summaryrefslogtreecommitdiff
path: root/tests/libtest/libntlmconnect.c
diff options
context:
space:
mode:
authorJoe Mason <jmason@rim.com>2012-08-08 18:15:04 -0400
committerDaniel Stenberg <daniel@haxx.se>2012-08-31 22:53:17 +0200
commit3b7d31c1eddc52431d8944aae6c7ab8aa7e29570 (patch)
treee7add305a666bee9085057c9fe47b23455f19828 /tests/libtest/libntlmconnect.c
parentd4af0bb8f6b7b0f3cee8f387c8fa4dba69ba63d8 (diff)
downloadgnurl-3b7d31c1eddc52431d8944aae6c7ab8aa7e29570.tar.gz
gnurl-3b7d31c1eddc52431d8944aae6c7ab8aa7e29570.tar.bz2
gnurl-3b7d31c1eddc52431d8944aae6c7ab8aa7e29570.zip
NTLM: verify multiple connections work
Add test2032 to test that NTLM does not switch connections in the middle of the handshake
Diffstat (limited to 'tests/libtest/libntlmconnect.c')
-rw-r--r--tests/libtest/libntlmconnect.c246
1 files changed, 246 insertions, 0 deletions
diff --git a/tests/libtest/libntlmconnect.c b/tests/libtest/libntlmconnect.c
new file mode 100644
index 000000000..8486f3c31
--- /dev/null
+++ b/tests/libtest/libntlmconnect.c
@@ -0,0 +1,246 @@
+/***************************************************************************
+ * _ _ ____ _
+ * Project ___| | | | _ \| |
+ * / __| | | | |_) | |
+ * | (__| |_| | _ <| |___
+ * \___|\___/|_| \_\_____|
+ *
+ * Copyright (C) 2012, Daniel Stenberg, <daniel@haxx.se>, et al.
+ *
+ * This software is licensed as described in the file COPYING, which
+ * you should have received as part of this distribution. The terms
+ * are also available at http://curl.haxx.se/docs/copyright.html.
+ *
+ * You may opt to use, copy, modify, merge, publish, distribute and/or sell
+ * copies of the Software, and permit persons to whom the Software is
+ * furnished to do so, under the terms of the COPYING file.
+ *
+ * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
+ * KIND, either express or implied.
+ *
+ ***************************************************************************/
+#include "test.h"
+
+#include <assert.h>
+#include "testutil.h"
+#include "memdebug.h"
+
+#define TEST_HANG_TIMEOUT 5 * 1000
+#define MAX_EASY_HANDLES 3
+
+CURL *easy[MAX_EASY_HANDLES];
+curl_socket_t sockets[MAX_EASY_HANDLES];
+int res = 0;
+
+static size_t callback(char* ptr, size_t size, size_t nmemb, void* data)
+{
+ int idx = ((CURL **) data) - easy;
+ curl_socket_t sock;
+
+ char *output = malloc(size * nmemb + 1);
+ memcpy(output, ptr, size * nmemb);
+ output[size * nmemb] = '\0';
+ fprintf(stdout, "%s", output);
+ free(output);
+
+ res = curl_easy_getinfo(easy[idx], CURLINFO_LASTSOCKET, &sock);
+ if (CURLE_OK != res) {
+ fprintf(stderr, "Error reading CURLINFO_LASTSOCKET\n");
+ return 0;
+ }
+ /* sock will only be set for NTLM requests; for others it is -1 */
+ if (sock != -1) {
+ if (sockets[idx] == -1) {
+ /* Data was written for this request before the socket was detected by
+ multi_fdset. Record the socket now. */
+ sockets[idx] = sock;
+ }
+ else if (sock != sockets[idx]) {
+ fprintf(stderr, "Handle %d started on socket %d and moved to %d\n", idx,
+ sockets[idx], sock);
+ res = TEST_ERR_MAJOR_BAD;
+ return 0;
+ }
+ }
+ return size * nmemb;
+}
+
+enum HandleState {
+ ReadyForNewHandle,
+ NeedSocketForNewHandle,
+ NoMoreHandles
+};
+
+int test(char *url)
+{
+ CURLM *multi = NULL;
+ int running;
+ int i, j;
+ int num_handles = 0;
+ enum HandleState state = ReadyForNewHandle;
+ char* full_url = malloc(strlen(url) + 4 + 1);
+
+ start_test_timing();
+
+ if (!full_url) {
+ fprintf(stderr, "Not enough memory for full url\n");
+ return CURLE_OUT_OF_MEMORY;
+ }
+
+ for (i = 0; i < MAX_EASY_HANDLES; ++i) {
+ easy[i] = NULL;
+ sockets[i] = -1;
+ }
+
+ res = 0;
+ res_global_init(CURL_GLOBAL_ALL);
+ if(res) {
+ return res;
+ }
+
+ multi_init(multi);
+
+ for(;;) {
+ struct timeval interval;
+ fd_set fdread;
+ fd_set fdwrite;
+ fd_set fdexcep;
+ long timeout = -99;
+ curl_socket_t maxfd = -99;
+ bool found_new_socket = FALSE;
+
+ /* Start a new handle if we aren't at the max */
+ if (state == ReadyForNewHandle) {
+ easy_init(easy[num_handles]);
+
+ if (num_handles % 3 == 2) {
+ sprintf(full_url, "%s0200", url);
+ easy_setopt(easy[num_handles], CURLOPT_HTTPAUTH, CURLAUTH_NTLM);
+ } else {
+ sprintf(full_url, "%s0100", url);
+ easy_setopt(easy[num_handles], CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
+ }
+ easy_setopt(easy[num_handles], CURLOPT_FRESH_CONNECT, 1L);
+ easy_setopt(easy[num_handles], CURLOPT_URL, full_url);
+ easy_setopt(easy[num_handles], CURLOPT_VERBOSE, 1L);
+ easy_setopt(easy[num_handles], CURLOPT_HTTPGET, 1L);
+ easy_setopt(easy[num_handles], CURLOPT_USERPWD, "testuser:testpass");
+ easy_setopt(easy[num_handles], CURLOPT_WRITEFUNCTION, callback);
+ easy_setopt(easy[num_handles], CURLOPT_WRITEDATA, easy + num_handles);
+ easy_setopt(easy[num_handles], CURLOPT_HEADER, 1L);
+
+ multi_add_handle(multi, easy[num_handles]);
+ num_handles += 1;
+ state = NeedSocketForNewHandle;
+ }
+
+ multi_perform(multi, &running);
+ if (0 != res)
+ break;
+
+ abort_on_test_timeout();
+
+ if(!running && state == NoMoreHandles)
+ break; /* done */
+
+ FD_ZERO(&fdread);
+ FD_ZERO(&fdwrite);
+ FD_ZERO(&fdexcep);
+
+ multi_fdset(multi, &fdread, &fdwrite, &fdexcep, &maxfd);
+
+ /* At this point, maxfd is guaranteed to be greater or equal than -1. */
+
+ /* Any socket which is new in fdread is associated with the new handle */
+ for (i = 0; i <= maxfd; ++i) {
+ bool socket_exists = FALSE;
+ if (!FD_ISSET(i, &fdread)) {
+ continue;
+ }
+
+ /* Check if this socket was already detected for an earlier handle (or
+ for this handle, num_handles-1, in the callback */
+ for (j = 0; j < num_handles; ++j) {
+ if (sockets[j] == i) {
+ socket_exists = TRUE;
+ break;
+ }
+ }
+ if (socket_exists) {
+ continue;
+ }
+
+ if (found_new_socket || state != NeedSocketForNewHandle) {
+ fprintf(stderr, "Unexpected new socket\n");
+ res = TEST_ERR_MAJOR_BAD;
+ goto test_cleanup;
+ }
+
+ /* Now we know the socket is for the most recent handle, num_handles-1 */
+ if (sockets[num_handles-1] != -1) {
+ /* A socket for this handle was already detected in the callback; if it
+ matched socket_exists should be true and we would never get here */
+ assert(i != sockets[num_handles-1]);
+ fprintf(stderr, "Handle %d wrote to socket %d then detected on %d\n",
+ num_handles-1, sockets[num_handles-1], i);
+ res = TEST_ERR_MAJOR_BAD;
+ goto test_cleanup;
+ }
+ else {
+ sockets[num_handles-1] = i;
+ found_new_socket = TRUE;
+ /* continue to make sure there's only one new handle */
+ }
+ }
+
+ if (state == NeedSocketForNewHandle) {
+ if (found_new_socket) {
+ fprintf(stderr, "Warning: socket did not open immediately for new "
+ "handle (trying again)\n");
+ continue;
+ }
+ state = num_handles < MAX_EASY_HANDLES ? ReadyForNewHandle
+ : NoMoreHandles;
+ }
+
+ multi_timeout(multi, &timeout);
+
+ /* At this point, timeout is guaranteed to be greater or equal than -1. */
+
+ if(timeout != -1L) {
+ interval.tv_sec = timeout/1000;
+ interval.tv_usec = (timeout%1000)*1000;
+ }
+ else {
+ interval.tv_sec = TEST_HANG_TIMEOUT/1000+1;
+ interval.tv_usec = 0;
+ }
+
+ select_test(maxfd+1, &fdread, &fdwrite, &fdexcep, &interval);
+
+ abort_on_test_timeout();
+ }
+
+test_cleanup:
+
+ for (i = 0; i < MAX_EASY_HANDLES; ++i) {
+ if (easy[i]) {
+ if (multi) {
+ curl_multi_remove_handle(multi, easy[i]);
+ }
+ curl_easy_cleanup(easy[i]);
+ }
+ }
+
+ if (multi) {
+ curl_multi_cleanup(multi);
+ }
+
+ curl_global_cleanup();
+
+ if (full_url) {
+ free(full_url);
+ }
+
+ return res;
+}