[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[libmicrohttpd] 17/19: test_digestauth2: added new group of tests for Di
From: |
gnunet |
Subject: |
[libmicrohttpd] 17/19: test_digestauth2: added new group of tests for Digest Auth checking |
Date: |
Thu, 28 Jul 2022 06:26:21 +0200 |
This is an automated email from the git hooks/post-receive script.
karlson2k pushed a commit to branch master
in repository libmicrohttpd.
commit 2fd1a01fe010ea47654fd6b3053af619fb96dc37
Author: Evgeny Grin (Karlson2k) <k2k@narod.ru>
AuthorDate: Mon Jul 25 10:17:53 2022 +0300
test_digestauth2: added new group of tests for Digest Auth checking
---
src/testcurl/.gitignore | 5 +
src/testcurl/Makefile.am | 22 +-
src/testcurl/test_digestauth2.c | 1159 +++++++++++++++++++++++++++++++++++++++
3 files changed, 1185 insertions(+), 1 deletion(-)
diff --git a/src/testcurl/.gitignore b/src/testcurl/.gitignore
index e23f52c9..26e59bfc 100644
--- a/src/testcurl/.gitignore
+++ b/src/testcurl/.gitignore
@@ -157,3 +157,8 @@ core
/test_basicauth_preauth_oldapi
/test_digestauth_emu_ext
/test_digestauth_emu_ext_oldapi
+/test_digestauth2
+/test_digestauth2_oldapi
+/test_digestauth2_userhash
+/test_digestauth2_sha256
+/test_digestauth2_sha256_userhash
diff --git a/src/testcurl/Makefile.am b/src/testcurl/Makefile.am
index e46bbb2d..749e31e2 100644
--- a/src/testcurl/Makefile.am
+++ b/src/testcurl/Makefile.am
@@ -169,7 +169,12 @@ THREAD_ONLY_TESTS += \
check_PROGRAMS += \
test_digestauth_emu_ext \
- test_digestauth_emu_ext_oldapi
+ test_digestauth_emu_ext_oldapi \
+ test_digestauth2 \
+ test_digestauth2_oldapi \
+ test_digestauth2_userhash \
+ test_digestauth2_sha256 \
+ test_digestauth2_sha256_userhash
endif
if HEAVY_TESTS
@@ -279,6 +284,21 @@ test_digestauth_emu_ext_SOURCES = \
test_digestauth_emu_ext_oldapi_SOURCES = \
test_digestauth_emu_ext.c
+test_digestauth2_SOURCES = \
+ test_digestauth2.c mhd_has_param.h mhd_has_in_name.h
+
+test_digestauth2_oldapi_SOURCES = \
+ test_digestauth2.c mhd_has_param.h mhd_has_in_name.h
+
+test_digestauth2_userhash_SOURCES = \
+ test_digestauth2.c mhd_has_param.h mhd_has_in_name.h
+
+test_digestauth2_sha256_SOURCES = \
+ test_digestauth2.c mhd_has_param.h mhd_has_in_name.h
+
+test_digestauth2_sha256_userhash_SOURCES = \
+ test_digestauth2.c mhd_has_param.h mhd_has_in_name.h
+
test_get_iovec_SOURCES = \
test_get_iovec.c mhd_has_in_name.h
diff --git a/src/testcurl/test_digestauth2.c b/src/testcurl/test_digestauth2.c
new file mode 100644
index 00000000..0d6b844a
--- /dev/null
+++ b/src/testcurl/test_digestauth2.c
@@ -0,0 +1,1159 @@
+/*
+ This file is part of libmicrohttpd
+ Copyright (C) 2010 Christian Grothoff
+ Copyright (C) 2016-2022 Evgeny Grin (Karlson2k)
+
+ libmicrohttpd is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published
+ by the Free Software Foundation; either version 2, or (at your
+ option) any later version.
+
+ libmicrohttpd is distributed in the hope that it will be useful, but
+ WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with libmicrohttpd; see the file COPYING. If not, write to the
+ Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ Boston, MA 02110-1301, USA.
+*/
+
+/**
+ * @file test_digest2.c
+ * @brief Testcase for MHD Digest Authorisation
+ * @author Karlson2k (Evgeny Grin)
+ */
+
+#include "MHD_config.h"
+#include "platform.h"
+#include <curl/curl.h>
+#include <microhttpd.h>
+#include <stdlib.h>
+#include <string.h>
+#include <time.h>
+
+#ifndef _WIN32
+#include <sys/socket.h>
+#include <unistd.h>
+#else
+#include <wincrypt.h>
+#endif
+
+#include "mhd_has_param.h"
+#include "mhd_has_in_name.h"
+
+#ifndef MHD_STATICSTR_LEN_
+/**
+ * Determine length of static string / macro strings at compile time.
+ */
+#define MHD_STATICSTR_LEN_(macro) (sizeof(macro) / sizeof(char) - 1)
+#endif /* ! MHD_STATICSTR_LEN_ */
+
+#ifndef CURL_VERSION_BITS
+#define CURL_VERSION_BITS(x,y,z) ((x)<<16|(y)<<8|(z))
+#endif /* ! CURL_VERSION_BITS */
+#ifndef CURL_AT_LEAST_VERSION
+#define CURL_AT_LEAST_VERSION(x,y,z) \
+ (LIBCURL_VERSION_NUM >= CURL_VERSION_BITS(x, y, z))
+#endif /* ! CURL_AT_LEAST_VERSION */
+
+#ifndef _MHD_INSTRMACRO
+/* Quoted macro parameter */
+#define _MHD_INSTRMACRO(a) #a
+#endif /* ! _MHD_INSTRMACRO */
+#ifndef _MHD_STRMACRO
+/* Quoted expanded macro parameter */
+#define _MHD_STRMACRO(a) _MHD_INSTRMACRO (a)
+#endif /* ! _MHD_STRMACRO */
+
+#if defined(HAVE___FUNC__)
+#define externalErrorExit(ignore) \
+ _externalErrorExit_func(NULL, __func__, __LINE__)
+#define externalErrorExitDesc(errDesc) \
+ _externalErrorExit_func(errDesc, __func__, __LINE__)
+#define libcurlErrorExit(ignore) \
+ _libcurlErrorExit_func(NULL, __func__, __LINE__)
+#define libcurlErrorExitDesc(errDesc) \
+ _libcurlErrorExit_func(errDesc, __func__, __LINE__)
+#define mhdErrorExit(ignore) \
+ _mhdErrorExit_func(NULL, __func__, __LINE__)
+#define mhdErrorExitDesc(errDesc) \
+ _mhdErrorExit_func(errDesc, __func__, __LINE__)
+#define checkCURLE_OK(libcurlcall) \
+ _checkCURLE_OK_func((libcurlcall), _MHD_STRMACRO(libcurlcall), \
+ __func__, __LINE__)
+#elif defined(HAVE___FUNCTION__)
+#define externalErrorExit(ignore) \
+ _externalErrorExit_func(NULL, __FUNCTION__, __LINE__)
+#define externalErrorExitDesc(errDesc) \
+ _externalErrorExit_func(errDesc, __FUNCTION__, __LINE__)
+#define libcurlErrorExit(ignore) \
+ _libcurlErrorExit_func(NULL, __FUNCTION__, __LINE__)
+#define libcurlErrorExitDesc(errDesc) \
+ _libcurlErrorExit_func(errDesc, __FUNCTION__, __LINE__)
+#define mhdErrorExit(ignore) \
+ _mhdErrorExit_func(NULL, __FUNCTION__, __LINE__)
+#define mhdErrorExitDesc(errDesc) \
+ _mhdErrorExit_func(errDesc, __FUNCTION__, __LINE__)
+#define checkCURLE_OK(libcurlcall) \
+ _checkCURLE_OK_func((libcurlcall), _MHD_STRMACRO(libcurlcall), \
+ __FUNCTION__, __LINE__)
+#else
+#define externalErrorExit(ignore) _externalErrorExit_func(NULL, NULL, __LINE__)
+#define externalErrorExitDesc(errDesc) \
+ _externalErrorExit_func(errDesc, NULL, __LINE__)
+#define libcurlErrorExit(ignore) _libcurlErrorExit_func(NULL, NULL, __LINE__)
+#define libcurlErrorExitDesc(errDesc) \
+ _libcurlErrorExit_func(errDesc, NULL, __LINE__)
+#define mhdErrorExit(ignore) _mhdErrorExit_func(NULL, NULL, __LINE__)
+#define mhdErrorExitDesc(errDesc) _mhdErrorExit_func(errDesc, NULL, __LINE__)
+#define checkCURLE_OK(libcurlcall) \
+ _checkCURLE_OK_func((libcurlcall), _MHD_STRMACRO(libcurlcall), NULL,
__LINE__)
+#endif
+
+
+_MHD_NORETURN static void
+_externalErrorExit_func (const char *errDesc, const char *funcName, int
lineNum)
+{
+ fflush (stdout);
+ if ((NULL != errDesc) && (0 != errDesc[0]))
+ fprintf (stderr, "%s", errDesc);
+ else
+ fprintf (stderr, "System or external library call failed");
+ if ((NULL != funcName) && (0 != funcName[0]))
+ fprintf (stderr, " in %s", funcName);
+ if (0 < lineNum)
+ fprintf (stderr, " at line %d", lineNum);
+
+ fprintf (stderr, ".\nLast errno value: %d (%s)\n", (int) errno,
+ strerror (errno));
+#ifdef MHD_WINSOCK_SOCKETS
+ fprintf (stderr, "WSAGetLastError() value: %d\n", (int) WSAGetLastError ());
+#endif /* MHD_WINSOCK_SOCKETS */
+ fflush (stderr);
+ exit (99);
+}
+
+
+/* Not actually used in this test */
+static char libcurl_errbuf[CURL_ERROR_SIZE] = "";
+
+_MHD_NORETURN static void
+_libcurlErrorExit_func (const char *errDesc, const char *funcName, int lineNum)
+{
+ fflush (stdout);
+ if ((NULL != errDesc) && (0 != errDesc[0]))
+ fprintf (stderr, "%s", errDesc);
+ else
+ fprintf (stderr, "CURL library call failed");
+ if ((NULL != funcName) && (0 != funcName[0]))
+ fprintf (stderr, " in %s", funcName);
+ if (0 < lineNum)
+ fprintf (stderr, " at line %d", lineNum);
+
+ fprintf (stderr, ".\nLast errno value: %d (%s)\n", (int) errno,
+ strerror (errno));
+#ifdef MHD_WINSOCK_SOCKETS
+ fprintf (stderr, "WSAGetLastError() value: %d\n", (int) WSAGetLastError ());
+#endif /* MHD_WINSOCK_SOCKETS */
+ if (0 != libcurl_errbuf[0])
+ fprintf (stderr, "Last libcurl error description: %s\n", libcurl_errbuf);
+
+ fflush (stderr);
+ exit (99);
+}
+
+
+_MHD_NORETURN static void
+_mhdErrorExit_func (const char *errDesc, const char *funcName, int lineNum)
+{
+ fflush (stdout);
+ if ((NULL != errDesc) && (0 != errDesc[0]))
+ fprintf (stderr, "%s", errDesc);
+ else
+ fprintf (stderr, "MHD unexpected error");
+ if ((NULL != funcName) && (0 != funcName[0]))
+ fprintf (stderr, " in %s", funcName);
+ if (0 < lineNum)
+ fprintf (stderr, " at line %d", lineNum);
+
+ fprintf (stderr, ".\nLast errno value: %d (%s)\n", (int) errno,
+ strerror (errno));
+#ifdef MHD_WINSOCK_SOCKETS
+ fprintf (stderr, "WSAGetLastError() value: %d\n", (int) WSAGetLastError ());
+#endif /* MHD_WINSOCK_SOCKETS */
+
+ fflush (stderr);
+ exit (8);
+}
+
+
+#if 0
+/* Function unused in this test */
+static void
+_checkCURLE_OK_func (CURLcode code, const char *curlFunc,
+ const char *funcName, int lineNum)
+{
+ if (CURLE_OK == code)
+ return;
+
+ fflush (stdout);
+ if ((NULL != curlFunc) && (0 != curlFunc[0]))
+ fprintf (stderr, "'%s' resulted in '%s'", curlFunc,
+ curl_easy_strerror (code));
+ else
+ fprintf (stderr, "libcurl function call resulted in '%s'",
+ curl_easy_strerror (code));
+ if ((NULL != funcName) && (0 != funcName[0]))
+ fprintf (stderr, " in %s", funcName);
+ if (0 < lineNum)
+ fprintf (stderr, " at line %d", lineNum);
+
+ fprintf (stderr, ".\nLast errno value: %d (%s)\n", (int) errno,
+ strerror (errno));
+ if (0 != libcurl_errbuf[0])
+ fprintf (stderr, "Last libcurl error description: %s\n", libcurl_errbuf);
+
+ fflush (stderr);
+ exit (9);
+}
+
+
+#endif
+
+
+/* Could be increased to facilitate debugging */
+#define TIMEOUTS_VAL 10
+
+#define MHD_URI_BASE_PATH "/bar%20foo?key=value"
+
+#define REALM "TestRealm"
+#define USERNAME1 "test_user"
+/* The hex form of MD5("test_user:TestRealm") */
+#define USERHASH1_MD5_HEX "c53c601503ff176f18f623725fba4281"
+#define USERHASH1_MD5_BIN 0xc5, 0x3c, 0x60, 0x15, 0x03, 0xff, 0x17, 0x6f, \
+ 0x18, 0xf6, 0x23, 0x72, 0x5f, 0xba, 0x42, 0x81
+/* The hex form of SHA-256("test_user:TestRealm") */
+#define USERHASH1_SHA256_HEX \
+ "090c7e06b77d6614cf5fe6cafa004d2e5f8fb36ba45a0e35eacb2eb7728f34de"
+/* The binary form of SHA-256("test_user:TestRealm") */
+#define USERHASH1_SHA256_BIN 0x09, 0x0c, 0x7e, 0x06, 0xb7, 0x7d, 0x66, 0x14, \
+ 0xcf, 0x5f, 0xe6, 0xca, 0xfa, 0x00, 0x4d, 0x2e, 0x5f, 0x8f, 0xb3, 0x6b, \
+ 0xa4, 0x5a, 0x0e, 0x35, 0xea, 0xcb, 0x2e, 0xb7, 0x72, 0x8f, 0x34, 0xde
+/* "titkos szuperügynök" in UTF-8 */
+#define USERNAME2 "titkos szuper" "\xC3\xBC" "gyn" "\xC3\xB6" "k"
+/* percent-encoded username */
+#define USERNAME2_PCTENC "titkos%20szuper%C3%BCgyn%C3%B6k"
+#define PASSWORD_VALUE "test pass"
+#define OPAQUE_VALUE "opaque+content" /* Base64 character set */
+
+
+#define PAGE \
+ "<html><head><title>libmicrohttpd demo page</title>" \
+ "</head><body>Access granted</body></html>"
+
+#define DENIED \
+ "<html><head><title>libmicrohttpd - Access denied</title>" \
+ "</head><body>Access denied</body></html>"
+
+/* Global parameters */
+static int verbose;
+static int test_oldapi;
+static int test_userhash;
+static int test_sha256;
+static int curl_uses_usehash;
+
+/* Static helper variables */
+static const char userhash1_md5_hex[] = USERHASH1_MD5_HEX;
+static const uint8_t userhash1_md5_bin[] = { USERHASH1_MD5_BIN };
+static const char userhash1_sha256_hex[] = USERHASH1_SHA256_HEX;
+static const uint8_t userhash1_sha256_bin[] = { USERHASH1_SHA256_BIN };
+static const char *userhash1_hex;
+static size_t userhash1_hex_len;
+static const uint8_t *userhash1_bin;
+static const char *username_ptr;
+
+static void
+test_global_init (void)
+{
+ libcurl_errbuf[0] = 0;
+
+ if (0 != curl_global_init (CURL_GLOBAL_WIN32))
+ externalErrorExit ();
+
+ username_ptr = USERNAME1;
+ if (! test_sha256)
+ {
+ userhash1_hex = userhash1_md5_hex;
+ userhash1_hex_len = MHD_STATICSTR_LEN_ (userhash1_md5_hex);
+ userhash1_bin = userhash1_md5_bin;
+ if ((userhash1_hex_len / 2) != \
+ (sizeof(userhash1_md5_bin) / sizeof(userhash1_md5_bin[0])))
+ externalErrorExitDesc ("Wrong size of the 'userhash1_md5_bin' array");
+ }
+ else
+ {
+ userhash1_hex = userhash1_sha256_hex;
+ userhash1_hex_len = MHD_STATICSTR_LEN_ (userhash1_sha256_hex);
+ userhash1_bin = userhash1_sha256_bin;
+ if ((userhash1_hex_len / 2) != \
+ (sizeof(userhash1_sha256_bin) \
+ / sizeof(userhash1_sha256_bin[0])))
+ externalErrorExitDesc ("Wrong size of the 'userhash1_sha256_bin' array");
+ }
+}
+
+
+static void
+test_global_cleanup (void)
+{
+ curl_global_cleanup ();
+}
+
+
+static int
+gen_good_rnd (void *rnd_buf, size_t rnd_buf_size)
+{
+ if (1024 < rnd_buf_size)
+ externalErrorExitDesc ("Too large amount of random data " \
+ "is requested");
+#ifndef _WIN32
+ if (1)
+ {
+ const int urand_fd = open ("/dev/urandom", O_RDONLY);
+ if (0 < urand_fd)
+ {
+ size_t pos = 0;
+ do
+ {
+ ssize_t res = read (urand_fd,
+ ((uint8_t *) rnd_buf) + pos, rnd_buf_size - pos);
+ if (0 > res)
+ break;
+ pos += (size_t) res;
+ } while (rnd_buf_size > pos);
+ (void) close (urand_fd);
+
+ if (rnd_buf_size == pos)
+ return ! 0; /* Success */
+ }
+ }
+#else /* _WIN32 */
+ if (1)
+ {
+ HCRYPTPROV cpr_hndl;
+ if (CryptAcquireContextW (&cpr_hndl, NULL, NULL, PROV_RSA_FULL,
+ CRYPT_VERIFYCONTEXT | CRYPT_SILENT))
+ {
+ if (CryptGenRandom (cpr_hndl, (DWORD) rnd_buf_size, (BYTE *) rnd_buf))
+ {
+ (void) CryptReleaseContext (cpr_hndl, 0);
+ return ! 0; /* Success */
+ }
+ (void) CryptReleaseContext (cpr_hndl, 0);
+ }
+ }
+#endif /* _WIN32 */
+ return 0; /* Failure */
+}
+
+
+struct CBC
+{
+ char *buf;
+ size_t pos;
+ size_t size;
+};
+
+
+static size_t
+copyBuffer (void *ptr,
+ size_t size,
+ size_t nmemb,
+ void *ctx)
+{
+ struct CBC *cbc = ctx;
+
+ if (cbc->pos + size * nmemb > cbc->size)
+ mhdErrorExitDesc ("Wrong too large data"); /* overflow */
+ memcpy (&cbc->buf[cbc->pos], ptr, size * nmemb);
+ cbc->pos += size * nmemb;
+ return size * nmemb;
+}
+
+
+static enum MHD_Result
+ahc_echo (void *cls,
+ struct MHD_Connection *connection,
+ const char *url,
+ const char *method,
+ const char *version,
+ const char *upload_data,
+ size_t *upload_data_size,
+ void **req_cls)
+{
+ struct MHD_Response *response;
+ enum MHD_Result res;
+ static int already_called_marker;
+ (void) cls; (void) url; /* Unused. Silent compiler warning. */
+ (void) method; (void) version; (void) upload_data; /* Unused. Silent
compiler warning. */
+ (void) upload_data_size; /* Unused. Silent compiler warning. */
+
+ if (&already_called_marker != *req_cls)
+ { /* Called for the first time, request not fully read yet */
+ *req_cls = &already_called_marker;
+ /* Wait for complete request */
+ return MHD_YES;
+ }
+
+ if (0 != strcmp (method, MHD_HTTP_METHOD_GET))
+ mhdErrorExitDesc ("Unexpected HTTP method");
+
+ response = NULL;
+ if (! test_oldapi)
+ {
+ struct MHD_DigestAuthInfo *dinfo;
+ const enum MHD_DigestAuthAlgo3 algo3 =
+ test_sha256 ? MHD_DIGEST_AUTH_ALGO3_SHA256 : MHD_DIGEST_AUTH_ALGO3_MD5;
+
+ dinfo = MHD_digest_auth_get_request_info3 (connection);
+ if (NULL != dinfo)
+ {
+ /* Got any kind of Digest response. Check it, it must be valid */
+ struct MHD_DigestAuthUsernameInfo *uname;
+ enum MHD_DigestAuthResult check_res;
+
+ if (NULL == dinfo->username)
+ mhdErrorExitDesc ("'username' is NULL");
+ if (curl_uses_usehash)
+ {
+ if (MHD_DIGEST_AUTH_UNAME_TYPE_USERHASH != dinfo->uname_type)
+ {
+ fprintf (stderr, "Unexpected 'uname_type'.\n"
+ "Expected: %d\tRecieved: %d. ",
+ (int) MHD_DIGEST_AUTH_UNAME_TYPE_USERHASH,
+ (int) dinfo->uname_type);
+ mhdErrorExitDesc ("Wrong 'uname_type'");
+ }
+ else if (dinfo->username_len != userhash1_hex_len)
+ {
+ fprintf (stderr, "'username_len' does not match.\n"
+ "Expected: %u\tRecieved: %u. ",
+ (unsigned) userhash1_hex_len,
+ (unsigned) dinfo->username_len);
+ mhdErrorExitDesc ("Wrong 'username_len'");
+ }
+ else if (0 != memcmp (dinfo->username, userhash1_hex,
+ dinfo->username_len))
+ {
+ fprintf (stderr, "'username' does not match.\n"
+ "Expected: '%s'\tRecieved: '%.*s'. ",
+ userhash1_hex,
+ (int) dinfo->username_len,
+ dinfo->username);
+ mhdErrorExitDesc ("Wrong 'username'");
+ }
+ else if (NULL == dinfo->userhash_bin)
+ mhdErrorExitDesc ("'userhash_bin' is NULL");
+ else if (0 != memcmp (dinfo->userhash_bin, userhash1_bin,
+ dinfo->username_len / 2))
+ mhdErrorExitDesc ("Wrong 'userhash_bin'");
+ }
+ else
+ {
+ if (MHD_DIGEST_AUTH_UNAME_TYPE_STANDARD != dinfo->uname_type)
+ {
+ fprintf (stderr, "Unexpected 'uname_type'.\n"
+ "Expected: %d\tRecieved: %d. ",
+ (int) MHD_DIGEST_AUTH_UNAME_TYPE_STANDARD,
+ (int) dinfo->uname_type);
+ mhdErrorExitDesc ("Wrong 'uname_type'");
+ }
+ else if (dinfo->username_len != strlen (username_ptr))
+ {
+ fprintf (stderr, "'username_len' does not match.\n"
+ "Expected: %u\tRecieved: %u. ",
+ (unsigned) strlen (username_ptr),
+ (unsigned) dinfo->username_len);
+ mhdErrorExitDesc ("Wrong 'username_len'");
+ }
+ else if (0 != memcmp (dinfo->username, username_ptr,
+ dinfo->username_len))
+ {
+ fprintf (stderr, "'username' does not match.\n"
+ "Expected: '%s'\tRecieved: '%.*s'. ",
+ username_ptr,
+ (int) dinfo->username_len,
+ dinfo->username);
+ mhdErrorExitDesc ("Wrong 'username'");
+ }
+ else if (NULL != dinfo->userhash_bin)
+ mhdErrorExitDesc ("'userhash_bin' is NOT NULL");
+ }
+ if (algo3 != dinfo->algo)
+ {
+ fprintf (stderr, "Unexpected 'algo'.\n"
+ "Expected: %d\tRecieved: %d. ",
+ (int) algo3,
+ (int) dinfo->algo);
+ mhdErrorExitDesc ("Wrong 'algo'");
+ }
+ else if (10 >= dinfo->cnonce_len)
+ {
+ fprintf (stderr, "Unexpected small 'cnonce_len': %ld. ",
+ (long) dinfo->cnonce_len);
+ mhdErrorExitDesc ("Wrong 'cnonce_len'");
+ }
+ else if (NULL == dinfo->opaque)
+ mhdErrorExitDesc ("'opaque' is NULL");
+ else if (dinfo->opaque_len != MHD_STATICSTR_LEN_ (OPAQUE_VALUE))
+ {
+ fprintf (stderr, "'opaque_len' does not match.\n"
+ "Expected: %u\tRecieved: %u. ",
+ (unsigned) MHD_STATICSTR_LEN_ (OPAQUE_VALUE),
+ (unsigned) dinfo->opaque_len);
+ mhdErrorExitDesc ("Wrong 'opaque_len'");
+ }
+ else if (0 != memcmp (dinfo->opaque, OPAQUE_VALUE, dinfo->opaque_len))
+ {
+ fprintf (stderr, "'opaque' does not match.\n"
+ "Expected: '%s'\tRecieved: '%.*s'. ",
+ OPAQUE_VALUE,
+ (int) dinfo->opaque_len,
+ dinfo->opaque);
+ mhdErrorExitDesc ("Wrong 'opaque'");
+ }
+ else if (MHD_DIGEST_AUTH_QOP_AUTH != dinfo->qop)
+ {
+ fprintf (stderr, "Unexpected 'qop'.\n"
+ "Expected: %d\tRecieved: %d. ",
+ (int) MHD_DIGEST_AUTH_QOP_AUTH,
+ (int) dinfo->qop);
+ mhdErrorExitDesc ("Wrong 'qop'");
+ }
+ else if (NULL == dinfo->realm)
+ mhdErrorExitDesc ("'realm' is NULL");
+ else if (dinfo->realm_len != MHD_STATICSTR_LEN_ (REALM))
+ {
+ fprintf (stderr, "'realm_len' does not match.\n"
+ "Expected: %u\tRecieved: %u. ",
+ (unsigned) MHD_STATICSTR_LEN_ (REALM),
+ (unsigned) dinfo->realm_len);
+ mhdErrorExitDesc ("Wrong 'realm_len'");
+ }
+ else if (0 != memcmp (dinfo->realm, REALM, dinfo->realm_len))
+ {
+ fprintf (stderr, "'realm' does not match.\n"
+ "Expected: '%s'\tRecieved: '%.*s'. ",
+ OPAQUE_VALUE,
+ (int) dinfo->realm_len,
+ dinfo->realm);
+ mhdErrorExitDesc ("Wrong 'realm'");
+ }
+ MHD_free (dinfo);
+
+ uname = MHD_digest_auth_get_username3 (connection);
+ if (NULL == uname)
+ mhdErrorExitDesc ("MHD_digest_auth_get_username3() returned NULL");
+ else if (NULL == uname->username)
+ mhdErrorExitDesc ("'username' is NULL");
+ if (curl_uses_usehash)
+ {
+ if (MHD_DIGEST_AUTH_UNAME_TYPE_USERHASH != uname->uname_type)
+ {
+ fprintf (stderr, "Unexpected 'uname_type'.\n"
+ "Expected: %d\tRecieved: %d. ",
+ (int) MHD_DIGEST_AUTH_UNAME_TYPE_USERHASH,
+ (int) uname->uname_type);
+ mhdErrorExitDesc ("Wrong 'uname_type'");
+ }
+ else if (uname->username_len != userhash1_hex_len)
+ {
+ fprintf (stderr, "'username_len' does not match.\n"
+ "Expected: %u\tRecieved: %u. ",
+ (unsigned) userhash1_hex_len,
+ (unsigned) uname->username_len);
+ mhdErrorExitDesc ("Wrong 'username_len'");
+ }
+ else if (0 != memcmp (uname->username, userhash1_hex,
+ uname->username_len))
+ {
+ fprintf (stderr, "'username' does not match.\n"
+ "Expected: '%s'\tRecieved: '%.*s'. ",
+ userhash1_hex,
+ (int) uname->username_len,
+ uname->username);
+ mhdErrorExitDesc ("Wrong 'username'");
+ }
+ else if (NULL == uname->userhash_bin)
+ mhdErrorExitDesc ("'userhash_bin' is NULL");
+ else if (0 != memcmp (uname->userhash_bin, userhash1_bin,
+ uname->username_len / 2))
+ mhdErrorExitDesc ("Wrong 'userhash_bin'");
+ }
+ else
+ {
+ if (MHD_DIGEST_AUTH_UNAME_TYPE_STANDARD != uname->uname_type)
+ {
+ fprintf (stderr, "Unexpected 'uname_type'.\n"
+ "Expected: %d\tRecieved: %d. ",
+ (int) MHD_DIGEST_AUTH_UNAME_TYPE_STANDARD,
+ (int) uname->uname_type);
+ mhdErrorExitDesc ("Wrong 'uname_type'");
+ }
+ else if (uname->username_len != strlen (username_ptr))
+ {
+ fprintf (stderr, "'username_len' does not match.\n"
+ "Expected: %u\tRecieved: %u. ",
+ (unsigned) strlen (username_ptr),
+ (unsigned) uname->username_len);
+ mhdErrorExitDesc ("Wrong 'username_len'");
+ }
+ else if (0 != memcmp (uname->username, username_ptr,
+ uname->username_len))
+ {
+ fprintf (stderr, "'username' does not match.\n"
+ "Expected: '%s'\tRecieved: '%.*s'. ",
+ username_ptr,
+ (int) uname->username_len,
+ uname->username);
+ mhdErrorExitDesc ("Wrong 'username'");
+ }
+ else if (NULL != uname->userhash_bin)
+ mhdErrorExitDesc ("'userhash_bin' is NOT NULL");
+ }
+ MHD_free (uname);
+
+ check_res =
+ MHD_digest_auth_check3 (connection, REALM, username_ptr,
+ PASSWORD_VALUE, 50 * TIMEOUTS_VAL,
+ 0, MHD_DIGEST_AUTH_MULT_QOP_AUTH,
+ (enum MHD_DigestAuthMultiAlgo3) algo3);
+
+ switch (check_res)
+ {
+ /* Valid result */
+ case MHD_DAUTH_OK:
+ if (verbose)
+ printf ("Got valid auth check result: MHD_DAUTH_OK.\n");
+ break;
+ /* Invalid results */
+ case MHD_DAUTH_NONCE_STALE:
+ mhdErrorExitDesc ("MHD_digest_auth_check3()' returned " \
+ "MHD_DAUTH_NONCE_STALE");
+ break;
+ case MHD_DAUTH_NONCE_WRONG:
+ mhdErrorExitDesc ("MHD_digest_auth_check3()' returned " \
+ "MHD_DAUTH_NONCE_WRONG");
+ break;
+ case MHD_DAUTH_ERROR:
+ externalErrorExitDesc ("General error returned " \
+ "by 'MHD_digest_auth_check3()'");
+ break;
+ case MHD_DAUTH_WRONG_USERNAME:
+ mhdErrorExitDesc ("MHD_digest_auth_check3()' returned " \
+ "MHD_DAUTH_WRONG_USERNAME");
+ break;
+ case MHD_DAUTH_RESPONSE_WRONG:
+ mhdErrorExitDesc ("MHD_digest_auth_check3()' returned " \
+ "MHD_DAUTH_RESPONSE_WRONG");
+ break;
+ case MHD_DAUTH_WRONG_HEADER:
+ case MHD_DAUTH_WRONG_REALM:
+ case MHD_DAUTH_WRONG_URI:
+ case MHD_DAUTH_WRONG_QOP:
+ case MHD_DAUTH_WRONG_ALGO:
+ case MHD_DAUTH_TOO_LARGE:
+ fprintf (stderr, "'MHD_digest_auth_check3()' returned "
+ "unexpected result: %d. ",
+ check_res);
+ mhdErrorExitDesc ("Wrong returned code");
+ break;
+ default:
+ fprintf (stderr, "'MHD_digest_auth_check3()' returned "
+ "impossible result code: %d. ",
+ check_res);
+ mhdErrorExitDesc ("Impossible returned code");
+ }
+
+ response =
+ MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (PAGE),
+ (const void *) PAGE);
+ if (NULL == response)
+ mhdErrorExitDesc ("Response creation failed");
+
+ if (MHD_YES !=
+ MHD_queue_response (connection, MHD_HTTP_OK, response))
+ mhdErrorExitDesc ("'MHD_queue_response()' failed");
+ }
+ else
+ {
+ /* No Digest auth header */
+ response =
+ MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (DENIED),
+ (const void *) DENIED);
+ if (NULL == response)
+ mhdErrorExitDesc ("Response creation failed");
+ res =
+ MHD_queue_auth_required_response3 (connection, REALM, OPAQUE_VALUE,
+ "/", response, 0,
+ MHD_DIGEST_AUTH_MULT_QOP_AUTH,
+ (enum MHD_DigestAuthMultiAlgo3)
algo3,
+ test_userhash, 0);
+ if (MHD_YES != res)
+ mhdErrorExitDesc ("'MHD_queue_auth_required_response3()' failed");
+ }
+ }
+ else
+ {
+ /* Use old API */
+ char *username;
+ int check_res;
+
+ username = MHD_digest_auth_get_username (connection);
+ if (NULL != username)
+ { /* Has a valid username in header */
+ if (0 != strcmp (username, username_ptr))
+ {
+ fprintf (stderr, "'username' does not match.\n"
+ "Expected: '%s'\tRecieved: '%s'. ",
+ username_ptr,
+ username);
+ mhdErrorExitDesc ("Wrong 'username'");
+ }
+ MHD_free (username);
+
+ check_res = MHD_digest_auth_check (connection, REALM, username_ptr,
+ PASSWORD_VALUE, 50 * TIMEOUTS_VAL);
+
+ if (MHD_YES != check_res)
+ {
+ fprintf (stderr, "'MHD_digest_auth_check()' returned unexpected"
+ " result: %d. ", check_res);
+ mhdErrorExitDesc ("Wrong 'MHD_digest_auth_check()' result");
+ }
+ response =
+ MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (PAGE),
+ (const void *) PAGE);
+ if (NULL == response)
+ mhdErrorExitDesc ("Response creation failed");
+
+ if (MHD_YES !=
+ MHD_queue_response (connection, MHD_HTTP_OK, response))
+ mhdErrorExitDesc ("'MHD_queue_response()' failed");
+ }
+ else
+ {
+ /* Has no valid username in header */
+ response =
+ MHD_create_response_from_buffer_static (MHD_STATICSTR_LEN_ (DENIED),
+ (const void *) DENIED);
+ if (NULL == response)
+ mhdErrorExitDesc ("Response creation failed");
+
+ res = MHD_queue_auth_fail_response (connection, REALM, OPAQUE_VALUE,
+ response, 0);
+ if (MHD_YES != res)
+ mhdErrorExitDesc ("'MHD_queue_auth_fail_response()' failed");
+ }
+ }
+ MHD_destroy_response (response);
+ return MHD_YES;
+}
+
+
+static CURL *
+setupCURL (void *cbc, int port)
+{
+ CURL *c;
+ char url[512];
+
+ if (1)
+ {
+ int res;
+ /* A workaround for some old libcurl versions, which ignore the specified
+ * port by CURLOPT_PORT when authorisation is used. */
+ res = snprintf (url, (sizeof(url) / sizeof(url[0])),
+ "http://127.0.0.1:%d%s";, port, MHD_URI_BASE_PATH);
+ if ((0 >= res) || ((sizeof(url) / sizeof(url[0])) <= (size_t) res))
+ externalErrorExitDesc ("Cannot form request URL");
+ }
+
+ c = curl_easy_init ();
+ if (NULL == c)
+ libcurlErrorExitDesc ("curl_easy_init() failed");
+
+ if ((CURLE_OK != curl_easy_setopt (c, CURLOPT_NOSIGNAL, 1L)) ||
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_WRITEFUNCTION,
+ ©Buffer)) ||
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_WRITEDATA, cbc)) ||
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_CONNECTTIMEOUT,
+ ((long) TIMEOUTS_VAL))) ||
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_HTTP_VERSION,
+ CURL_HTTP_VERSION_1_1)) ||
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_TIMEOUT,
+ ((long) TIMEOUTS_VAL))) ||
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_ERRORBUFFER,
+ libcurl_errbuf)) ||
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_FAILONERROR, 0L)) ||
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_HTTPAUTH,
+ (long) CURLAUTH_DIGEST)) ||
+#if CURL_AT_LEAST_VERSION (7,19,1)
+ /* Need version 7.19.1 for separate username and password */
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_USERNAME, username_ptr)) ||
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_PASSWORD, PASSWORD_VALUE)) ||
+#endif /* CURL_AT_LEAST_VERSION(7,19,1) */
+#ifdef _DEBUG
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_VERBOSE, 1L)) ||
+#endif /* _DEBUG */
+#if CURL_AT_LEAST_VERSION (7, 19, 4)
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_PROTOCOLS, CURLPROTO_HTTP)) ||
+#endif /* CURL_AT_LEAST_VERSION (7, 19, 4) */
+#if CURL_AT_LEAST_VERSION (7, 45, 0)
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_DEFAULT_PROTOCOL, "http")) ||
+#endif /* CURL_AT_LEAST_VERSION (7, 45, 0) */
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_PORT, ((long) port))) ||
+ (CURLE_OK != curl_easy_setopt (c, CURLOPT_URL, url)))
+ libcurlErrorExitDesc ("curl_easy_setopt() failed");
+ return c;
+}
+
+
+static CURLcode
+performQueryExternal (struct MHD_Daemon *d, CURL *c)
+{
+ CURLM *multi;
+ time_t start;
+ struct timeval tv;
+ CURLcode ret;
+
+ ret = CURLE_FAILED_INIT; /* will be replaced with real result */
+ multi = NULL;
+ multi = curl_multi_init ();
+ if (multi == NULL)
+ libcurlErrorExitDesc ("curl_multi_init() failed");
+ if (CURLM_OK != curl_multi_add_handle (multi, c))
+ libcurlErrorExitDesc ("curl_multi_add_handle() failed");
+
+ start = time (NULL);
+ while (time (NULL) - start <= TIMEOUTS_VAL)
+ {
+ fd_set rs;
+ fd_set ws;
+ fd_set es;
+ MHD_socket maxMhdSk;
+ int maxCurlSk;
+ int running;
+
+ maxMhdSk = MHD_INVALID_SOCKET;
+ maxCurlSk = -1;
+ FD_ZERO (&rs);
+ FD_ZERO (&ws);
+ FD_ZERO (&es);
+ if (NULL != multi)
+ {
+ curl_multi_perform (multi, &running);
+ if (0 == running)
+ {
+ struct CURLMsg *msg;
+ int msgLeft;
+ int totalMsgs = 0;
+ do
+ {
+ msg = curl_multi_info_read (multi, &msgLeft);
+ if (NULL == msg)
+ libcurlErrorExitDesc ("curl_multi_info_read() failed");
+ totalMsgs++;
+ if (CURLMSG_DONE == msg->msg)
+ ret = msg->data.result;
+ } while (msgLeft > 0);
+ if (1 != totalMsgs)
+ {
+ fprintf (stderr,
+ "curl_multi_info_read returned wrong "
+ "number of results (%d).\n",
+ totalMsgs);
+ externalErrorExit ();
+ }
+ curl_multi_remove_handle (multi, c);
+ curl_multi_cleanup (multi);
+ multi = NULL;
+ }
+ else
+ {
+ if (CURLM_OK != curl_multi_fdset (multi, &rs, &ws, &es, &maxCurlSk))
+ libcurlErrorExitDesc ("curl_multi_fdset() failed");
+ }
+ }
+ if (NULL == multi)
+ { /* libcurl has finished, check whether MHD still needs to perform
cleanup */
+ if (0 != MHD_get_timeout64s (d))
+ break; /* MHD finished as well */
+ }
+ if (MHD_YES != MHD_get_fdset (d, &rs, &ws, &es, &maxMhdSk))
+ mhdErrorExitDesc ("MHD_get_fdset() failed");
+ tv.tv_sec = 0;
+ tv.tv_usec = 200000;
+#ifdef MHD_POSIX_SOCKETS
+ if (maxMhdSk > maxCurlSk)
+ maxCurlSk = maxMhdSk;
+#endif /* MHD_POSIX_SOCKETS */
+ if (-1 == select (maxCurlSk + 1, &rs, &ws, &es, &tv))
+ {
+#ifdef MHD_POSIX_SOCKETS
+ if (EINTR != errno)
+ externalErrorExitDesc ("Unexpected select() error");
+#else
+ if ((WSAEINVAL != WSAGetLastError ()) ||
+ (0 != rs.fd_count) || (0 != ws.fd_count) || (0 != es.fd_count) )
+ externalErrorExitDesc ("Unexpected select() error");
+ Sleep (200);
+#endif
+ }
+ if (MHD_YES != MHD_run_from_select (d, &rs, &ws, &es))
+ mhdErrorExitDesc ("MHD_run_from_select() failed");
+ }
+
+ return ret;
+}
+
+
+/**
+ * Check request result
+ * @param curl_code the CURL easy return code
+ * @param pcbc the pointer struct CBC
+ * @return non-zero if success, zero if failed
+ */
+static unsigned int
+check_result (CURLcode curl_code, CURL *c, struct CBC *pcbc)
+{
+ long code;
+ if (CURLE_OK != curl_easy_getinfo (c, CURLINFO_RESPONSE_CODE, &code))
+ libcurlErrorExit ();
+
+ if (MHD_HTTP_OK != code)
+ {
+ fprintf (stderr, "Request returned wrong code: %ld.\n",
+ code);
+ return 0;
+ }
+
+ if (CURLE_OK != curl_code)
+ {
+ fflush (stdout);
+ if (0 != libcurl_errbuf[0])
+ fprintf (stderr, "Request failed. "
+ "libcurl error: '%s'.\n"
+ "libcurl error description: '%s'.\n",
+ curl_easy_strerror (curl_code),
+ libcurl_errbuf);
+ else
+ fprintf (stderr, "Request failed. "
+ "libcurl error: '%s'.\n",
+ curl_easy_strerror (curl_code));
+ fflush (stderr);
+ return 0;
+ }
+
+ if (pcbc->pos != MHD_STATICSTR_LEN_ (PAGE))
+ {
+ fprintf (stderr, "Got %u bytes ('%.*s'), expected %u bytes. ",
+ (unsigned) pcbc->pos, (int) pcbc->pos, pcbc->buf,
+ (unsigned) MHD_STATICSTR_LEN_ (PAGE));
+ mhdErrorExitDesc ("Wrong returned data length");
+ }
+ if (0 != memcmp (PAGE, pcbc->buf, pcbc->pos))
+ {
+ fprintf (stderr, "Got invalid response '%.*s'. ",
+ (int) pcbc->pos, pcbc->buf);
+ mhdErrorExitDesc ("Wrong returned data");
+ }
+ return 1;
+}
+
+
+static unsigned int
+testDigestAuth (void)
+{
+ struct MHD_Daemon *d;
+ uint16_t port;
+ uint8_t salt[8];
+ struct CBC cbc;
+ char buf[2048];
+ CURL *c;
+ int failed = 0;
+
+ if (! gen_good_rnd (salt, sizeof(salt)))
+ {
+ fprintf (stderr, "WARNING: the random buffer (used as salt value) is not "
+ "initialised completely, nonce generation may be "
+ "predictable in this test.\n");
+ fflush (stderr);
+ }
+
+ if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT))
+ port = 0;
+ else
+ port = 4210;
+
+ d = MHD_start_daemon (MHD_USE_ERROR_LOG,
+ port, NULL, NULL,
+ &ahc_echo, NULL,
+ MHD_OPTION_DIGEST_AUTH_RANDOM, sizeof (salt), salt,
+ MHD_OPTION_NONCE_NC_SIZE, 300,
+ MHD_OPTION_END);
+ if (d == NULL)
+ return 1;
+ if (0 == port)
+ {
+ const union MHD_DaemonInfo *dinfo;
+
+ dinfo = MHD_get_daemon_info (d,
+ MHD_DAEMON_INFO_BIND_PORT);
+ if ( (NULL == dinfo) ||
+ (0 == dinfo->port) )
+ mhdErrorExitDesc ("MHD_get_daemon_info() failed");
+ port = dinfo->port;
+ }
+
+ /* First request */
+ cbc.buf = buf;
+ cbc.size = sizeof (buf);
+ cbc.pos = 0;
+ memset (cbc.buf, 0, cbc.size);
+ c = setupCURL (&cbc, port);
+ if (check_result (performQueryExternal (d, c), c, &cbc))
+ {
+ if (verbose)
+ printf ("Got expected response.\n");
+ }
+ else
+ {
+ fprintf (stderr, "Request FAILED.\n");
+ failed = 1;
+ }
+ curl_easy_cleanup (c);
+
+ MHD_stop_daemon (d);
+ return failed ? 1 : 0;
+}
+
+
+int
+main (int argc, char *const *argv)
+{
+#if ! CURL_AT_LEAST_VERSION (7,19,1)
+ (void) argc; (void) argv; /* Unused. Silent compiler warning. */
+ /* Need version 7.19.1 for separate username and password */
+ fprintf (stderr, "Required libcurl version 7.19.1 at least"
+ " to run this test.\n");
+ return 77;
+#else /* CURL_AT_LEAST_VERSION(7,19,1) */
+ unsigned int errorCount = 0;
+ const curl_version_info_data *const curl_info =
+ curl_version_info (CURLVERSION_NOW);
+ int curl_sspi;
+ (void) argc; (void) argv; /* Unused. Silent compiler warning. */
+
+ /* Test type and test parameters */
+ verbose = ! (has_param (argc, argv, "-q") ||
+ has_param (argc, argv, "--quiet") ||
+ has_param (argc, argv, "-s") ||
+ has_param (argc, argv, "--silent"));
+ test_oldapi = has_in_name (argv[0], "_oldapi");
+ test_userhash = has_in_name (argv[0], "_userhash");
+ test_sha256 = has_in_name (argv[0], "_sha256");
+
+ if (test_oldapi)
+ { /* Wrong test types combination */
+ if (test_userhash || test_sha256)
+ return 99;
+ }
+
+ /* Curl version and known bugs checks */
+ curl_sspi = 0;
+#ifdef CURL_VERSION_SSPI
+ if (0 != (curl_info->features & CURL_VERSION_SSPI))
+ curl_sspi = 1;
+#endif /* CURL_VERSION_SSPI */
+
+ if ((CURL_VERSION_BITS (7,63,0) > curl_info->version_num) &&
+ (CURL_VERSION_BITS (7,62,0) <= curl_info->version_num) )
+ {
+ fprintf (stderr, "libcurl version 7.62.x has bug in processing"
+ "URI with GET argements for Digest Auth.\n");
+ fprintf (stderr, "This test with libcurl %u.%u.%u cannot be performed.\n",
+ 0xFF & (curl_info->version_num >> 16),
+ 0xFF & (curl_info->version_num >> 8),
+ 0xFF & (curl_info->version_num >> 0));
+ return 77;
+ }
+ if (test_userhash)
+ {
+ if (curl_sspi)
+ {
+ printf ("WARNING: Windows SSPI API does not support 'userhash'.\n");
+ printf ("This test just checks Digest Auth compatibility with "
+ "the clients without 'userhash' support "
+ "when 'userhash=true' is specified by MHD.\n");
+ curl_uses_usehash = 0;
+ }
+ else if (CURL_VERSION_BITS (7,57,0) > curl_info->version_num)
+ {
+ printf ("WARNING: libcurl before version 7.57.0 does not "
+ "support 'userhash'.\n");
+ printf ("This test just checks Digest Auth compatibility with "
+ "libcurl version %u.%u.%u without 'userhash' support "
+ "when 'userhash=true' is specified by MHD.\n",
+ 0xFF & (curl_info->version_num >> 16),
+ 0xFF & (curl_info->version_num >> 8),
+ 0xFF & (curl_info->version_num >> 0));
+ curl_uses_usehash = 0;
+ }
+ else if (CURL_VERSION_BITS (7,81,0) > curl_info->version_num)
+ {
+ fprintf (stderr, "Required libcurl version 7.81.0 at least"
+ " to run this test with userhash.\n");
+ fprintf (stderr, "This libcurl version %u.%u.%u has broken digest"
+ "calculation when userhash is used.\n",
+ 0xFF & (curl_info->version_num >> 16),
+ 0xFF & (curl_info->version_num >> 8),
+ 0xFF & (curl_info->version_num >> 0));
+ return 77;
+ }
+ else
+ curl_uses_usehash = ! 0;
+ }
+ else
+ curl_uses_usehash = 0;
+
+ if (test_sha256)
+ {
+ if (curl_sspi)
+ {
+ fprintf (stderr, "Windows SSPI API does not support SHA-256 digests.\n");
+ return 77;
+ }
+ else if (CURL_VERSION_BITS (7,57,0) > curl_info->version_num)
+ {
+ fprintf (stderr, "Required libcurl version 7.57.0 at least"
+ " to run this test with SHA-256.\n");
+ fprintf (stderr, "This libcurl version %u.%u.%u "
+ "does not support SHA-256.\n",
+ 0xFF & (curl_info->version_num >> 16),
+ 0xFF & (curl_info->version_num >> 8),
+ 0xFF & (curl_info->version_num >> 0));
+ return 77;
+ }
+ }
+
+ test_global_init ();
+
+ errorCount += testDigestAuth ();
+ if (errorCount != 0)
+ fprintf (stderr, "Error (code: %u)\n", errorCount);
+ test_global_cleanup ();
+ return (0 == errorCount) ? 0 : 1; /* 0 == pass */
+#endif /* CURL_AT_LEAST_VERSION(7,19,1) */
+}
--
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.
- [libmicrohttpd] 02/19: gen_auth: fixed detection of userhash in Digest Auth requests, (continued)
- [libmicrohttpd] 02/19: gen_auth: fixed detection of userhash in Digest Auth requests, gnunet, 2022/07/28
- [libmicrohttpd] 07/19: Updated doxy for old Digest Auth API function, gnunet, 2022/07/28
- [libmicrohttpd] 10/19: test_digestauth_emu_ext: cosmetics, additional check, gnunet, 2022/07/28
- [libmicrohttpd] 11/19: tests_digestauth*: added workarounds for libcurl bug, gnunet, 2022/07/28
- [libmicrohttpd] 01/19: digestauth: fixed copy-paste error in request algo parsing, gnunet, 2022/07/28
- [libmicrohttpd] 08/19: digestauth: term correction in comment, gnunet, 2022/07/28
- [libmicrohttpd] 05/19: digest_auth_check(): added support for userhash, gnunet, 2022/07/28
- [libmicrohttpd] 09/19: test_digestauth{,_sha256,_with_aguments}: moved back to Digest Auth APIv2, gnunet, 2022/07/28
- [libmicrohttpd] 14/19: MHD_add_response_entry(): refactoring + added internal function, gnunet, 2022/07/28
- [libmicrohttpd] 12/19: test_digestauth_concurrent: fixed compiler warnings, gnunet, 2022/07/28
- [libmicrohttpd] 17/19: test_digestauth2: added new group of tests for Digest Auth checking,
gnunet <=
- [libmicrohttpd] 16/19: Added MHD_queue_auth_required_response3(); Refactored public Digest Auth API v3, gnunet, 2022/07/28
- [libmicrohttpd] 13/19: Updated Digest Auth enums in the header, gnunet, 2022/07/28
- [libmicrohttpd] 18/19: MHD_FEATURE_*: added some values related to Digest Auth, gnunet, 2022/07/28
- [libmicrohttpd] 15/19: Digest Auth public structs: removed redundant member, gnunet, 2022/07/28
- [libmicrohttpd] 19/19: Makefile: cosmetics, gnunet, 2022/07/28