diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 18:45:59 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 18:45:59 +0000 |
commit | 19fcec84d8d7d21e796c7624e521b60d28ee21ed (patch) | |
tree | 42d26aa27d1e3f7c0b8bd3fd14e7d7082f5008dc /src/civetweb/test/private.c | |
parent | Initial commit. (diff) | |
download | ceph-upstream.tar.xz ceph-upstream.zip |
Adding upstream version 16.2.11+ds.upstream/16.2.11+dsupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r-- | src/civetweb/test/private.c | 1018 |
1 files changed, 1018 insertions, 0 deletions
diff --git a/src/civetweb/test/private.c b/src/civetweb/test/private.c new file mode 100644 index 000000000..9b34f5950 --- /dev/null +++ b/src/civetweb/test/private.c @@ -0,0 +1,1018 @@ +/* Copyright (c) 2015-2017 the Civetweb developers + * + * Permission is hereby granted, free of charge, to any person obtaining a copy + * of this software and associated documentation files (the "Software"), to deal + * in the Software without restriction, including without limitation the rights + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell + * copies of the Software, and to permit persons to whom the Software is + * furnished to do so, subject to the following conditions: + * + * The above copyright notice and this permission notice shall be included in + * all copies or substantial portions of the Software. + * + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN + * THE SOFTWARE. + */ + +/** + * We include the source file so that we have access to the internal private + * static functions + */ +#ifdef _MSC_VER +#ifndef _CRT_SECURE_NO_WARNINGS +#define _CRT_SECURE_NO_WARNINGS +#endif +#define CIVETWEB_API static +#endif + +#ifdef REPLACE_CHECK_FOR_LOCAL_DEBUGGING +#undef MEMORY_DEBUGGING +#endif + +#include "../src/civetweb.c" + +#include <stdlib.h> +#include <time.h> + +#include "private.h" + + +/* This unit test file uses the excellent Check unit testing library. + * The API documentation is available here: + * http://check.sourceforge.net/doc/check_html/index.html + */ + +static char tmp_parse_buffer[1024]; + +static int +test_parse_http_response(char *buf, int len, struct mg_response_info *ri) +{ + ck_assert_int_lt(len, (int)sizeof(tmp_parse_buffer)); + memcpy(tmp_parse_buffer, buf, (size_t)len); + return parse_http_response(tmp_parse_buffer, len, ri); +} + +static int +test_parse_http_request(char *buf, int len, struct mg_request_info *ri) +{ + ck_assert_int_lt(len, (int)sizeof(tmp_parse_buffer)); + memcpy(tmp_parse_buffer, buf, (size_t)len); + return parse_http_request(tmp_parse_buffer, len, ri); +} + + +START_TEST(test_parse_http_message) +{ + /* Adapted from unit_test.c */ + /* Copyright (c) 2013-2015 the Civetweb developers */ + /* Copyright (c) 2004-2013 Sergey Lyubka */ + struct mg_request_info ri; + struct mg_response_info respi; + char empty[] = ""; + char space[] = " \x00"; + char req1[] = "GET / HTTP/1.1\r\n\r\n"; + char req2[] = "BLAH / HTTP/1.1\r\n\r\n"; + char req3[] = "GET / HTTP/1.1\nKey: Val\n\n"; + char req4[] = + "GET / HTTP/1.1\r\nA: foo bar\r\nB: bar\r\nskip\r\nbaz:\r\n\r\n"; + char req5[] = "GET / HTTP/1.0\n\n"; + char req6[] = "G"; + char req7[] = " blah "; + char req8[] = "HTTP/1.0 404 Not Found\n\n"; + char req9[] = "HTTP/1.1 200 OK\r\nConnection: close\r\n\r\n"; + + char req10[] = "GET / HTTP/1.1\r\nA: foo bar\r\nB: bar\r\n\r\n"; + + char req11[] = "GET /\r\nError: X\r\n\r\n"; + + char req12[] = + "POST /a/b/c.d?e=f&g HTTP/1.1\r\nKey1: val1\r\nKey2: val2\r\n\r\nBODY"; + + + int lenreq1 = (int)strlen(req1); + int lenreq2 = (int)strlen(req2); + int lenreq3 = (int)strlen(req3); + int lenreq4 = (int)strlen(req4); + int lenreq5 = (int)strlen(req5); + int lenreq6 = (int)strlen(req6); + int lenreq7 = (int)strlen(req7); + int lenreq8 = (int)strlen(req8); + int lenreq9 = (int)strlen(req9); + int lenreq10 = (int)strlen(req10); + int lenreq11 = (int)strlen(req11); + int lenreq12 = (int)strlen(req12); + int lenhdr12 = lenreq12 - 4; /* length without body */ + + mark_point(); + + /* An empty string is neither a complete request nor a complete + * response, so it must return 0 */ + ck_assert_int_eq(0, get_http_header_len(empty, 0)); + ck_assert_int_eq(0, test_parse_http_request(empty, 0, &ri)); + ck_assert_int_eq(0, test_parse_http_response(empty, 0, &respi)); + + /* Same is true for a leading space */ + ck_assert_int_eq(0, get_http_header_len(space, 1)); + ck_assert_int_eq(0, test_parse_http_request(space, 1, &ri)); + ck_assert_int_eq(0, test_parse_http_response(space, 1, &respi)); + + /* But a control character (like 0) makes it invalid */ + ck_assert_int_eq(-1, get_http_header_len(space, 2)); + ck_assert_int_eq(-1, test_parse_http_request(space, 2, &ri)); + ck_assert_int_eq(-1, test_parse_http_response(space, 2, &respi)); + + + /* req1 minus 1 byte at the end is incomplete */ + ck_assert_int_eq(0, get_http_header_len(req1, lenreq1 - 1)); + + + /* req1 minus 1 byte at the start is complete but invalid */ + ck_assert_int_eq(lenreq1 - 1, get_http_header_len(req1 + 1, lenreq1 - 1)); + ck_assert_int_eq(-1, test_parse_http_request(req1 + 1, lenreq1 - 1, &ri)); + + + /* req1 is a valid request */ + ck_assert_int_eq(lenreq1, get_http_header_len(req1, lenreq1)); + ck_assert_int_eq(-1, test_parse_http_response(req1, lenreq1, &respi)); + ck_assert_int_eq(lenreq1, test_parse_http_request(req1, lenreq1, &ri)); + ck_assert_str_eq("1.1", ri.http_version); + ck_assert_int_eq(0, ri.num_headers); + + + /* req2 is a complete, but invalid request */ + ck_assert_int_eq(lenreq2, get_http_header_len(req2, lenreq2)); + ck_assert_int_eq(-1, test_parse_http_request(req2, lenreq2, &ri)); + + + /* req3 is a complete and valid request */ + ck_assert_int_eq(lenreq3, get_http_header_len(req3, lenreq3)); + ck_assert_int_eq(lenreq3, test_parse_http_request(req3, lenreq3, &ri)); + ck_assert_int_eq(-1, test_parse_http_response(req3, lenreq3, &respi)); + + + /* Multiline header are obsolete, so return an error + * (https://tools.ietf.org/html/rfc7230#section-3.2.4). */ + ck_assert_int_eq(-1, test_parse_http_request(req4, lenreq4, &ri)); + + + /* req5 is a complete and valid request (also somewhat malformed, + * since it uses \n\n instead of \r\n\r\n) */ + ck_assert_int_eq(lenreq5, get_http_header_len(req5, lenreq5)); + ck_assert_int_eq(-1, test_parse_http_response(req5, lenreq5, &respi)); + ck_assert_int_eq(lenreq5, test_parse_http_request(req5, lenreq5, &ri)); + ck_assert_str_eq("GET", ri.request_method); + ck_assert_str_eq("1.0", ri.http_version); + + + /* req6 is incomplete */ + ck_assert_int_eq(0, get_http_header_len(req6, lenreq6)); + ck_assert_int_eq(0, test_parse_http_request(req6, lenreq6, &ri)); + + + /* req7 is invalid, but not yet complete */ + ck_assert_int_eq(0, get_http_header_len(req7, lenreq7)); + ck_assert_int_eq(0, test_parse_http_request(req7, lenreq7, &ri)); + + + /* req8 is a valid response */ + ck_assert_int_eq(lenreq8, get_http_header_len(req8, lenreq8)); + ck_assert_int_eq(-1, test_parse_http_request(req8, lenreq8, &ri)); + ck_assert_int_eq(lenreq8, test_parse_http_response(req8, lenreq8, &respi)); + + + /* req9 is a valid response */ + ck_assert_int_eq(lenreq9, get_http_header_len(req9, lenreq9)); + ck_assert_int_eq(-1, test_parse_http_request(req9, lenreq9, &ri)); + ck_assert_int_eq(lenreq9, test_parse_http_response(req9, lenreq9, &respi)); + ck_assert_int_eq(1, respi.num_headers); + + + /* req10 is a valid request */ + ck_assert_int_eq(lenreq10, get_http_header_len(req10, lenreq10)); + ck_assert_int_eq(lenreq10, test_parse_http_request(req10, lenreq10, &ri)); + ck_assert_str_eq("1.1", ri.http_version); + ck_assert_int_eq(2, ri.num_headers); + ck_assert_str_eq("A", ri.http_headers[0].name); + ck_assert_str_eq("foo bar", ri.http_headers[0].value); + ck_assert_str_eq("B", ri.http_headers[1].name); + ck_assert_str_eq("bar", ri.http_headers[1].value); + + + /* req11 is a complete but valid request */ + ck_assert_int_eq(-1, test_parse_http_request(req11, lenreq11, &ri)); + + + /* req12 is a valid request with body data */ + ck_assert_int_gt(lenreq12, lenhdr12); + ck_assert_int_eq(lenhdr12, get_http_header_len(req12, lenreq12)); + ck_assert_int_eq(lenhdr12, test_parse_http_request(req12, lenreq12, &ri)); +} +END_TEST + + +START_TEST(test_should_keep_alive) +{ + /* Adapted from unit_test.c */ + /* Copyright (c) 2013-2015 the Civetweb developers */ + /* Copyright (c) 2004-2013 Sergey Lyubka */ + struct mg_connection conn; + struct mg_context ctx; + char req1[] = "GET / HTTP/1.1\r\n\r\n"; + char req2[] = "GET / HTTP/1.0\r\n\r\n"; + char req3[] = "GET / HTTP/1.1\r\nConnection: close\r\n\r\n"; + char req4[] = "GET / HTTP/1.1\r\nConnection: keep-alive\r\n\r\n"; + char yes[] = "yes"; + char no[] = "no"; + + int lenreq1 = (int)strlen(req1); + int lenreq2 = (int)strlen(req2); + int lenreq3 = (int)strlen(req3); + int lenreq4 = (int)strlen(req4); + + mark_point(); + + memset(&ctx, 0, sizeof(ctx)); + memset(&conn, 0, sizeof(conn)); + conn.ctx = &ctx; + ck_assert_int_eq(test_parse_http_request(req1, lenreq1, &conn.request_info), + lenreq1); + conn.connection_type = 1; /* Valid request */ + ck_assert_int_eq(conn.request_info.num_headers, 0); + + ctx.config[ENABLE_KEEP_ALIVE] = no; + ck_assert_int_eq(should_keep_alive(&conn), 0); + + ctx.config[ENABLE_KEEP_ALIVE] = yes; + ck_assert_int_eq(should_keep_alive(&conn), 1); + + conn.must_close = 1; + ck_assert_int_eq(should_keep_alive(&conn), 0); + + conn.must_close = 0; + test_parse_http_request(req2, lenreq2, &conn.request_info); + conn.connection_type = 1; /* Valid request */ + ck_assert_int_eq(conn.request_info.num_headers, 0); + ck_assert_int_eq(should_keep_alive(&conn), 0); + + test_parse_http_request(req3, lenreq3, &conn.request_info); + conn.connection_type = 1; /* Valid request */ + ck_assert_int_eq(conn.request_info.num_headers, 1); + ck_assert_int_eq(should_keep_alive(&conn), 0); + + test_parse_http_request(req4, lenreq4, &conn.request_info); + conn.connection_type = 1; /* Valid request */ + ck_assert_int_eq(conn.request_info.num_headers, 1); + ck_assert_int_eq(should_keep_alive(&conn), 1); + + conn.status_code = 200; + conn.must_close = 1; + ck_assert_int_eq(should_keep_alive(&conn), 0); + + conn.status_code = 200; + conn.must_close = 0; + ck_assert_int_eq(should_keep_alive(&conn), 1); + + conn.status_code = 200; + conn.must_close = 0; + conn.connection_type = 0; /* invalid */ + ck_assert_int_eq(should_keep_alive(&conn), 0); +} +END_TEST + + +START_TEST(test_match_prefix) +{ + /* Adapted from unit_test.c */ + /* Copyright (c) 2013-2015 the Civetweb developers */ + /* Copyright (c) 2004-2013 Sergey Lyubka */ + ck_assert_int_eq(4, match_prefix("/api", 4, "/api")); + ck_assert_int_eq(3, match_prefix("/a/", 3, "/a/b/c")); + ck_assert_int_eq(-1, match_prefix("/a/", 3, "/ab/c")); + ck_assert_int_eq(4, match_prefix("/*/", 3, "/ab/c")); + ck_assert_int_eq(6, match_prefix("**", 2, "/a/b/c")); + ck_assert_int_eq(2, match_prefix("/*", 2, "/a/b/c")); + ck_assert_int_eq(2, match_prefix("*/*", 3, "/a/b/c")); + ck_assert_int_eq(5, match_prefix("**/", 3, "/a/b/c")); + ck_assert_int_eq(5, match_prefix("**.foo|**.bar", 13, "a.bar")); + ck_assert_int_eq(2, match_prefix("a|b|cd", 6, "cdef")); + ck_assert_int_eq(2, match_prefix("a|b|c?", 6, "cdef")); + ck_assert_int_eq(1, match_prefix("a|?|cd", 6, "cdef")); + ck_assert_int_eq(-1, match_prefix("/a/**.cgi", 9, "/foo/bar/x.cgi")); + ck_assert_int_eq(12, match_prefix("/a/**.cgi", 9, "/a/bar/x.cgi")); + ck_assert_int_eq(5, match_prefix("**/", 3, "/a/b/c")); + ck_assert_int_eq(-1, match_prefix("**/$", 4, "/a/b/c")); + ck_assert_int_eq(5, match_prefix("**/$", 4, "/a/b/")); + ck_assert_int_eq(0, match_prefix("$", 1, "")); + ck_assert_int_eq(-1, match_prefix("$", 1, "x")); + ck_assert_int_eq(1, match_prefix("*$", 2, "x")); + ck_assert_int_eq(1, match_prefix("/$", 2, "/")); + ck_assert_int_eq(-1, match_prefix("**/$", 4, "/a/b/c")); + ck_assert_int_eq(5, match_prefix("**/$", 4, "/a/b/")); + ck_assert_int_eq(0, match_prefix("*", 1, "/hello/")); + ck_assert_int_eq(-1, match_prefix("**.a$|**.b$", 11, "/a/b.b/")); + ck_assert_int_eq(6, match_prefix("**.a$|**.b$", 11, "/a/b.b")); + ck_assert_int_eq(6, match_prefix("**.a$|**.b$", 11, "/a/B.A")); + ck_assert_int_eq(5, match_prefix("**o$", 4, "HELLO")); +} +END_TEST + + +START_TEST(test_remove_double_dots_and_double_slashes) +{ + /* Adapted from unit_test.c */ + /* Copyright (c) 2013-2015 the Civetweb developers */ + /* Copyright (c) 2004-2013 Sergey Lyubka */ + struct { + char before[20], after[20]; + } data[] = { + {"////a", "/a"}, + {"/.....", "/."}, + {"/......", "/"}, + {"..", "."}, + {"...", "."}, + {"/...///", "/./"}, + {"/a...///", "/a.../"}, + {"/.x", "/.x"}, + {"/\\", "/"}, + {"/a\\", "/a\\"}, + {"/a\\\\...", "/a\\."}, + }; + size_t i; + + mark_point(); + + for (i = 0; i < ARRAY_SIZE(data); i++) { + remove_double_dots_and_double_slashes(data[i].before); + ck_assert_str_eq(data[i].before, data[i].after); + } +} +END_TEST + + +START_TEST(test_is_valid_uri) +{ + /* is_valid_uri is superseeded by get_uri_type */ + ck_assert_int_eq(2, get_uri_type("/api")); + ck_assert_int_eq(2, get_uri_type("/api/")); + ck_assert_int_eq(2, + get_uri_type("/some/long/path%20with%20space/file.xyz")); + ck_assert_int_eq(0, get_uri_type("api")); + ck_assert_int_eq(1, get_uri_type("*")); + ck_assert_int_eq(0, get_uri_type("*xy")); + ck_assert_int_eq(3, get_uri_type("http://somewhere/")); + ck_assert_int_eq(3, get_uri_type("https://somewhere/some/file.html")); + ck_assert_int_eq(4, get_uri_type("http://somewhere:8080/")); + ck_assert_int_eq(4, get_uri_type("https://somewhere:8080/some/file.html")); +} +END_TEST + + +START_TEST(test_next_option) +{ + /* Adapted from unit_test.c */ + /* Copyright (c) 2013-2015 the Civetweb developers */ + /* Copyright (c) 2004-2013 Sergey Lyubka */ + const char *p, *list = "x/8,/y**=1;2k,z"; + struct vec a, b; + int i; + + mark_point(); + + ck_assert(next_option(NULL, &a, &b) == NULL); + for (i = 0, p = list; (p = next_option(p, &a, &b)) != NULL; i++) { + ck_assert(i != 0 || (a.ptr == list && a.len == 3 && b.len == 0)); + ck_assert(i != 1 + || (a.ptr == list + 4 && a.len == 4 && b.ptr == list + 9 + && b.len == 4)); + ck_assert(i != 2 || (a.ptr == list + 14 && a.len == 1 && b.len == 0)); + } +} +END_TEST + + +START_TEST(test_skip_quoted) +{ + /* Adapted from unit_test.c */ + /* Copyright (c) 2013-2015 the Civetweb developers */ + /* Copyright (c) 2004-2013 Sergey Lyubka */ + char x[] = "a=1, b=2, c='hi \' there', d='here\\, there'", *s = x, *p; + + mark_point(); + + p = skip_quoted(&s, ", ", ", ", 0); + ck_assert(p != NULL && !strcmp(p, "a=1")); + + p = skip_quoted(&s, ", ", ", ", 0); + ck_assert(p != NULL && !strcmp(p, "b=2")); + + p = skip_quoted(&s, ",", " ", 0); + ck_assert(p != NULL && !strcmp(p, "c='hi \' there'")); + + p = skip_quoted(&s, ",", " ", '\\'); + ck_assert(p != NULL && !strcmp(p, "d='here, there'")); + ck_assert(*s == 0); +} +END_TEST + + +static int +alloc_printf(char **buf, size_t size, const char *fmt, ...) +{ + /* Test helper function - adapted from unit_test.c */ + /* Copyright (c) 2013-2015 the Civetweb developers */ + /* Copyright (c) 2004-2013 Sergey Lyubka */ + va_list ap; + int ret = 0; + + mark_point(); + + va_start(ap, fmt); + ret = alloc_vprintf(buf, *buf, size, fmt, ap); + va_end(ap); + + return ret; +} + + +static int +alloc_printf2(char **buf, const char *fmt, ...) +{ + /* Test alternative implementation */ + va_list ap; + int ret = 0; + + mark_point(); + + va_start(ap, fmt); + ret = alloc_vprintf2(buf, fmt, ap); + va_end(ap); + + return ret; +} + + +START_TEST(test_alloc_vprintf) +{ + /* Adapted from unit_test.c */ + /* Copyright (c) 2013-2015 the Civetweb developers */ + /* Copyright (c) 2004-2013 Sergey Lyubka */ + char buf[MG_BUF_LEN], *p = buf; + mark_point(); + + ck_assert(alloc_printf(&p, sizeof(buf), "%s", "hi") == 2); + ck_assert(p == buf); + + ck_assert(alloc_printf(&p, sizeof(buf), "%s", "") == 0); + ck_assert(p == buf); + + ck_assert(alloc_printf(&p, sizeof(buf), "") == 0); + ck_assert(p == buf); + + /* Pass small buffer, make sure alloc_printf allocates */ + ck_assert(alloc_printf(&p, 1, "%s", "hello") == 5); + ck_assert(p != buf); + mg_free(p); + p = buf; + + /* Test alternative implementation */ + ck_assert(alloc_printf2(&p, "%s", "hello") == 5); + ck_assert(p != buf); + mg_free(p); + p = buf; +} +END_TEST + + +START_TEST(test_mg_vsnprintf) +{ + char buf[16]; + int is_trunc; + +#if defined(_WIN32) + /* If the string is truncated, mg_snprintf calls mg_cry. + * If DEBUG is defined, mg_cry calls DEBUG_TRACE. + * In DEBUG_TRACE_FUNC, flockfile(stdout) is called. + * For Windows, flockfile/funlockfile calls Enter-/ + * LeaveCriticalSection(&global_log_file_lock). + * So, we need to initialize global_log_file_lock: + */ + InitializeCriticalSection(&global_log_file_lock); +#endif + + memset(buf, 0, sizeof(buf)); + mark_point(); + + is_trunc = 777; + mg_snprintf(NULL, &is_trunc, buf, 10, "%8i", 123); + ck_assert_str_eq(buf, " 123"); + ck_assert_int_eq(is_trunc, 0); + + is_trunc = 777; + mg_snprintf(NULL, &is_trunc, buf, 10, "%9i", 123); + ck_assert_str_eq(buf, " 123"); + ck_assert_int_eq(is_trunc, 0); + + is_trunc = 777; + mg_snprintf(NULL, &is_trunc, buf, 9, "%9i", 123); + ck_assert_str_eq(buf, " 12"); + ck_assert_int_eq(is_trunc, 1); + + is_trunc = 777; + mg_snprintf(NULL, &is_trunc, buf, 8, "%9i", 123); + ck_assert_str_eq(buf, " 1"); + ck_assert_int_eq(is_trunc, 1); + + is_trunc = 777; + mg_snprintf(NULL, &is_trunc, buf, 7, "%9i", 123); + ck_assert_str_eq(buf, " "); + ck_assert_int_eq(is_trunc, 1); + + is_trunc = 777; + strcpy(buf, "1234567890"); + mg_snprintf(NULL, &is_trunc, buf, 0, "%i", 543); + ck_assert_str_eq(buf, "1234567890"); + ck_assert_int_eq(is_trunc, 1); +} +END_TEST + + +START_TEST(test_mg_strcasestr) +{ + /* Adapted from unit_test.c */ + /* Copyright (c) 2013-2015 the Civetweb developers */ + /* Copyright (c) 2004-2013 Sergey Lyubka */ + static const char *big1 = "abcdef"; + mark_point(); + + ck_assert(mg_strcasestr("Y", "X") == NULL); + ck_assert(mg_strcasestr("Y", "y") != NULL); + ck_assert(mg_strcasestr(big1, "X") == NULL); + ck_assert(mg_strcasestr(big1, "CD") == big1 + 2); + ck_assert(mg_strcasestr("aa", "AAB") == NULL); +} +END_TEST + + +START_TEST(test_parse_port_string) +{ + /* Adapted from unit_test.c */ + /* Copyright (c) 2013-2015 the Civetweb developers */ + /* Copyright (c) 2004-2013 Sergey Lyubka */ + static const char *valid[] = + { "0", + "1", + "1s", + "1r", + "1.2.3.4:1", + "1.2.3.4:1s", + "1.2.3.4:1r", +#if defined(USE_IPV6) + "[::1]:123", + "[::]:80", + "[3ffe:2a00:100:7031::1]:900", + "+80", +#endif + NULL }; + static const char *invalid[] = { + "99999", "1k", "1.2.3", "1.2.3.4:", "1.2.3.4:2p", NULL}; + struct socket so; + struct vec vec; + int ip_family; + int i; + + mark_point(); + + for (i = 0; valid[i] != NULL; i++) { + vec.ptr = valid[i]; + vec.len = strlen(vec.ptr); + ip_family = 123; + ck_assert_int_ne(parse_port_string(&vec, &so, &ip_family), 0); + if (i < 7) { + ck_assert_int_eq(ip_family, 4); + } else if (i < 10) { + ck_assert_int_eq(ip_family, 6); + } else { + ck_assert_int_eq(ip_family, 4 + 6); + } + } + + for (i = 0; invalid[i] != NULL; i++) { + vec.ptr = invalid[i]; + vec.len = strlen(vec.ptr); + ip_family = 123; + ck_assert_int_eq(parse_port_string(&vec, &so, &ip_family), 0); + ck_assert_int_eq(ip_family, 0); + } +} +END_TEST + + +START_TEST(test_encode_decode) +{ + char buf[128]; + const char *alpha = "abcdefghijklmnopqrstuvwxyz"; + const char *nonalpha = " !\"#$%&'()*+,-./0123456789:;<=>?@"; + const char *nonalpha_url_enc1 = + "%20%21%22%23$%25%26%27()%2a%2b,-.%2f0123456789%3a;%3c%3d%3e%3f%40"; + const char *nonalpha_url_enc2 = + "%20!%22%23%24%25%26'()*%2B%2C-.%2F0123456789%3A%3B%3C%3D%3E%3F%40"; + int ret; + size_t len; + +#if defined(USE_WEBSOCKET) || defined(USE_LUA) + const char *alpha_b64_enc = "YWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXo="; + const char *nonalpha_b64_enc = + "ICEiIyQlJicoKSorLC0uLzAxMjM0NTY3ODk6Ozw9Pj9A"; + + mark_point(); + + memset(buf, 77, sizeof(buf)); + base64_encode((unsigned char *)"a", 1, buf); + ck_assert_str_eq(buf, "YQ=="); + + memset(buf, 77, sizeof(buf)); + base64_encode((unsigned char *)"ab", 1, buf); + ck_assert_str_eq(buf, "YQ=="); + + memset(buf, 77, sizeof(buf)); + base64_encode((unsigned char *)"ab", 2, buf); + ck_assert_str_eq(buf, "YWI="); + + memset(buf, 77, sizeof(buf)); + base64_encode((unsigned char *)alpha, 3, buf); + ck_assert_str_eq(buf, "YWJj"); + + memset(buf, 77, sizeof(buf)); + base64_encode((unsigned char *)alpha, 4, buf); + ck_assert_str_eq(buf, "YWJjZA=="); + + memset(buf, 77, sizeof(buf)); + base64_encode((unsigned char *)alpha, 5, buf); + ck_assert_str_eq(buf, "YWJjZGU="); + + memset(buf, 77, sizeof(buf)); + base64_encode((unsigned char *)alpha, 6, buf); + ck_assert_str_eq(buf, "YWJjZGVm"); + + memset(buf, 77, sizeof(buf)); + base64_encode((unsigned char *)alpha, (int)strlen(alpha), buf); + ck_assert_str_eq(buf, alpha_b64_enc); + + memset(buf, 77, sizeof(buf)); + base64_encode((unsigned char *)nonalpha, (int)strlen(nonalpha), buf); + ck_assert_str_eq(buf, nonalpha_b64_enc); +#endif + +#if defined(USE_LUA) + memset(buf, 77, sizeof(buf)); + len = 9999; + ret = base64_decode((unsigned char *)alpha_b64_enc, + (int)strlen(alpha_b64_enc), + buf, + &len); + ck_assert_int_eq(ret, -1); + ck_assert_uint_eq((unsigned int)len, (unsigned int)strlen(alpha)); + ck_assert_str_eq(buf, alpha); + + memset(buf, 77, sizeof(buf)); + len = 9999; + ret = base64_decode((unsigned char *)"AAA*AAA", 7, buf, &len); + ck_assert_int_eq(ret, 3); +#endif + + memset(buf, 77, sizeof(buf)); + ret = mg_url_encode(alpha, buf, sizeof(buf)); + ck_assert_int_eq(ret, (int)strlen(buf)); + ck_assert_int_eq(ret, (int)strlen(alpha)); + ck_assert_str_eq(buf, alpha); + + memset(buf, 77, sizeof(buf)); + ret = mg_url_encode(nonalpha, buf, sizeof(buf)); + ck_assert_int_eq(ret, (int)strlen(buf)); + ck_assert_int_eq(ret, (int)strlen(nonalpha_url_enc1)); + ck_assert_str_eq(buf, nonalpha_url_enc1); + + memset(buf, 77, sizeof(buf)); + ret = mg_url_decode(alpha, (int)strlen(alpha), buf, sizeof(buf), 0); + ck_assert_int_eq(ret, (int)strlen(buf)); + ck_assert_int_eq(ret, (int)strlen(alpha)); + ck_assert_str_eq(buf, alpha); + + memset(buf, 77, sizeof(buf)); + ret = mg_url_decode( + nonalpha_url_enc1, (int)strlen(nonalpha_url_enc1), buf, sizeof(buf), 0); + ck_assert_int_eq(ret, (int)strlen(buf)); + ck_assert_int_eq(ret, (int)strlen(nonalpha)); + ck_assert_str_eq(buf, nonalpha); + + memset(buf, 77, sizeof(buf)); + ret = mg_url_decode( + nonalpha_url_enc2, (int)strlen(nonalpha_url_enc2), buf, sizeof(buf), 0); + ck_assert_int_eq(ret, (int)strlen(buf)); + ck_assert_int_eq(ret, (int)strlen(nonalpha)); + ck_assert_str_eq(buf, nonalpha); + + /* len could be unused, if base64_decode is not tested because USE_LUA is + * not defined */ + (void)len; +} +END_TEST + + +START_TEST(test_mask_data) +{ +#if defined(USE_WEBSOCKET) + char in[1024]; + char out[1024]; + int i; +#endif + + uint32_t mask = 0x61626364; + /* TODO: adapt test for big endian */ + ck_assert((*(unsigned char *)&mask) == 0x64u); + +#if defined(USE_WEBSOCKET) + memset(in, 0, sizeof(in)); + memset(out, 99, sizeof(out)); + + mask_data(in, sizeof(out), 0, out); + ck_assert(!memcmp(out, in, sizeof(out))); + + for (i = 0; i < 1024; i++) { + in[i] = (char)((unsigned char)i); + } + mask_data(in, 107, 0, out); + ck_assert(!memcmp(out, in, 107)); + + mask_data(in, 256, 0x01010101, out); + for (i = 0; i < 256; i++) { + ck_assert_int_eq((int)((unsigned char)out[i]), + (int)(((unsigned char)in[i]) ^ (char)1u)); + } + for (i = 256; i < (int)sizeof(out); i++) { + ck_assert_int_eq((int)((unsigned char)out[i]), (int)0); + } + + /* TODO: check this for big endian */ + mask_data(in, 5, 0x01020304, out); + ck_assert_uint_eq((unsigned char)out[0], 0u ^ 4u); + ck_assert_uint_eq((unsigned char)out[1], 1u ^ 3u); + ck_assert_uint_eq((unsigned char)out[2], 2u ^ 2u); + ck_assert_uint_eq((unsigned char)out[3], 3u ^ 1u); + ck_assert_uint_eq((unsigned char)out[4], 4u ^ 4u); +#endif +} +END_TEST + + +START_TEST(test_parse_date_string) +{ +#if !defined(NO_CACHING) + time_t now = time(0); + struct tm *tm = gmtime(&now); + char date[64] = {0}; + unsigned long i; + + ck_assert_uint_eq((unsigned long)parse_date_string("1/Jan/1970 00:01:02"), + 62ul); + ck_assert_uint_eq((unsigned long)parse_date_string("1 Jan 1970 00:02:03"), + 123ul); + ck_assert_uint_eq((unsigned long)parse_date_string("1-Jan-1970 00:03:04"), + 184ul); + ck_assert_uint_eq((unsigned long)parse_date_string( + "Xyz, 1 Jan 1970 00:04:05"), + 245ul); + + gmt_time_string(date, sizeof(date), &now); + ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now); + + sprintf(date, + "%02u %s %04u %02u:%02u:%02u", + tm->tm_mday, + month_names[tm->tm_mon], + tm->tm_year + 1900, + tm->tm_hour, + tm->tm_min, + tm->tm_sec); + ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now); + + gmt_time_string(date, 1, NULL); + ck_assert_str_eq(date, ""); + gmt_time_string(date, 6, NULL); + ck_assert_str_eq(date, + "Thu, "); /* part of "Thu, 01 Jan 1970 00:00:00 GMT" */ + gmt_time_string(date, sizeof(date), NULL); + ck_assert_str_eq(date, "Thu, 01 Jan 1970 00:00:00 GMT"); + + for (i = 2ul; i < 0x8000000ul; i += i / 2) { + now = (time_t)i; + + gmt_time_string(date, sizeof(date), &now); + ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now); + + tm = gmtime(&now); + sprintf(date, + "%02u-%s-%04u %02u:%02u:%02u", + tm->tm_mday, + month_names[tm->tm_mon], + tm->tm_year + 1900, + tm->tm_hour, + tm->tm_min, + tm->tm_sec); + ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now); + } +#endif +} +END_TEST + + +START_TEST(test_sha1) +{ +#ifdef SHA1_DIGEST_SIZE + SHA_CTX sha_ctx; + uint8_t digest[SHA1_DIGEST_SIZE] = {0}; + char str[48] = {0}; + int i; + const char *test_str; + + ck_assert_uint_eq(sizeof(digest), 20); + ck_assert_uint_gt(sizeof(str), sizeof(digest) * 2 + 1); + + /* empty string */ + SHA1_Init(&sha_ctx); + SHA1_Final(digest, &sha_ctx); + bin2str(str, digest, sizeof(digest)); + ck_assert_uint_eq(strlen(str), 40); + ck_assert_str_eq(str, "da39a3ee5e6b4b0d3255bfef95601890afd80709"); + + /* empty string */ + SHA1_Init(&sha_ctx); + SHA1_Update(&sha_ctx, (uint8_t *)"abc", 0); + SHA1_Final(digest, &sha_ctx); + bin2str(str, digest, sizeof(digest)); + ck_assert_uint_eq(strlen(str), 40); + ck_assert_str_eq(str, "da39a3ee5e6b4b0d3255bfef95601890afd80709"); + + /* "abc" */ + SHA1_Init(&sha_ctx); + SHA1_Update(&sha_ctx, (uint8_t *)"abc", 3); + SHA1_Final(digest, &sha_ctx); + bin2str(str, digest, sizeof(digest)); + ck_assert_uint_eq(strlen(str), 40); + ck_assert_str_eq(str, "a9993e364706816aba3e25717850c26c9cd0d89d"); + + /* "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" */ + test_str = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"; + SHA1_Init(&sha_ctx); + SHA1_Update(&sha_ctx, (uint8_t *)test_str, (uint32_t)strlen(test_str)); + SHA1_Final(digest, &sha_ctx); + bin2str(str, digest, sizeof(digest)); + ck_assert_uint_eq(strlen(str), 40); + ck_assert_str_eq(str, "84983e441c3bd26ebaae4aa1f95129e5e54670f1"); + + /* a million "a" */ + SHA1_Init(&sha_ctx); + for (i = 0; i < 1000000; i++) { + SHA1_Update(&sha_ctx, (uint8_t *)"a", 1); + } + SHA1_Final(digest, &sha_ctx); + bin2str(str, digest, sizeof(digest)); + ck_assert_uint_eq(strlen(str), 40); + ck_assert_str_eq(str, "34aa973cd4c4daa4f61eeb2bdbad27316534016f"); + + /* a million "a" in blocks of 10 */ + SHA1_Init(&sha_ctx); + for (i = 0; i < 100000; i++) { + SHA1_Update(&sha_ctx, (uint8_t *)"aaaaaaaaaa", 10); + } + SHA1_Final(digest, &sha_ctx); + bin2str(str, digest, sizeof(digest)); + ck_assert_uint_eq(strlen(str), 40); + ck_assert_str_eq(str, "34aa973cd4c4daa4f61eeb2bdbad27316534016f"); +#else + /* Can not test, if SHA1 is not included */ + ck_assert(1); +#endif +} +END_TEST + + +#if !defined(REPLACE_CHECK_FOR_LOCAL_DEBUGGING) +Suite * +make_private_suite(void) +{ + Suite *const suite = suite_create("Private"); + + TCase *const tcase_http_message = tcase_create("HTTP Message"); + TCase *const tcase_http_keep_alive = tcase_create("HTTP Keep Alive"); + TCase *const tcase_url_parsing_1 = tcase_create("URL Parsing 1"); + TCase *const tcase_url_parsing_2 = tcase_create("URL Parsing 2"); + TCase *const tcase_url_parsing_3 = tcase_create("URL Parsing 3"); + TCase *const tcase_internal_parse_1 = tcase_create("Internal Parsing 1"); + TCase *const tcase_internal_parse_2 = tcase_create("Internal Parsing 2"); + TCase *const tcase_internal_parse_3 = tcase_create("Internal Parsing 3"); + TCase *const tcase_internal_parse_4 = tcase_create("Internal Parsing 4"); + TCase *const tcase_internal_parse_5 = tcase_create("Internal Parsing 5"); + TCase *const tcase_internal_parse_6 = tcase_create("Internal Parsing 6"); + TCase *const tcase_encode_decode = tcase_create("Encode Decode"); + TCase *const tcase_mask_data = tcase_create("Mask Data"); + TCase *const tcase_parse_date_string = tcase_create("Date Parsing"); + TCase *const tcase_sha1 = tcase_create("SHA1"); + + tcase_add_test(tcase_http_message, test_parse_http_message); + tcase_set_timeout(tcase_http_message, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_http_message); + + tcase_add_test(tcase_http_keep_alive, test_should_keep_alive); + tcase_set_timeout(tcase_http_keep_alive, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_http_keep_alive); + + tcase_add_test(tcase_url_parsing_1, test_match_prefix); + tcase_set_timeout(tcase_url_parsing_1, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_url_parsing_1); + + tcase_add_test(tcase_url_parsing_2, + test_remove_double_dots_and_double_slashes); + tcase_set_timeout(tcase_url_parsing_2, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_url_parsing_2); + + tcase_add_test(tcase_url_parsing_3, test_is_valid_uri); + tcase_set_timeout(tcase_url_parsing_3, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_url_parsing_3); + + tcase_add_test(tcase_internal_parse_1, test_next_option); + tcase_set_timeout(tcase_internal_parse_1, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_internal_parse_1); + + tcase_add_test(tcase_internal_parse_2, test_skip_quoted); + tcase_set_timeout(tcase_internal_parse_2, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_internal_parse_2); + + tcase_add_test(tcase_internal_parse_3, test_mg_strcasestr); + tcase_set_timeout(tcase_internal_parse_3, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_internal_parse_3); + + tcase_add_test(tcase_internal_parse_4, test_alloc_vprintf); + tcase_set_timeout(tcase_internal_parse_4, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_internal_parse_4); + + tcase_add_test(tcase_internal_parse_5, test_mg_vsnprintf); + tcase_set_timeout(tcase_internal_parse_5, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_internal_parse_5); + + tcase_add_test(tcase_internal_parse_6, test_parse_port_string); + tcase_set_timeout(tcase_internal_parse_6, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_internal_parse_6); + + tcase_add_test(tcase_encode_decode, test_encode_decode); + tcase_set_timeout(tcase_encode_decode, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_encode_decode); + + tcase_add_test(tcase_mask_data, test_mask_data); + tcase_set_timeout(tcase_mask_data, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_mask_data); + + tcase_add_test(tcase_parse_date_string, test_parse_date_string); + tcase_set_timeout(tcase_parse_date_string, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_parse_date_string); + + tcase_add_test(tcase_sha1, test_sha1); + tcase_set_timeout(tcase_sha1, civetweb_min_test_timeout); + suite_add_tcase(suite, tcase_sha1); + + return suite; +} +#endif + + +#ifdef REPLACE_CHECK_FOR_LOCAL_DEBUGGING +/* Used to debug test cases without using the check framework */ + +void +MAIN_PRIVATE(void) +{ +#if defined(_WIN32) + /* test_parse_port_string requires WSAStartup for IPv6 */ + WSADATA data; + WSAStartup(MAKEWORD(2, 2), &data); +#endif + + test_alloc_vprintf(0); + test_mg_vsnprintf(0); + test_remove_double_dots_and_double_slashes(0); + test_parse_date_string(0); + test_parse_port_string(0); + test_parse_http_message(0); + test_sha1(0); + +#if defined(_WIN32) + WSACleanup(); +#endif +} + +#endif |