long/long" \ |
| "/long/long/long/long/long/long/long/long/long/long/long/long/long/long" \ |
| "/long/long/long/long/long/long/long/long/long/long/long/long/long/long" \ |
| "/long/long/long/long/long/long/long/long/long/long/long/long/long/long" \ |
| "/long/long/long/long/long/long/long/long/long/long/long/long/long/long" \ |
| "/path?with%20some=parameters" |
| |
| #define REALM_VAL "TestRealm" |
| #define USERNAME1 "test_user" |
| /* The hex form of MD5("test_user:TestRealm") */ |
| #define USERHASH1_MD5_HEX "c53c601503ff176f18f623725fba4281" |
| #define USERHASH1_MD5_BIN 0xc5, 0x3c, 0x60, 0x15, 0x03, 0xff, 0x17, 0x6f, \ |
| 0x18, 0xf6, 0x23, 0x72, 0x5f, 0xba, 0x42, 0x81 |
| /* The hex form of SHA-256("test_user:TestRealm") */ |
| #define USERHASH1_SHA256_HEX \ |
| "090c7e06b77d6614cf5fe6cafa004d2e5f8fb36ba45a0e35eacb2eb7728f34de" |
| /* The binary form of SHA-256("test_user:TestRealm") */ |
| #define USERHASH1_SHA256_BIN 0x09, 0x0c, 0x7e, 0x06, 0xb7, 0x7d, 0x66, 0x14, \ |
| 0xcf, 0x5f, 0xe6, 0xca, 0xfa, 0x00, 0x4d, 0x2e, 0x5f, 0x8f, 0xb3, 0x6b, \ |
| 0xa4, 0x5a, 0x0e, 0x35, 0xea, 0xcb, 0x2e, 0xb7, 0x72, 0x8f, 0x34, 0xde |
| /* The hex form of MD5("test_user:TestRealm:test pass") */ |
| #define USERDIGEST1_MD5_BIN 0xd8, 0xb4, 0xa6, 0xd0, 0x01, 0x13, 0x07, 0xb7, \ |
| 0x67, 0x94, 0xea, 0x66, 0x86, 0x03, 0x6b, 0x43 |
| /* The binary form of SHA-256("test_user:TestRealm:test pass") */ |
| #define USERDIGEST1_SHA256_BIN 0xc3, 0x4e, 0x16, 0x5a, 0x17, 0x0f, 0xe5, \ |
| 0xac, 0x04, 0xf1, 0x6e, 0x46, 0x48, 0x2b, 0xa0, 0xc6, 0x56, 0xc1, 0xfb, \ |
| 0x8f, 0x66, 0xa6, 0xd6, 0x3f, 0x91, 0x12, 0xf8, 0x56, 0xa5, 0xec, 0x6d, \ |
| 0x6d |
| #define PASSWORD_VALUE "test pass" |
| #define OPAQUE_VALUE "opaque+content" /* Base64 character set */ |
| |
| |
| #define PAGE \ |
| "<html><head><title>libmicrohttpd demo page</title>" \ |
| "</head><body>Access granted</body></html>" |
| |
| #define DENIED \ |
| "<html><head><title>libmicrohttpd - Access denied</title>" \ |
| "</head><body>Access denied</body></html>" |
| |
| /* Global parameters */ |
| static int verbose; |
| static int test_oldapi; |
| static int test_userhash; |
| static int test_userdigest; |
| static int test_sha256; |
| static int test_rfc2069; |
| /* Bind DAuth nonces to everything except URI */ |
| static int test_bind_all; |
| /* Bind DAuth nonces to URI */ |
| static int test_bind_uri; |
| static int curl_uses_usehash; |
| |
| /* Static helper variables */ |
| static const char userhash1_md5_hex[] = USERHASH1_MD5_HEX; |
| static const uint8_t userhash1_md5_bin[] = { USERHASH1_MD5_BIN }; |
| static const char userhash1_sha256_hex[] = USERHASH1_SHA256_HEX; |
| static const uint8_t userhash1_sha256_bin[] = { USERHASH1_SHA256_BIN }; |
| static const char *userhash_hex; |
| static size_t userhash_hex_len; |
| static const uint8_t *userhash_bin; |
| static const uint8_t userdigest1_md5_bin[] = { USERDIGEST1_MD5_BIN }; |
| static const uint8_t userdigest1_sha256_bin[] = { USERDIGEST1_SHA256_BIN }; |
| static const uint8_t *userdigest_bin; |
| static size_t userdigest_bin_size; |
| static const char *username_ptr; |
| |
| static void |
| test_global_init (void) |
| { |
| libcurl_errbuf[0] = 0; |
| |
| if (0 != curl_global_init (CURL_GLOBAL_WIN32)) |
| externalErrorExit (); |
| |
| username_ptr = USERNAME1; |
| if (! test_sha256) |
| { |
| userhash_hex = userhash1_md5_hex; |
| userhash_hex_len = MHD_STATICSTR_LEN_ (userhash1_md5_hex); |
| userhash_bin = userhash1_md5_bin; |
| if ((userhash_hex_len / 2) != \ |
| (sizeof(userhash1_md5_bin) / sizeof(userhash1_md5_bin[0]))) |
| externalErrorExitDesc ("Wrong size of the 'userhash1_md5_bin' array"); |
| userdigest_bin = userdigest1_md5_bin; |
| userdigest_bin_size = |
| (sizeof(userdigest1_md5_bin) / sizeof(userdigest1_md5_bin[0])); |
| } |
| else |
| { |
| userhash_hex = userhash1_sha256_hex; |
| userhash_hex_len = MHD_STATICSTR_LEN_ (userhash1_sha256_hex); |
| userhash_bin = userhash1_sha256_bin; |
| if ((userhash_hex_len / 2) != \ |
| (sizeof(userhash1_sha256_bin) \ |
| / sizeof(userhash1_sha256_bin[0]))) |
| externalErrorExitDesc ("Wrong size of the 'userhash1_sha256_bin' array"); |
| userdigest_bin = userdigest1_sha256_bin; |
| userdigest_bin_size = |
| (sizeof(userdigest1_sha256_bin) / sizeof(userdigest1_sha256_bin[0])); |
| } |
| } |
| |
| |
| static void |
| test_global_cleanup (void) |
| { |
| curl_global_cleanup (); |
| } |
| |
| |
| static int |
| gen_good_rnd (void *rnd_buf, size_t rnd_buf_size) |
| { |
| if (1024 < rnd_buf_size) |
| externalErrorExitDesc ("Too large amount of random data " \ |
| "is requested"); |
| #ifndef _WIN32 |
| if (1) |
| { |
| const int urand_fd = open ("/dev/urandom", O_RDONLY); |
| if (0 < urand_fd) |
| { |
| size_t pos = 0; |
| do |
| { |
| ssize_t res = read (urand_fd, |
| ((uint8_t *) rnd_buf) + pos, rnd_buf_size - pos); |
| if (0 > res) |
| break; |
| pos += (size_t) res; |
| } while (rnd_buf_size > pos); |
| (void) close (urand_fd); |
| |
| if (rnd_buf_size == pos) |
| return ! 0; /* Success */ |
| } |
| } |
| #else /* _WIN32 */ |
| if (1) |
| { |
| HCRYPTPROV cpr_hndl; |
| if (CryptAcquireContextW (&cpr_hndl, NULL, NULL, PROV_RSA_FULL, |
| CRYPT_VERIFYCONTEXT | CRYPT_SILENT)) |
| { |
| if (CryptGenRandom (cpr_hndl, (DWORD) rnd_buf_size, (BYTE *) rnd_buf)) |
| { |
| (void) CryptReleaseContext (cpr_hndl, 0); |
| return ! 0; /* Success */ |
| } |
| (void) CryptReleaseContext (cpr_hndl, 0); |
| } |
| } |
| #endif /* _WIN32 */ |
| return 0; /* Failure */ |
| } |
| |
| |
| struct CBC |
| { |
| char *buf; |
| size_t pos; |
| size_t size; |
| }; |
| |
| struct req_track |
| { |
| /** |
| * The number of used URI, zero-based |
| */ |
| unsigned int uri_num; |
| |
| /** |
| * The number of request for URI. |
| * This includes number of unauthorised requests. |
| */ |
| unsigned int req_num; |
| }; |
| |
| |
| static size_t |
| copyBuffer (void *ptr, |
| size_t size, |
| size_t nmemb, |
| void *ctx) |
| { |
| struct CBC *cbc = ctx; |
| |
| if (cbc->pos + size * nmemb > cbc->size) |
| mhdErrorExitDesc ("Wrong too large data"); /* overflow */ |
| memcpy (&cbc->buf[cbc->pos], ptr, size * nmemb); |
| cbc->pos += size * nmemb; |
| return size * nmemb; |
| } |
| |
| |
| static enum MHD_Result |
| ahc_echo (void *cls, |
| struct MHD_Connection *connection, |
| const char *url, |
| const char *method, |
| const char *version, |
| const char *upload_data, |
| size_t *upload_data_size, |
| void **req_cls) |
| { |
| struct MHD_Response *response; |
| enum MHD_Result res; |
| static int already_called_marker; |
| struct req_track *const tr_p = (struct req_track *) cls; |
| (void) url; /* Unused. Silent compiler warning. */ |
| (void) method; (void) version; (void) upload_data; /* Unused. Silent compiler warning. */ |
| (void) upload_data_size; /* Unused. Silent compiler warning. */ |
| |
| if (&already_called_marker != *req_cls) |
| { /* Called for the first time, request not fully read yet */ |
| *req_cls = &already_called_marker; |
| /* Wait for complete request */ |
| return MHD_YES; |
| } |
| |
| if (0 != strcmp (method, MHD_HTTP_METHOD_GET)) |
| mhdErrorExitDesc ("Unexpected HTTP method"); |
| |
| tr_p->req_num++; |
| if (2 < tr_p->req_num) |
| mhdErrorExitDesc ("Received more than two requests for the same URI"); |
| |
| response = NULL; |
| if (! test_oldapi) |
| { |
| struct MHD_DigestAuthInfo *dinfo; |
| const enum MHD_DigestAuthAlgo3 algo3 = |
| test_sha256 ? MHD_DIGEST_AUTH_ALGO3_SHA256 : MHD_DIGEST_AUTH_ALGO3_MD5; |
| const enum MHD_DigestAuthQOP qop = |
| test_rfc2069 ? MHD_DIGEST_AUTH_QOP_NONE : MHD_DIGEST_AUTH_QOP_AUTH; |
| |
| dinfo = MHD_digest_auth_get_request_info3 (connection); |
| if (NULL != dinfo) |
| { |
| /* Got any kind of Digest response. Check it, it must be valid */ |
| struct MHD_DigestAuthUsernameInfo *uname; |
| enum MHD_DigestAuthResult check_res; |
| enum MHD_DigestAuthResult expect_res; |
| |
| if (curl_uses_usehash) |
| { |
| if (MHD_DIGEST_AUTH_UNAME_TYPE_USERHASH != dinfo->uname_type) |
| { |
| fprintf (stderr, "Unexpected 'uname_type'.\n" |
| "Expected: %d\tRecieved: %d. ", |
| (int) MHD_DIGEST_AUTH_UNAME_TYPE_USERHASH, |
| (int) dinfo->uname_type); |
| mhdErrorExitDesc ("Wrong 'uname_type'"); |
| } |
| else if (dinfo->userhash_hex_len != userhash_hex_len) |
| { |
| fprintf (stderr, "'userhash_hex_len' does not match.\n" |
| "Expected: %u\tRecieved: %u. ", |
| (unsigned) userhash_hex_len, |
| (unsigned) dinfo->userhash_hex_len); |
| mhdErrorExitDesc ("Wrong 'userhash_hex_len'"); |
| } |
| else if (0 != memcmp (dinfo->userhash_hex, userhash_hex, |
| dinfo->userhash_hex_len)) |
| { |
| fprintf (stderr, "'userhash_hex' does not match.\n" |
| "Expected: '%s'\tRecieved: '%.*s'. ", |
| userhash_hex, |
| (int) dinfo->userhash_hex_len, |
| dinfo->userhash_hex); |
| mhdErrorExitDesc ("Wrong 'userhash_hex'"); |
| } |
| else if (NULL == dinfo->userhash_bin) |
| mhdErrorExitDesc ("'userhash_bin' is NULL"); |
| else if (0 != memcmp (dinfo->userhash_bin, userhash_bin, |
| dinfo->username_len / 2)) |
| mhdErrorExitDesc ("Wrong 'userhash_bin'"); |
| else if (NULL != dinfo->username) |
| mhdErrorExitDesc ("'username' is NOT NULL"); |
| else if (0 != dinfo->username_len) |
| mhdErrorExitDesc ("'username_len' is NOT zero"); |
| } |
| else |
| { |
| if (MHD_DIGEST_AUTH_UNAME_TYPE_STANDARD != dinfo->uname_type) |
| { |
| fprintf (stderr, "Unexpected 'uname_type'.\n" |
| "Expected: %d\tRecieved: %d. ", |
| (int) MHD_DIGEST_AUTH_UNAME_TYPE_STANDARD, |
| (int) dinfo->uname_type); |
| mhdErrorExitDesc ("Wrong 'uname_type'"); |
| } |
| else if (NULL == dinfo->username) |
| mhdErrorExitDesc ("'username' is NULL"); |
| else if (dinfo->username_len != strlen (username_ptr)) |
| { |
| fprintf (stderr, "'username_len' does not match.\n" |
| "Expected: %u\tRecieved: %u. ", |
| (unsigned) strlen (username_ptr), |
| (unsigned) dinfo->username_len); |
| mhdErrorExitDesc ("Wrong 'username_len'"); |
| } |
| else if (0 != memcmp (dinfo->username, username_ptr, |
| dinfo->username_len)) |
| { |
| fprintf (stderr, "'username' does not match.\n" |
| "Expected: '%s'\tRecieved: '%.*s'. ", |
| username_ptr, |
| (int) dinfo->username_len, |
| dinfo->username); |
| mhdErrorExitDesc ("Wrong 'username'"); |
| } |
| else if (NULL != dinfo->userhash_hex) |
| mhdErrorExitDesc ("'userhash_hex' is NOT NULL"); |
| else if (0 != dinfo->userhash_hex_len) |
| mhdErrorExitDesc ("'userhash_hex_len' is NOT zero"); |
| else if (NULL != dinfo->userhash_bin) |
| mhdErrorExitDesc ("'userhash_bin' is NOT NULL"); |
| } |
| if (algo3 != dinfo->algo3) |
| { |
| fprintf (stderr, "Unexpected 'algo3'.\n" |
| "Expected: %d\tRecieved: %d. ", |
| (int) algo3, |
| (int) dinfo->algo3); |
| mhdErrorExitDesc ("Wrong 'algo3'"); |
| } |
| if (! test_rfc2069) |
| { |
| if (10 >= dinfo->cnonce_len) |
| { |
| fprintf (stderr, "Unexpected small 'cnonce_len': %ld. ", |
| (long) dinfo->cnonce_len); |
| mhdErrorExitDesc ("Wrong 'cnonce_len'"); |
| } |
| } |
| else |
| { |
| if (0 != dinfo->cnonce_len) |
| { |
| fprintf (stderr, "'cnonce_len' is not zero: %ld. ", |
| (long) dinfo->cnonce_len); |
| mhdErrorExitDesc ("Wrong 'cnonce_len'"); |
| } |
| } |
| if (NULL == dinfo->opaque) |
| mhdErrorExitDesc ("'opaque' is NULL"); |
| else if (dinfo->opaque_len != MHD_STATICSTR_LEN_ (OPAQUE_VALUE)) |
| { |
| fprintf (stderr, "'opaque_len' does not match.\n" |
| "Expected: %u\tRecieved: %u. ", |
| (unsigned) MHD_STATICSTR_LEN_ (OPAQUE_VALUE), |
| (unsigned) dinfo->opaque_len); |
| mhdErrorExitDesc ("Wrong 'opaque_len'"); |
| } |
| else if (0 != memcmp (dinfo->opaque, OPAQUE_VALUE, dinfo->opaque_len)) |
| { |
| fprintf (stderr, "'opaque' does not match.\n" |
| "Expected: '%s'\tRecieved: '%.*s'. ", |
| OPAQUE_VALUE, |
| (int) dinfo->opaque_len, |
| dinfo->opaque); |
| mhdErrorExitDesc ("Wrong 'opaque'"); |
| } |
| else if (qop != dinfo->qop) |
| { |
| fprintf (stderr, "Unexpected 'qop'.\n" |
| "Expected: %d\tRecieved: %d. ", |
| (int) qop, |
| (int) dinfo->qop); |
| mhdErrorExitDesc ("Wrong 'qop'"); |
| } |
| else if (NULL == dinfo->realm) |
| mhdErrorExitDesc ("'realm' is NULL"); |
| else if (dinfo->realm_len != MHD_STATICSTR_LEN_ (REALM_VAL)) |
| { |
| fprintf (stderr, "'realm_len' does not match.\n" |
| "Expected: %u\tRecieved: %u. ", |
| (unsigned) MHD_STATICSTR_LEN_ (REALM_VAL), |
| (unsigned) dinfo->realm_len); |
| mhdErrorExitDesc ("Wrong 'realm_len'"); |
| } |
| else if (0 != memcmp (dinfo->realm, REALM_VAL, dinfo->realm_len)) |
| { |
| fprintf (stderr, "'realm' does not match.\n" |
| "Expected: '%s'\tRecieved: '%.*s'. ", |
| OPAQUE_VALUE, |
| (int) dinfo->realm_len, |
| dinfo->realm); |
| mhdErrorExitDesc ("Wrong 'realm'"); |
| } |
| MHD_free (dinfo); |
| |
| uname = MHD_digest_auth_get_username3 (connection); |
| if (NULL == uname) |
| mhdErrorExitDesc ("MHD_digest_auth_get_username3() returned NULL"); |
| if (curl_uses_usehash) |
| { |
| if (MHD_DIGEST_AUTH_UNAME_TYPE_USERHASH != uname->uname_type) |
| { |
| fprintf (stderr, "Unexpected 'uname_type'.\n" |
| "Expected: %d\tRecieved: %d. ", |
| (int) MHD_DIGEST_AUTH_UNAME_TYPE_USERHASH, |
| (int) uname->uname_type); |
| mhdErrorExitDesc ("Wrong 'uname_type'"); |
| } |
| else if (uname->userhash_hex_len != userhash_hex_len) |
| { |
| fprintf (stderr, "'userhash_hex_len' does not match.\n" |
| "Expected: %u\tRecieved: %u. ", |
| (unsigned) userhash_hex_len, |
| (unsigned) uname->userhash_hex_len); |
| mhdErrorExitDesc ("Wrong 'userhash_hex_len'"); |
| } |
| else if (0 != memcmp (uname->userhash_hex, userhash_hex, |
| uname->userhash_hex_len)) |
| { |
| fprintf (stderr, "'username' does not match.\n" |
| "Expected: '%s'\tRecieved: '%.*s'. ", |
| userhash_hex, |
| (int) uname->userhash_hex_len, |
| uname->userhash_hex); |
| mhdErrorExitDesc ("Wrong 'userhash_hex'"); |
| } |
| else if (NULL == uname->userhash_bin) |
| mhdErrorExitDesc ("'userhash_bin' is NULL"); |
| else if (0 != memcmp (uname->userhash_bin, userhash_bin, |
| uname->username_len / 2)) |
| mhdErrorExitDesc ("Wrong 'userhash_bin'"); |
| else if (NULL != uname->username) |
| mhdErrorExitDesc ("'username' is NOT NULL"); |
| else if (0 != uname->username_len) |
| mhdErrorExitDesc ("'username_len' is NOT zero"); |
| } |
| else |
| { |
| if (MHD_DIGEST_AUTH_UNAME_TYPE_STANDARD != uname->uname_type) |
| { |
| fprintf (stderr, "Unexpected 'uname_type'.\n" |
| "Expected: %d\tRecieved: %d. ", |
| (int) MHD_DIGEST_AUTH_UNAME_TYPE_STANDARD, |
| (int) uname->uname_type); |
| mhdErrorExitDesc ("Wrong 'uname_type'"); |
| } |
| else if (NULL == uname->username) |
| mhdErrorExitDesc ("'username' is NULL"); |
| else if (uname->username_len != strlen (username_ptr)) |
| { |
| fprintf (stderr, "'username_len' does not match.\n" |
| "Expected: %u\tRecieved: %u. ", |
| (unsigned) strlen (username_ptr), |
| (unsigned) uname->username_len); |
| mhdErrorExitDesc ("Wrong 'username_len'"); |
| } |
| else if (0 != memcmp (uname->username, username_ptr, |
| uname->username_len)) |
| { |
| fprintf (stderr, "'username' does not match.\n" |
| "Expected: '%s'\tRecieved: '%.*s'. ", |
| username_ptr, |
| (int) uname->username_len, |
| uname->username); |
| mhdErrorExitDesc ("Wrong 'username'"); |
| } |
| else if (NULL != uname->userhash_hex) |
| mhdErrorExitDesc ("'userhash_hex' is NOT NULL"); |
| else if (0 != uname->userhash_hex_len) |
| mhdErrorExitDesc ("'userhash_hex_len' is NOT zero"); |
| else if (NULL != uname->userhash_bin) |
| mhdErrorExitDesc ("'userhash_bin' is NOT NULL"); |
| } |
| if (algo3 != uname->algo3) |
| { |
| fprintf (stderr, "Unexpected 'algo3'.\n" |
| "Expected: %d\tRecieved: %d. ", |
| (int) algo3, |
| (int) uname->algo3); |
| mhdErrorExitDesc ("Wrong 'algo3'"); |
| } |
| MHD_free (uname); |
| |
| if (! test_userdigest) |
| check_res = |
| MHD_digest_auth_check3 (connection, REALM_VAL, username_ptr, |
| PASSWORD_VALUE, |
| 50 * TIMEOUTS_VAL, |
| 0, |
| (enum MHD_DigestAuthMultiQOP) qop, |
| (enum MHD_DigestAuthMultiAlgo3) algo3); |
| else |
| check_res = |
| MHD_digest_auth_check_digest3 (connection, REALM_VAL, username_ptr, |
| userdigest_bin, userdigest_bin_size, |
| 50 * TIMEOUTS_VAL, |
| 0, |
| (enum MHD_DigestAuthMultiQOP) qop, |
| (enum MHD_DigestAuthMultiAlgo3) algo3); |
| |
| if (test_rfc2069) |
| { |
| if ((0 != tr_p->uri_num) && (1 == tr_p->req_num)) |
| expect_res = MHD_DAUTH_NONCE_STALE; |
| else |
| expect_res = MHD_DAUTH_OK; |
| } |
| else if (test_bind_uri) |
| { |
| if ((0 != tr_p->uri_num) && (1 == tr_p->req_num)) |
| expect_res = MHD_DAUTH_NONCE_OTHER_COND; |
| else |
| expect_res = MHD_DAUTH_OK; |
| } |
| else |
| expect_res = MHD_DAUTH_OK; |
| |
| switch (check_res) |
| { |
| /* Conditionally valid results */ |
| case MHD_DAUTH_OK: |
| if (expect_res == MHD_DAUTH_OK) |
| { |
| if (verbose) |
| printf ("Got valid auth check result: MHD_DAUTH_OK.\n"); |
| } |
| else |
| mhdErrorExitDesc ("MHD_digest_auth_check[_digest]3()' returned " \ |
| "MHD_DAUTH_OK"); |
| break; |
| case MHD_DAUTH_NONCE_STALE: |
| if (expect_res == MHD_DAUTH_NONCE_STALE) |
| { |
| if (verbose) |
| printf ("Got expected auth check result: MHD_DAUTH_NONCE_STALE.\n"); |
| } |
| else |
| mhdErrorExitDesc ("MHD_digest_auth_check[_digest]3()' returned " \ |
| "MHD_DAUTH_NONCE_STALE"); |
| break; |
| case MHD_DAUTH_NONCE_OTHER_COND: |
| if (expect_res == MHD_DAUTH_NONCE_OTHER_COND) |
| { |
| if (verbose) |
| printf ("Got expected auth check result: " |
| "MHD_DAUTH_NONCE_OTHER_COND.\n"); |
| } |
| else |
| mhdErrorExitDesc ("MHD_digest_auth_check[_digest]3()' returned " \ |
| "MHD_DAUTH_NONCE_OTHER_COND"); |
| break; |
| /* Invalid results */ |
| case MHD_DAUTH_NONCE_WRONG: |
| mhdErrorExitDesc ("MHD_digest_auth_check[_digest]3()' returned " \ |
| "MHD_DAUTH_NONCE_WRONG"); |
| break; |
| case MHD_DAUTH_ERROR: |
| externalErrorExitDesc ("General error returned " \ |
| "by 'MHD_digest_auth_check[_digest]3()'"); |
| break; |
| case MHD_DAUTH_WRONG_USERNAME: |
| mhdErrorExitDesc ("MHD_digest_auth_check[_digest]3()' returned " \ |
| "MHD_DAUTH_WRONG_USERNAME"); |
| break; |
| case MHD_DAUTH_RESPONSE_WRONG: |
| mhdErrorExitDesc ("MHD_digest_auth_check[_digest]3()' returned " \ |
| "MHD_DAUTH_RESPONSE_WRONG"); |
| break; |
| case MHD_DAUTH_WRONG_HEADER: |
| mhdErrorExitDesc ("MHD_digest_auth_check[_digest]3()' returned " \ |
| "MHD_DAUTH_WRONG_HEADER"); |
| break; |
| case MHD_DAUTH_WRONG_REALM: |
| case MHD_DAUTH_WRONG_URI: |
| case MHD_DAUTH_WRONG_QOP: |
| case MHD_DAUTH_WRONG_ALGO: |
| case MHD_DAUTH_TOO_LARGE: |
| fprintf (stderr, "'MHD_digest_auth_check[_digest]3()' returned " |
| "unexpected result: %d. ", |
| check_res); |
| mhdErrorExitDesc ("Wrong returned code"); |
| break; |
| default: |
| fprintf (stderr, "'MHD_digest_auth_check[_digest]3()' returned " |
| "impossible result code: %d. ", |
| check_res); |
| mhdErrorExitDesc ("Impossible returned code"); |
| } |
| fflush (stderr); |
| fflush (stdout); |
| |
| if (MHD_DAUTH_OK == check_res) |
| { |
| response = |
| MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (PAGE), |
| (const void *) PAGE); |
| if (NULL == response) |
| mhdErrorExitDesc ("Response creation failed"); |
| |
| if (MHD_YES != |
| MHD_queue_response (connection, MHD_HTTP_OK, response)) |
| mhdErrorExitDesc ("'MHD_queue_response()' failed"); |
| } |
| else if ((MHD_DAUTH_NONCE_STALE == check_res) || |
| (MHD_DAUTH_NONCE_OTHER_COND == check_res)) |
| { |
| response = |
| MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (DENIED), |
| (const void *) DENIED); |
| if (NULL == response) |
| mhdErrorExitDesc ("Response creation failed"); |
| res = |
| MHD_queue_auth_required_response3 (connection, REALM_VAL, |
| OPAQUE_VALUE, |
| "/", response, 1, |
| (enum MHD_DigestAuthMultiQOP) qop, |
| (enum MHD_DigestAuthMultiAlgo3) |
| algo3, |
| test_userhash, 0); |
| if (MHD_YES != res) |
| mhdErrorExitDesc ("'MHD_queue_auth_required_response3()' failed"); |
| } |
| else |
| externalErrorExitDesc ("Wrong 'check_res' value"); |
| } |
| else |
| { |
| /* No Digest auth header */ |
| if ((1 != tr_p->req_num) || (0 != tr_p->uri_num)) |
| { |
| fprintf (stderr, "Received request number %u for URI number %u " |
| "without Digest Authorisation header. ", |
| tr_p->req_num, tr_p->uri_num + 1); |
| mhdErrorExitDesc ("Wrong requests sequence"); |
| } |
| |
| response = |
| MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (DENIED), |
| (const void *) DENIED); |
| if (NULL == response) |
| mhdErrorExitDesc ("Response creation failed"); |
| res = |
| MHD_queue_auth_required_response3 (connection, REALM_VAL, OPAQUE_VALUE, |
| "/", response, 0, |
| (enum MHD_DigestAuthMultiQOP) qop, |
| (enum MHD_DigestAuthMultiAlgo3) algo3, |
| test_userhash, 0); |
| if (MHD_YES != res) |
| mhdErrorExitDesc ("'MHD_queue_auth_required_response3()' failed"); |
| } |
| } |
| else if (2 == test_oldapi) |
| { |
| /* Use old API v2 */ |
| char *username; |
| int check_res; |
| int expect_res; |
| |
| username = MHD_digest_auth_get_username (connection); |
| if (NULL != username) |
| { /* Has a valid username in header */ |
| if (0 != strcmp (username, username_ptr)) |
| { |
| fprintf (stderr, "'username' does not match.\n" |
| "Expected: '%s'\tRecieved: '%s'. ", |
| username_ptr, |
| username); |
| mhdErrorExitDesc ("Wrong 'username'"); |
| } |
| MHD_free (username); |
| |
| if (! test_userdigest) |
| check_res = |
| MHD_digest_auth_check2 (connection, REALM_VAL, username_ptr, |
| PASSWORD_VALUE, |
| 50 * TIMEOUTS_VAL, |
| test_sha256 ? |
| MHD_DIGEST_ALG_SHA256 : MHD_DIGEST_ALG_MD5); |
| else |
| check_res = |
| MHD_digest_auth_check_digest2 (connection, REALM_VAL, username_ptr, |
| userdigest_bin, userdigest_bin_size, |
| 50 * TIMEOUTS_VAL, |
| test_sha256 ? |
| MHD_DIGEST_ALG_SHA256 : |
| MHD_DIGEST_ALG_MD5); |
| |
| if (test_bind_uri) |
| { |
| if ((0 != tr_p->uri_num) && (1 == tr_p->req_num)) |
| expect_res = MHD_INVALID_NONCE; |
| else |
| expect_res = MHD_YES; |
| } |
| else |
| expect_res = MHD_YES; |
| |
| if (expect_res != check_res) |
| { |
| fprintf (stderr, "'MHD_digest_auth_check[_digest]2()' returned " |
| "unexpected result '%d', while expected is '%d. ", |
| check_res, expect_res); |
| mhdErrorExitDesc ("Wrong 'MHD_digest_auth_check[_digest]2()' result"); |
| } |
| response = |
| MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (PAGE), |
| (const void *) PAGE); |
| if (NULL == response) |
| mhdErrorExitDesc ("Response creation failed"); |
| |
| if (MHD_YES == expect_res) |
| { |
| if (MHD_YES != |
| MHD_queue_response (connection, MHD_HTTP_OK, response)) |
| mhdErrorExitDesc ("'MHD_queue_response()' failed"); |
| } |
| else if (MHD_INVALID_NONCE == expect_res) |
| { |
| if (MHD_YES != |
| MHD_queue_auth_fail_response2 (connection, REALM_VAL, OPAQUE_VALUE, |
| response, 1, |
| test_sha256 ? |
| MHD_DIGEST_ALG_SHA256 : |
| MHD_DIGEST_ALG_MD5)) |
| mhdErrorExitDesc ("'MHD_queue_auth_fail_response2()' failed"); |
| } |
| else |
| externalErrorExitDesc ("Wrong 'check_res' value"); |
| } |
| else |
| { |
| /* Has no valid username in header */ |
| if ((1 != tr_p->req_num) || (0 != tr_p->uri_num)) |
| { |
| fprintf (stderr, "Received request number %u for URI number %u " |
| "without Digest Authorisation header. ", |
| tr_p->req_num, tr_p->uri_num + 1); |
| mhdErrorExitDesc ("Wrong requests sequence"); |
| } |
| response = |
| MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (DENIED), |
| (const void *) DENIED); |
| if (NULL == response) |
| mhdErrorExitDesc ("Response creation failed"); |
| |
| res = MHD_queue_auth_fail_response2 (connection, REALM_VAL, OPAQUE_VALUE, |
| response, 0, |
| test_sha256 ? |
| MHD_DIGEST_ALG_SHA256 : |
| MHD_DIGEST_ALG_MD5); |
| if (MHD_YES != res) |
| mhdErrorExitDesc ("'MHD_queue_auth_fail_response2()' failed"); |
| } |
| } |
| else if (1 == test_oldapi) |
| { |
| /* Use old API v1 */ |
| char *username; |
| int check_res; |
| int expect_res; |
| |
| username = MHD_digest_auth_get_username (connection); |
| if (NULL != username) |
| { /* Has a valid username in header */ |
| if (0 != strcmp (username, username_ptr)) |
| { |
| fprintf (stderr, "'username' does not match.\n" |
| "Expected: '%s'\tRecieved: '%s'. ", |
| username_ptr, |
| username); |
| mhdErrorExitDesc ("Wrong 'username'"); |
| } |
| MHD_free (username); |
| |
| if (! test_userdigest) |
| check_res = |
| MHD_digest_auth_check (connection, REALM_VAL, username_ptr, |
| PASSWORD_VALUE, |
| 50 * TIMEOUTS_VAL); |
| else |
| check_res = |
| MHD_digest_auth_check_digest (connection, REALM_VAL, username_ptr, |
| userdigest_bin, |
| 50 * TIMEOUTS_VAL); |
| |
| if (test_bind_uri) |
| { |
| if ((0 != tr_p->uri_num) && (1 == tr_p->req_num)) |
| expect_res = MHD_INVALID_NONCE; |
| else |
| expect_res = MHD_YES; |
| } |
| else |
| expect_res = MHD_YES; |
| |
| if (expect_res != check_res) |
| { |
| fprintf (stderr, "'MHD_digest_auth_check[_digest]()' returned " |
| "unexpected result '%d', while expected is '%d. ", |
| check_res, expect_res); |
| mhdErrorExitDesc ("Wrong 'MHD_digest_auth_check[_digest]()' result"); |
| } |
| |
| response = |
| MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (PAGE), |
| (const void *) PAGE); |
| if (NULL == response) |
| mhdErrorExitDesc ("Response creation failed"); |
| |
| if (MHD_YES == expect_res) |
| { |
| if (MHD_YES != |
| MHD_queue_response (connection, MHD_HTTP_OK, response)) |
| mhdErrorExitDesc ("'MHD_queue_response()' failed"); |
| } |
| else if (MHD_INVALID_NONCE == expect_res) |
| { |
| if (MHD_YES != |
| MHD_queue_auth_fail_response (connection, REALM_VAL, OPAQUE_VALUE, |
| response, 1)) |
| mhdErrorExitDesc ("'MHD_queue_auth_fail_response()' failed"); |
| } |
| else |
| externalErrorExitDesc ("Wrong 'check_res' value"); |
| } |
| else |
| { |
| /* Has no valid username in header */ |
| if ((1 != tr_p->req_num) || (0 != tr_p->uri_num)) |
| { |
| fprintf (stderr, "Received request number %u for URI number %u " |
| "without Digest Authorisation header. ", |
| tr_p->req_num, tr_p->uri_num + 1); |
| mhdErrorExitDesc ("Wrong requests sequence"); |
| } |
| response = |
| MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (DENIED), |
| (const void *) DENIED); |
| if (NULL == response) |
| mhdErrorExitDesc ("Response creation failed"); |
| |
| res = MHD_queue_auth_fail_response (connection, REALM_VAL, OPAQUE_VALUE, |
| response, 0); |
| if (MHD_YES != res) |
| mhdErrorExitDesc ("'MHD_queue_auth_fail_response()' failed"); |
| } |
| } |
| else |
| externalErrorExitDesc ("Wrong 'test_oldapi' value"); |
| |
| MHD_destroy_response (response); |
| return MHD_YES; |
| } |
| |
| |
| /** |
| * |
| * @param c the CURL handle to use |
| * @param port the port to set |
| * @param uri_num the number of URI, should be 0, 1 or 2 |
| */ |
| static void |
| setCURL_rq_path (CURL *c, uint16_t port, unsigned int uri_num) |
| { |
| const char *req_path; |
| char uri[512]; |
| int res; |
| |
| if (0 == uri_num) |
| req_path = MHD_URI_BASE_PATH; |
| else if (1 == uri_num) |
| req_path = MHD_URI_BASE_PATH2; |
| else |
| req_path = MHD_URI_BASE_PATH3; |
| /* A workaround for some old libcurl versions, which ignore the specified |
| * port by CURLOPT_PORT when authorisation is used. */ |
| res = snprintf (uri, (sizeof(uri) / sizeof(uri[0])), |
| "http://127.0.0.1:%u%s", (unsigned int) port, |
| req_path); |
| if ((0 >= res) || ((sizeof(uri) / sizeof(uri[0])) <= (size_t) res)) |
| externalErrorExitDesc ("Cannot form request URL"); |
| |
| if (CURLE_OK != curl_easy_setopt (c, CURLOPT_URL, uri)) |
| libcurlErrorExitDesc ("Cannot set request URL"); |
| } |
| |
| |
| static CURL * |
| setupCURL (void *cbc, uint16_t port) |
| { |
| CURL *c; |
| |
| c = curl_easy_init (); |
| if (NULL == c) |
| libcurlErrorExitDesc ("curl_easy_init() failed"); |
| |
| if ((CURLE_OK != curl_easy_setopt (c, CURLOPT_NOSIGNAL, 1L)) || |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_WRITEFUNCTION, |
| ©Buffer)) || |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_WRITEDATA, cbc)) || |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_CONNECTTIMEOUT, |
| ((long) TIMEOUTS_VAL))) || |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_HTTP_VERSION, |
| CURL_HTTP_VERSION_1_1)) || |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_TIMEOUT, |
| ((long) TIMEOUTS_VAL))) || |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_ERRORBUFFER, |
| libcurl_errbuf)) || |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_FAILONERROR, 0L)) || |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_HTTPAUTH, |
| (long) CURLAUTH_DIGEST)) || |
| #if CURL_AT_LEAST_VERSION (7,19,1) |
| /* Need version 7.19.1 for separate username and password */ |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_USERNAME, username_ptr)) || |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_PASSWORD, PASSWORD_VALUE)) || |
| #endif /* CURL_AT_LEAST_VERSION(7,19,1) */ |
| #ifdef _DEBUG |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_VERBOSE, 1L)) || |
| #endif /* _DEBUG */ |
| #if CURL_AT_LEAST_VERSION (7, 85, 0) |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_PROTOCOLS_STR, "http")) || |
| #elif CURL_AT_LEAST_VERSION (7, 19, 4) |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_PROTOCOLS, CURLPROTO_HTTP)) || |
| #endif /* CURL_AT_LEAST_VERSION (7, 19, 4) */ |
| #if CURL_AT_LEAST_VERSION (7, 45, 0) |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_DEFAULT_PROTOCOL, "http")) || |
| #endif /* CURL_AT_LEAST_VERSION (7, 45, 0) */ |
| (CURLE_OK != curl_easy_setopt (c, CURLOPT_PORT, ((long) port)))) |
| libcurlErrorExitDesc ("curl_easy_setopt() failed"); |
| |
| setCURL_rq_path (c, port, 0); |
| |
| return c; |
| } |
| |
| |
| static CURLcode |
| performQueryExternal (struct MHD_Daemon *d, CURL *c, CURLM **multi_reuse) |
| { |
| CURLM *multi; |
| time_t start; |
| struct timeval tv; |
| CURLcode ret; |
| |
| ret = CURLE_FAILED_INIT; /* will be replaced with real result */ |
| if (NULL != *multi_reuse) |
| multi = *multi_reuse; |
| else |
| { |
| multi = curl_multi_init (); |
| if (multi == NULL) |
| libcurlErrorExitDesc ("curl_multi_init() failed"); |
| *multi_reuse = multi; |
| } |
| if (CURLM_OK != curl_multi_add_handle (multi, c)) |
| libcurlErrorExitDesc ("curl_multi_add_handle() failed"); |
| |
| start = time (NULL); |
| while (time (NULL) - start <= TIMEOUTS_VAL) |
| { |
| fd_set rs; |
| fd_set ws; |
| fd_set es; |
| MHD_socket maxMhdSk; |
| int maxCurlSk; |
| int running; |
| |
| maxMhdSk = MHD_INVALID_SOCKET; |
| maxCurlSk = -1; |
| FD_ZERO (&rs); |
| FD_ZERO (&ws); |
| FD_ZERO (&es); |
| if (NULL != multi) |
| { |
| curl_multi_perform (multi, &running); |
| if (0 == running) |
| { |
| struct CURLMsg *msg; |
| int msgLeft; |
| int totalMsgs = 0; |
| do |
| { |
| msg = curl_multi_info_read (multi, &msgLeft); |
| if (NULL == msg) |
| libcurlErrorExitDesc ("curl_multi_info_read() failed"); |
| totalMsgs++; |
| if (CURLMSG_DONE == msg->msg) |
| ret = msg->data.result; |
| } while (msgLeft > 0); |
| if (1 != totalMsgs) |
| { |
| fprintf (stderr, |
| "curl_multi_info_read returned wrong " |
| "number of results (%d).\n", |
| totalMsgs); |
| externalErrorExit (); |
| } |
| curl_multi_remove_handle (multi, c); |
| multi = NULL; |
| } |
| else |
| { |
| if (CURLM_OK != curl_multi_fdset (multi, &rs, &ws, &es, &maxCurlSk)) |
| libcurlErrorExitDesc ("curl_multi_fdset() failed"); |
| } |
| } |
| if (NULL == multi) |
| { /* libcurl has finished, check whether MHD still needs to perform cleanup */ |
| if (0 != MHD_get_timeout64s (d)) |
| break; /* MHD finished as well */ |
| } |
| if (MHD_YES != MHD_get_fdset (d, &rs, &ws, &es, &maxMhdSk)) |
| mhdErrorExitDesc ("MHD_get_fdset() failed"); |
| tv.tv_sec = 0; |
| tv.tv_usec = 200000; |
| #ifdef MHD_POSIX_SOCKETS |
| if (maxMhdSk > maxCurlSk) |
| maxCurlSk = maxMhdSk; |
| #endif /* MHD_POSIX_SOCKETS */ |
| if (-1 == select (maxCurlSk + 1, &rs, &ws, &es, &tv)) |
| { |
| #ifdef MHD_POSIX_SOCKETS |
| if (EINTR != errno) |
| externalErrorExitDesc ("Unexpected select() error"); |
| #else |
| if ((WSAEINVAL != WSAGetLastError ()) || |
| (0 != rs.fd_count) || (0 != ws.fd_count) || (0 != es.fd_count) ) |
| externalErrorExitDesc ("Unexpected select() error"); |
| Sleep (200); |
| #endif |
| } |
| if (MHD_YES != MHD_run_from_select (d, &rs, &ws, &es)) |
| mhdErrorExitDesc ("MHD_run_from_select() failed"); |
| } |
| |
| return ret; |
| } |
| |
| |
| /** |
| * Check request result |
| * @param curl_code the CURL easy return code |
| * @param pcbc the pointer struct CBC |
| * @return non-zero if success, zero if failed |
| */ |
| static unsigned int |
| check_result (CURLcode curl_code, CURL *c, struct CBC *pcbc) |
| { |
| long code; |
| if (CURLE_OK != curl_easy_getinfo (c, CURLINFO_RESPONSE_CODE, &code)) |
| libcurlErrorExit (); |
| |
| if (MHD_HTTP_OK != code) |
| { |
| fprintf (stderr, "Request returned wrong code: %ld.\n", |
| code); |
| return 0; |
| } |
| |
| if (CURLE_OK != curl_code) |
| { |
| fflush (stdout); |
| if (0 != libcurl_errbuf[0]) |
| fprintf (stderr, "Request failed. " |
| "libcurl error: '%s'.\n" |
| "libcurl error description: '%s'.\n", |
| curl_easy_strerror (curl_code), |
| libcurl_errbuf); |
| else |
| fprintf (stderr, "Request failed. " |
| "libcurl error: '%s'.\n", |
| curl_easy_strerror (curl_code)); |
| fflush (stderr); |
| return 0; |
| } |
| |
| if (pcbc->pos != MHD_STATICSTR_LEN_ (PAGE)) |
| { |
| fprintf (stderr, "Got %u bytes ('%.*s'), expected %u bytes. ", |
| (unsigned) pcbc->pos, (int) pcbc->pos, pcbc->buf, |
| (unsigned) MHD_STATICSTR_LEN_ (PAGE)); |
| mhdErrorExitDesc ("Wrong returned data length"); |
| } |
| if (0 != memcmp (PAGE, pcbc->buf, pcbc->pos)) |
| { |
| fprintf (stderr, "Got invalid response '%.*s'. ", |
| (int) pcbc->pos, pcbc->buf); |
| mhdErrorExitDesc ("Wrong returned data"); |
| } |
| return 1; |
| } |
| |
| |
| static unsigned int |
| testDigestAuth (void) |
| { |
| unsigned int dauth_nonce_bind; |
| struct MHD_Daemon *d; |
| uint16_t port; |
| struct CBC cbc; |
| struct req_track rq_tr; |
| char buf[2048]; |
| CURL *c; |
| CURLM *multi_reuse; |
| int failed = 0; |
| |
| if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT)) |
| port = 0; |
| else |
| port = 4210; |
| |
| if (1) |
| { |
| uint8_t salt[8]; /* Use local variable to test MHD "copy" function */ |
| if (! gen_good_rnd (salt, sizeof(salt))) |
| { |
| fprintf (stderr, "WARNING: the random buffer (used as salt value) is not " |
| "initialised completely, nonce generation may be " |
| "predictable in this test.\n"); |
| fflush (stderr); |
| } |
| |
| dauth_nonce_bind = MHD_DAUTH_BIND_NONCE_NONE; |
| if (test_bind_all) |
| dauth_nonce_bind |= |
| (MHD_DAUTH_BIND_NONCE_CLIENT_IP | MHD_DAUTH_BIND_NONCE_REALM); |
| if (test_bind_uri) |
| dauth_nonce_bind |= MHD_DAUTH_BIND_NONCE_URI_PARAMS; |
| |
| d = MHD_start_daemon (MHD_USE_ERROR_LOG, |
| port, NULL, NULL, |
| &ahc_echo, &rq_tr, |
| MHD_OPTION_DIGEST_AUTH_RANDOM_COPY, |
| sizeof (salt), salt, |
| MHD_OPTION_NONCE_NC_SIZE, 300, |
| MHD_OPTION_DIGEST_AUTH_NONCE_BIND_TYPE, |
| dauth_nonce_bind, |
| MHD_OPTION_END); |
| } |
| if (d == NULL) |
| return 1; |
| if (0 == port) |
| { |
| const union MHD_DaemonInfo *dinfo; |
| |
| dinfo = MHD_get_daemon_info (d, |
| MHD_DAEMON_INFO_BIND_PORT); |
| if ( (NULL == dinfo) || |
| (0 == dinfo->port) ) |
| mhdErrorExitDesc ("MHD_get_daemon_info() failed"); |
| port = dinfo->port; |
| } |
| |
| /* First request */ |
| rq_tr.req_num = 0; |
| rq_tr.uri_num = 0; |
| cbc.buf = buf; |
| cbc.size = sizeof (buf); |
| cbc.pos = 0; |
| memset (cbc.buf, 0, cbc.size); |
| c = setupCURL (&cbc, port); |
| multi_reuse = NULL; |
| /* First request */ |
| if (check_result (performQueryExternal (d, c, &multi_reuse), c, &cbc)) |
| { |
| fflush (stderr); |
| if (verbose) |
| printf ("Got first expected response.\n"); |
| fflush (stdout); |
| } |
| else |
| { |
| fprintf (stderr, "First request FAILED.\n"); |
| failed = 1; |
| } |
| cbc.pos = 0; /* Reset buffer position */ |
| rq_tr.req_num = 0; |
| /* Second request */ |
| setCURL_rq_path (c, port, ++rq_tr.uri_num); |
| if (check_result (performQueryExternal (d, c, &multi_reuse), c, &cbc)) |
| { |
| fflush (stderr); |
| if (verbose) |
| printf ("Got second expected response.\n"); |
| fflush (stdout); |
| } |
| else |
| { |
| fprintf (stderr, "Second request FAILED.\n"); |
| failed = 1; |
| } |
| cbc.pos = 0; /* Reset buffer position */ |
| rq_tr.req_num = 0; |
| /* Third request */ |
| if (NULL != multi_reuse) |
| curl_multi_cleanup (multi_reuse); |
| multi_reuse = NULL; /* Force new connection */ |
| setCURL_rq_path (c, port, ++rq_tr.uri_num); |
| if (check_result (performQueryExternal (d, c, &multi_reuse), c, &cbc)) |
| { |
| fflush (stderr); |
| if (verbose) |
| printf ("Got third expected response.\n"); |
| fflush (stdout); |
| } |
| else |
| { |
| fprintf (stderr, "Third request FAILED.\n"); |
| failed = 1; |
| } |
| |
| curl_easy_cleanup (c); |
| if (NULL != multi_reuse) |
| curl_multi_cleanup (multi_reuse); |
| |
| MHD_stop_daemon (d); |
| return failed ? 1 : 0; |
| } |
| |
| |
| int |
| main (int argc, char *const *argv) |
| { |
| #if ! CURL_AT_LEAST_VERSION (7,19,1) |
| (void) argc; (void) argv; /* Unused. Silent compiler warning. */ |
| /* Need version 7.19.1 or newer for separate username and password */ |
| fprintf (stderr, "Required libcurl at least version 7.19.1" |
| " to run this test.\n"); |
| return 77; |
| #else /* CURL_AT_LEAST_VERSION(7,19,1) */ |
| unsigned int errorCount = 0; |
| const curl_version_info_data *const curl_info = |
| curl_version_info (CURLVERSION_NOW); |
| int curl_sspi; |
| (void) argc; (void) argv; /* Unused. Silent compiler warning. */ |
| |
| #ifdef NEED_GCRYP_INIT |
| gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0); |
| #ifdef GCRYCTL_INITIALIZATION_FINISHED |
| gcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0); |
| #endif /* GCRYCTL_INITIALIZATION_FINISHED */ |
| #endif /* NEED_GCRYP_INIT */ |
| /* Test type and test parameters */ |
| verbose = ! (has_param (argc, argv, "-q") || |
| has_param (argc, argv, "--quiet") || |
| has_param (argc, argv, "-s") || |
| has_param (argc, argv, "--silent")); |
| test_oldapi = 0; |
| if (has_in_name (argv[0], "_oldapi1")) |
| test_oldapi = 1; |
| if (has_in_name (argv[0], "_oldapi2")) |
| test_oldapi = 2; |
| test_userhash = has_in_name (argv[0], "_userhash"); |
| test_userdigest = has_in_name (argv[0], "_userdigest"); |
| test_sha256 = has_in_name (argv[0], "_sha256"); |
| test_rfc2069 = has_in_name (argv[0], "_rfc2069"); |
| test_bind_all = has_in_name (argv[0], "_bind_all"); |
| test_bind_uri = has_in_name (argv[0], "_bind_uri"); |
| |
| /* Wrong test types combinations */ |
| if (1 == test_oldapi) |
| { |
| if (test_sha256) |
| return 99; |
| } |
| if (test_oldapi) |
| { |
| if (test_userhash || test_rfc2069) |
| return 99; |
| } |
| if (test_rfc2069) |
| { |
| if (test_userhash) |
| return 99; |
| } |
| |
| /* Curl version and known bugs checks */ |
| curl_sspi = 0; |
| #ifdef CURL_VERSION_SSPI |
| if (0 != (curl_info->features & CURL_VERSION_SSPI)) |
| curl_sspi = 1; |
| #endif /* CURL_VERSION_SSPI */ |
| |
| if ((CURL_VERSION_BITS (7,63,0) > curl_info->version_num) && |
| (CURL_VERSION_BITS (7,62,0) <= curl_info->version_num) ) |
| { |
| fprintf (stderr, "libcurl version 7.62.x has bug in processing " |
| "URI with GET arguments for Digest Auth.\n"); |
| fprintf (stderr, "This test with libcurl %u.%u.%u cannot be performed.\n", |
| 0xFF & (curl_info->version_num >> 16), |
| 0xFF & (curl_info->version_num >> 8), |
| 0xFF & (curl_info->version_num >> 0)); |
| return 77; |
| } |
| if (test_userhash) |
| { |
| if (curl_sspi) |
| { |
| printf ("WARNING: Windows SSPI API does not support 'userhash'.\n"); |
| printf ("This test just checks Digest Auth compatibility with " |
| "the clients without 'userhash' support " |
| "when 'userhash=true' is specified by MHD.\n"); |
| curl_uses_usehash = 0; |
| } |
| else if (CURL_VERSION_BITS (7,57,0) > curl_info->version_num) |
| { |
| printf ("WARNING: libcurl before version 7.57.0 does not " |
| "support 'userhash'.\n"); |
| printf ("This test just checks Digest Auth compatibility with " |
| "libcurl version %u.%u.%u without 'userhash' support " |
| "when 'userhash=true' is specified by MHD.\n", |
| 0xFF & (curl_info->version_num >> 16), |
| 0xFF & (curl_info->version_num >> 8), |
| 0xFF & (curl_info->version_num >> 0)); |
| curl_uses_usehash = 0; |
| } |
| else if (CURL_VERSION_BITS (7,81,0) > curl_info->version_num) |
| { |
| fprintf (stderr, "Required libcurl at least version 7.81.0 " |
| "to run this test with userhash.\n"); |
| fprintf (stderr, "This libcurl version %u.%u.%u has broken digest " |
| "calculation when userhash is used.\n", |
| 0xFF & (curl_info->version_num >> 16), |
| 0xFF & (curl_info->version_num >> 8), |
| 0xFF & (curl_info->version_num >> 0)); |
| return 77; |
| } |
| else |
| curl_uses_usehash = ! 0; |
| } |
| else |
| curl_uses_usehash = 0; |
| |
| if (test_sha256) |
| { |
| if (curl_sspi) |
| { |
| fprintf (stderr, "Windows SSPI API does not support SHA-256 digests.\n"); |
| return 77; |
| } |
| else if (CURL_VERSION_BITS (7,57,0) > curl_info->version_num) |
| { |
| fprintf (stderr, "Required libcurl at least version 7.57.0 " |
| "to run this test with SHA-256.\n"); |
| fprintf (stderr, "This libcurl version %u.%u.%u " |
| "does not support SHA-256.\n", |
| 0xFF & (curl_info->version_num >> 16), |
| 0xFF & (curl_info->version_num >> 8), |
| 0xFF & (curl_info->version_num >> 0)); |
| return 77; |
| } |
| } |
| |
| test_global_init (); |
| |
| errorCount += testDigestAuth (); |
| if (errorCount != 0) |
| fprintf (stderr, "Error (code: %u)\n", errorCount); |
| test_global_cleanup (); |
| return (0 == errorCount) ? 0 : 1; /* 0 == pass */ |
| #endif /* CURL_AT_LEAST_VERSION(7,19,1) */ |
| } |