private.c 38 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169
  1. /* Copyright (c) 2015-2018 the Civetweb developers
  2. *
  3. * Permission is hereby granted, free of charge, to any person obtaining a copy
  4. * of this software and associated documentation files (the "Software"), to deal
  5. * in the Software without restriction, including without limitation the rights
  6. * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  7. * copies of the Software, and to permit persons to whom the Software is
  8. * furnished to do so, subject to the following conditions:
  9. *
  10. * The above copyright notice and this permission notice shall be included in
  11. * all copies or substantial portions of the Software.
  12. *
  13. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  14. * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  15. * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  16. * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  17. * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  18. * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  19. * THE SOFTWARE.
  20. */
  21. /**
  22. * We include the source file so that we have access to the internal private
  23. * static functions
  24. */
  25. #ifdef _MSC_VER
  26. #ifndef _CRT_SECURE_NO_WARNINGS
  27. #define _CRT_SECURE_NO_WARNINGS
  28. #endif
  29. #define CIVETWEB_API static
  30. #endif
  31. #ifdef REPLACE_CHECK_FOR_LOCAL_DEBUGGING
  32. #undef MEMORY_DEBUGGING
  33. #endif
  34. #include "../src/civetweb.c"
  35. #include <stdlib.h>
  36. #include <time.h>
  37. #include "private.h"
  38. /* This unit test file uses the excellent Check unit testing library.
  39. * The API documentation is available here:
  40. * http://check.sourceforge.net/doc/check_html/index.html
  41. */
  42. static char tmp_parse_buffer[1024];
  43. static int
  44. test_parse_http_response(char *buf, int len, struct mg_response_info *ri)
  45. {
  46. ck_assert_int_lt(len, (int)sizeof(tmp_parse_buffer));
  47. memcpy(tmp_parse_buffer, buf, (size_t)len);
  48. return parse_http_response(tmp_parse_buffer, len, ri);
  49. }
  50. static int
  51. test_parse_http_request(char *buf, int len, struct mg_request_info *ri)
  52. {
  53. ck_assert_int_lt(len, (int)sizeof(tmp_parse_buffer));
  54. memcpy(tmp_parse_buffer, buf, (size_t)len);
  55. return parse_http_request(tmp_parse_buffer, len, ri);
  56. }
  57. START_TEST(test_parse_http_message)
  58. {
  59. /* Adapted from unit_test.c */
  60. /* Copyright (c) 2013-2015 the Civetweb developers */
  61. /* Copyright (c) 2004-2013 Sergey Lyubka */
  62. struct mg_request_info ri;
  63. struct mg_response_info respi;
  64. char empty[] = "";
  65. char space[] = " \x00";
  66. char req1[] = "GET / HTTP/1.1\r\n\r\n";
  67. char req2[] = "BLAH / HTTP/1.1\r\n\r\n";
  68. char req3[] = "GET / HTTP/1.1\nKey: Val\n\n";
  69. char req4[] =
  70. "GET / HTTP/1.1\r\nA: foo bar\r\nB: bar\r\nskip\r\nbaz:\r\n\r\n";
  71. char req5[] = "GET / HTTP/1.0\n\n";
  72. char req6[] = "G";
  73. char req7[] = " blah ";
  74. char req8[] = "HTTP/1.0 404 Not Found\n\n";
  75. char req9[] = "HTTP/1.1 200 OK\r\nConnection: close\r\n\r\n";
  76. char req10[] = "GET / HTTP/1.1\r\nA: foo bar\r\nB: bar\r\n\r\n";
  77. char req11[] = "GET /\r\nError: X\r\n\r\n";
  78. char req12[] =
  79. "POST /a/b/c.d?e=f&g HTTP/1.1\r\nKey1: val1\r\nKey2: val2\r\n\r\nBODY";
  80. int lenreq1 = (int)strlen(req1);
  81. int lenreq2 = (int)strlen(req2);
  82. int lenreq3 = (int)strlen(req3);
  83. int lenreq4 = (int)strlen(req4);
  84. int lenreq5 = (int)strlen(req5);
  85. int lenreq6 = (int)strlen(req6);
  86. int lenreq7 = (int)strlen(req7);
  87. int lenreq8 = (int)strlen(req8);
  88. int lenreq9 = (int)strlen(req9);
  89. int lenreq10 = (int)strlen(req10);
  90. int lenreq11 = (int)strlen(req11);
  91. int lenreq12 = (int)strlen(req12);
  92. int lenhdr12 = lenreq12 - 4; /* length without body */
  93. mark_point();
  94. /* An empty string is neither a complete request nor a complete
  95. * response, so it must return 0 */
  96. ck_assert_int_eq(0, get_http_header_len(empty, 0));
  97. ck_assert_int_eq(0, test_parse_http_request(empty, 0, &ri));
  98. ck_assert_int_eq(0, test_parse_http_response(empty, 0, &respi));
  99. /* Same is true for a leading space */
  100. ck_assert_int_eq(0, get_http_header_len(space, 1));
  101. ck_assert_int_eq(0, test_parse_http_request(space, 1, &ri));
  102. ck_assert_int_eq(0, test_parse_http_response(space, 1, &respi));
  103. /* But a control character (like 0) makes it invalid */
  104. ck_assert_int_eq(-1, get_http_header_len(space, 2));
  105. ck_assert_int_eq(-1, test_parse_http_request(space, 2, &ri));
  106. ck_assert_int_eq(-1, test_parse_http_response(space, 2, &respi));
  107. /* req1 minus 1 byte at the end is incomplete */
  108. ck_assert_int_eq(0, get_http_header_len(req1, lenreq1 - 1));
  109. /* req1 minus 1 byte at the start is complete but invalid */
  110. ck_assert_int_eq(lenreq1 - 1, get_http_header_len(req1 + 1, lenreq1 - 1));
  111. ck_assert_int_eq(-1, test_parse_http_request(req1 + 1, lenreq1 - 1, &ri));
  112. /* req1 is a valid request */
  113. ck_assert_int_eq(lenreq1, get_http_header_len(req1, lenreq1));
  114. ck_assert_int_eq(-1, test_parse_http_response(req1, lenreq1, &respi));
  115. ck_assert_int_eq(lenreq1, test_parse_http_request(req1, lenreq1, &ri));
  116. ck_assert_str_eq("1.1", ri.http_version);
  117. ck_assert_int_eq(0, ri.num_headers);
  118. /* req2 is a complete, but invalid request */
  119. ck_assert_int_eq(lenreq2, get_http_header_len(req2, lenreq2));
  120. ck_assert_int_eq(-1, test_parse_http_request(req2, lenreq2, &ri));
  121. /* req3 is a complete and valid request */
  122. ck_assert_int_eq(lenreq3, get_http_header_len(req3, lenreq3));
  123. ck_assert_int_eq(lenreq3, test_parse_http_request(req3, lenreq3, &ri));
  124. ck_assert_int_eq(-1, test_parse_http_response(req3, lenreq3, &respi));
  125. /* Multiline header are obsolete, so return an error
  126. * (https://tools.ietf.org/html/rfc7230#section-3.2.4). */
  127. ck_assert_int_eq(-1, test_parse_http_request(req4, lenreq4, &ri));
  128. /* req5 is a complete and valid request (also somewhat malformed,
  129. * since it uses \n\n instead of \r\n\r\n) */
  130. ck_assert_int_eq(lenreq5, get_http_header_len(req5, lenreq5));
  131. ck_assert_int_eq(-1, test_parse_http_response(req5, lenreq5, &respi));
  132. ck_assert_int_eq(lenreq5, test_parse_http_request(req5, lenreq5, &ri));
  133. ck_assert_str_eq("GET", ri.request_method);
  134. ck_assert_str_eq("1.0", ri.http_version);
  135. /* req6 is incomplete */
  136. ck_assert_int_eq(0, get_http_header_len(req6, lenreq6));
  137. ck_assert_int_eq(0, test_parse_http_request(req6, lenreq6, &ri));
  138. /* req7 is invalid, but not yet complete */
  139. ck_assert_int_eq(0, get_http_header_len(req7, lenreq7));
  140. ck_assert_int_eq(0, test_parse_http_request(req7, lenreq7, &ri));
  141. /* req8 is a valid response */
  142. ck_assert_int_eq(lenreq8, get_http_header_len(req8, lenreq8));
  143. ck_assert_int_eq(-1, test_parse_http_request(req8, lenreq8, &ri));
  144. ck_assert_int_eq(lenreq8, test_parse_http_response(req8, lenreq8, &respi));
  145. /* req9 is a valid response */
  146. ck_assert_int_eq(lenreq9, get_http_header_len(req9, lenreq9));
  147. ck_assert_int_eq(-1, test_parse_http_request(req9, lenreq9, &ri));
  148. ck_assert_int_eq(lenreq9, test_parse_http_response(req9, lenreq9, &respi));
  149. ck_assert_int_eq(1, respi.num_headers);
  150. /* req10 is a valid request */
  151. ck_assert_int_eq(lenreq10, get_http_header_len(req10, lenreq10));
  152. ck_assert_int_eq(lenreq10, test_parse_http_request(req10, lenreq10, &ri));
  153. ck_assert_str_eq("1.1", ri.http_version);
  154. ck_assert_int_eq(2, ri.num_headers);
  155. ck_assert_str_eq("A", ri.http_headers[0].name);
  156. ck_assert_str_eq("foo bar", ri.http_headers[0].value);
  157. ck_assert_str_eq("B", ri.http_headers[1].name);
  158. ck_assert_str_eq("bar", ri.http_headers[1].value);
  159. /* req11 is a complete but valid request */
  160. ck_assert_int_eq(-1, test_parse_http_request(req11, lenreq11, &ri));
  161. /* req12 is a valid request with body data */
  162. ck_assert_int_gt(lenreq12, lenhdr12);
  163. ck_assert_int_eq(lenhdr12, get_http_header_len(req12, lenreq12));
  164. ck_assert_int_eq(lenhdr12, test_parse_http_request(req12, lenreq12, &ri));
  165. }
  166. END_TEST
  167. START_TEST(test_should_keep_alive)
  168. {
  169. /* Adapted from unit_test.c */
  170. /* Copyright (c) 2013-2015 the Civetweb developers */
  171. /* Copyright (c) 2004-2013 Sergey Lyubka */
  172. struct mg_connection conn;
  173. struct mg_context ctx;
  174. char req1[] = "GET / HTTP/1.1\r\n\r\n";
  175. char req2[] = "GET / HTTP/1.0\r\n\r\n";
  176. char req3[] = "GET / HTTP/1.1\r\nConnection: close\r\n\r\n";
  177. char req4[] = "GET / HTTP/1.1\r\nConnection: keep-alive\r\n\r\n";
  178. char yes[] = "yes";
  179. char no[] = "no";
  180. int lenreq1 = (int)strlen(req1);
  181. int lenreq2 = (int)strlen(req2);
  182. int lenreq3 = (int)strlen(req3);
  183. int lenreq4 = (int)strlen(req4);
  184. mark_point();
  185. memset(&ctx, 0, sizeof(ctx));
  186. memset(&conn, 0, sizeof(conn));
  187. conn.phys_ctx = &ctx;
  188. conn.dom_ctx = &(ctx.dd);
  189. ck_assert_int_eq(test_parse_http_request(req1, lenreq1, &conn.request_info),
  190. lenreq1);
  191. conn.connection_type = 1; /* Valid request */
  192. ck_assert_int_eq(conn.request_info.num_headers, 0);
  193. ctx.dd.config[ENABLE_KEEP_ALIVE] = no;
  194. ck_assert_int_eq(should_keep_alive(&conn), 0);
  195. ctx.dd.config[ENABLE_KEEP_ALIVE] = yes;
  196. ck_assert_int_eq(should_keep_alive(&conn), 1);
  197. conn.must_close = 1;
  198. ck_assert_int_eq(should_keep_alive(&conn), 0);
  199. conn.must_close = 0;
  200. test_parse_http_request(req2, lenreq2, &conn.request_info);
  201. conn.connection_type = 1; /* Valid request */
  202. ck_assert_int_eq(conn.request_info.num_headers, 0);
  203. ck_assert_int_eq(should_keep_alive(&conn), 0);
  204. test_parse_http_request(req3, lenreq3, &conn.request_info);
  205. conn.connection_type = 1; /* Valid request */
  206. ck_assert_int_eq(conn.request_info.num_headers, 1);
  207. ck_assert_int_eq(should_keep_alive(&conn), 0);
  208. test_parse_http_request(req4, lenreq4, &conn.request_info);
  209. conn.connection_type = 1; /* Valid request */
  210. ck_assert_int_eq(conn.request_info.num_headers, 1);
  211. ck_assert_int_eq(should_keep_alive(&conn), 1);
  212. conn.status_code = 200;
  213. conn.must_close = 1;
  214. ck_assert_int_eq(should_keep_alive(&conn), 0);
  215. conn.status_code = 200;
  216. conn.must_close = 0;
  217. ck_assert_int_eq(should_keep_alive(&conn), 1);
  218. conn.status_code = 200;
  219. conn.must_close = 0;
  220. conn.connection_type = 0; /* invalid */
  221. ck_assert_int_eq(should_keep_alive(&conn), 0);
  222. }
  223. END_TEST
  224. START_TEST(test_match_prefix)
  225. {
  226. /* Adapted from unit_test.c */
  227. /* Copyright (c) 2013-2015 the Civetweb developers */
  228. /* Copyright (c) 2004-2013 Sergey Lyubka */
  229. ck_assert_int_eq(4, match_prefix("/api", 4, "/api"));
  230. ck_assert_int_eq(3, match_prefix("/a/", 3, "/a/b/c"));
  231. ck_assert_int_eq(-1, match_prefix("/a/", 3, "/ab/c"));
  232. ck_assert_int_eq(4, match_prefix("/*/", 3, "/ab/c"));
  233. ck_assert_int_eq(6, match_prefix("**", 2, "/a/b/c"));
  234. ck_assert_int_eq(2, match_prefix("/*", 2, "/a/b/c"));
  235. ck_assert_int_eq(2, match_prefix("*/*", 3, "/a/b/c"));
  236. ck_assert_int_eq(5, match_prefix("**/", 3, "/a/b/c"));
  237. ck_assert_int_eq(5, match_prefix("**.foo|**.bar", 13, "a.bar"));
  238. ck_assert_int_eq(2, match_prefix("a|b|cd", 6, "cdef"));
  239. ck_assert_int_eq(2, match_prefix("a|b|c?", 6, "cdef"));
  240. ck_assert_int_eq(1, match_prefix("a|?|cd", 6, "cdef"));
  241. ck_assert_int_eq(-1, match_prefix("/a/**.cgi", 9, "/foo/bar/x.cgi"));
  242. ck_assert_int_eq(12, match_prefix("/a/**.cgi", 9, "/a/bar/x.cgi"));
  243. ck_assert_int_eq(5, match_prefix("**/", 3, "/a/b/c"));
  244. ck_assert_int_eq(-1, match_prefix("**/$", 4, "/a/b/c"));
  245. ck_assert_int_eq(5, match_prefix("**/$", 4, "/a/b/"));
  246. ck_assert_int_eq(0, match_prefix("$", 1, ""));
  247. ck_assert_int_eq(-1, match_prefix("$", 1, "x"));
  248. ck_assert_int_eq(1, match_prefix("*$", 2, "x"));
  249. ck_assert_int_eq(1, match_prefix("/$", 2, "/"));
  250. ck_assert_int_eq(-1, match_prefix("**/$", 4, "/a/b/c"));
  251. ck_assert_int_eq(5, match_prefix("**/$", 4, "/a/b/"));
  252. ck_assert_int_eq(0, match_prefix("*", 1, "/hello/"));
  253. ck_assert_int_eq(-1, match_prefix("**.a$|**.b$", 11, "/a/b.b/"));
  254. ck_assert_int_eq(6, match_prefix("**.a$|**.b$", 11, "/a/b.b"));
  255. ck_assert_int_eq(6, match_prefix("**.a$|**.b$", 11, "/a/B.A"));
  256. ck_assert_int_eq(5, match_prefix("**o$", 4, "HELLO"));
  257. }
  258. END_TEST
  259. START_TEST(test_remove_double_dots_and_double_slashes)
  260. {
  261. /* Adapted from unit_test.c */
  262. /* Copyright (c) 2013-2015 the Civetweb developers */
  263. /* Copyright (c) 2004-2013 Sergey Lyubka */
  264. struct {
  265. char before[20], after[20];
  266. } data[] = {
  267. {"////a", "/a"},
  268. {"/.....", "/."},
  269. {"/......", "/"},
  270. {"..", "."},
  271. {"...", "."},
  272. {"/...///", "/./"},
  273. {"/a...///", "/a.../"},
  274. {"/.x", "/.x"},
  275. {"/\\", "/"},
  276. {"/a\\", "/a\\"},
  277. {"/a\\\\...", "/a\\."},
  278. };
  279. size_t i;
  280. mark_point();
  281. for (i = 0; i < ARRAY_SIZE(data); i++) {
  282. remove_double_dots_and_double_slashes(data[i].before);
  283. ck_assert_str_eq(data[i].before, data[i].after);
  284. }
  285. }
  286. END_TEST
  287. START_TEST(test_is_valid_uri)
  288. {
  289. /* is_valid_uri is superseeded by get_uri_type */
  290. ck_assert_int_eq(2, get_uri_type("/api"));
  291. ck_assert_int_eq(2, get_uri_type("/api/"));
  292. ck_assert_int_eq(2,
  293. get_uri_type("/some/long/path%20with%20space/file.xyz"));
  294. ck_assert_int_eq(0, get_uri_type("api"));
  295. ck_assert_int_eq(1, get_uri_type("*"));
  296. ck_assert_int_eq(0, get_uri_type("*xy"));
  297. ck_assert_int_eq(3, get_uri_type("http://somewhere/"));
  298. ck_assert_int_eq(3, get_uri_type("https://somewhere/some/file.html"));
  299. ck_assert_int_eq(4, get_uri_type("http://somewhere:8080/"));
  300. ck_assert_int_eq(4, get_uri_type("https://somewhere:8080/some/file.html"));
  301. }
  302. END_TEST
  303. START_TEST(test_next_option)
  304. {
  305. /* Adapted from unit_test.c */
  306. /* Copyright (c) 2013-2015 the Civetweb developers */
  307. /* Copyright (c) 2004-2013 Sergey Lyubka */
  308. const char *p, *list = "x/8,/y**=1;2k,z";
  309. struct vec a, b;
  310. int i;
  311. mark_point();
  312. ck_assert(next_option(NULL, &a, &b) == NULL);
  313. for (i = 0, p = list; (p = next_option(p, &a, &b)) != NULL; i++) {
  314. ck_assert(i != 0 || (a.ptr == list && a.len == 3 && b.len == 0));
  315. ck_assert(i != 1
  316. || (a.ptr == list + 4 && a.len == 4 && b.ptr == list + 9
  317. && b.len == 4));
  318. ck_assert(i != 2 || (a.ptr == list + 14 && a.len == 1 && b.len == 0));
  319. }
  320. }
  321. END_TEST
  322. START_TEST(test_skip_quoted)
  323. {
  324. /* Adapted from unit_test.c */
  325. /* Copyright (c) 2013-2015 the Civetweb developers */
  326. /* Copyright (c) 2004-2013 Sergey Lyubka */
  327. char x[] = "a=1, b=2, c='hi \' there', d='here\\, there'", *s = x, *p;
  328. mark_point();
  329. p = skip_quoted(&s, ", ", ", ", 0);
  330. ck_assert(p != NULL && !strcmp(p, "a=1"));
  331. p = skip_quoted(&s, ", ", ", ", 0);
  332. ck_assert(p != NULL && !strcmp(p, "b=2"));
  333. p = skip_quoted(&s, ",", " ", 0);
  334. ck_assert(p != NULL && !strcmp(p, "c='hi \' there'"));
  335. p = skip_quoted(&s, ",", " ", '\\');
  336. ck_assert(p != NULL && !strcmp(p, "d='here, there'"));
  337. ck_assert(*s == 0);
  338. }
  339. END_TEST
  340. static int
  341. alloc_printf(char **buf, size_t size, const char *fmt, ...)
  342. {
  343. /* Test helper function - adapted from unit_test.c */
  344. /* Copyright (c) 2013-2015 the Civetweb developers */
  345. /* Copyright (c) 2004-2013 Sergey Lyubka */
  346. va_list ap;
  347. int ret = 0;
  348. mark_point();
  349. va_start(ap, fmt);
  350. ret = alloc_vprintf(buf, *buf, size, fmt, ap);
  351. va_end(ap);
  352. return ret;
  353. }
  354. static int
  355. alloc_printf2(char **buf, const char *fmt, ...)
  356. {
  357. /* Test alternative implementation */
  358. va_list ap;
  359. int ret = 0;
  360. mark_point();
  361. va_start(ap, fmt);
  362. ret = alloc_vprintf2(buf, fmt, ap);
  363. va_end(ap);
  364. return ret;
  365. }
  366. START_TEST(test_alloc_vprintf)
  367. {
  368. /* Adapted from unit_test.c */
  369. /* Copyright (c) 2013-2015 the Civetweb developers */
  370. /* Copyright (c) 2004-2013 Sergey Lyubka */
  371. char buf[MG_BUF_LEN], *p = buf;
  372. mark_point();
  373. ck_assert(alloc_printf(&p, sizeof(buf), "%s", "hi") == 2);
  374. ck_assert(p == buf);
  375. ck_assert(alloc_printf(&p, sizeof(buf), "%s", "") == 0);
  376. ck_assert(p == buf);
  377. ck_assert(alloc_printf(&p, sizeof(buf), "") == 0);
  378. ck_assert(p == buf);
  379. /* Pass small buffer, make sure alloc_printf allocates */
  380. ck_assert(alloc_printf(&p, 1, "%s", "hello") == 5);
  381. ck_assert(p != buf);
  382. mg_free(p);
  383. p = buf;
  384. /* Test alternative implementation */
  385. ck_assert(alloc_printf2(&p, "%s", "hello") == 5);
  386. ck_assert(p != buf);
  387. mg_free(p);
  388. p = buf;
  389. }
  390. END_TEST
  391. START_TEST(test_mg_vsnprintf)
  392. {
  393. char buf[16];
  394. int is_trunc;
  395. #if defined(_WIN32)
  396. /* If the string is truncated, mg_snprintf calls mg_cry.
  397. * If DEBUG is defined, mg_cry calls DEBUG_TRACE.
  398. * In DEBUG_TRACE_FUNC, flockfile(stdout) is called.
  399. * For Windows, flockfile/funlockfile calls Enter-/
  400. * LeaveCriticalSection(&global_log_file_lock).
  401. * So, we need to initialize global_log_file_lock:
  402. */
  403. InitializeCriticalSection(&global_log_file_lock);
  404. #endif
  405. memset(buf, 0, sizeof(buf));
  406. mark_point();
  407. is_trunc = 777;
  408. mg_snprintf(NULL, &is_trunc, buf, 10, "%8i", 123);
  409. ck_assert_str_eq(buf, " 123");
  410. ck_assert_int_eq(is_trunc, 0);
  411. is_trunc = 777;
  412. mg_snprintf(NULL, &is_trunc, buf, 10, "%9i", 123);
  413. ck_assert_str_eq(buf, " 123");
  414. ck_assert_int_eq(is_trunc, 0);
  415. is_trunc = 777;
  416. mg_snprintf(NULL, &is_trunc, buf, 9, "%9i", 123);
  417. ck_assert_str_eq(buf, " 12");
  418. ck_assert_int_eq(is_trunc, 1);
  419. is_trunc = 777;
  420. mg_snprintf(NULL, &is_trunc, buf, 8, "%9i", 123);
  421. ck_assert_str_eq(buf, " 1");
  422. ck_assert_int_eq(is_trunc, 1);
  423. is_trunc = 777;
  424. mg_snprintf(NULL, &is_trunc, buf, 7, "%9i", 123);
  425. ck_assert_str_eq(buf, " ");
  426. ck_assert_int_eq(is_trunc, 1);
  427. is_trunc = 777;
  428. strcpy(buf, "1234567890");
  429. mg_snprintf(NULL, &is_trunc, buf, 0, "%i", 543);
  430. ck_assert_str_eq(buf, "1234567890");
  431. ck_assert_int_eq(is_trunc, 1);
  432. }
  433. END_TEST
  434. START_TEST(test_mg_strcasestr)
  435. {
  436. /* Adapted from unit_test.c */
  437. /* Copyright (c) 2013-2015 the Civetweb developers */
  438. /* Copyright (c) 2004-2013 Sergey Lyubka */
  439. static const char *big1 = "abcdef";
  440. mark_point();
  441. ck_assert(mg_strcasestr("Y", "X") == NULL);
  442. ck_assert(mg_strcasestr("Y", "y") != NULL);
  443. ck_assert(mg_strcasestr(big1, "X") == NULL);
  444. ck_assert(mg_strcasestr(big1, "CD") == big1 + 2);
  445. ck_assert(mg_strcasestr("aa", "AAB") == NULL);
  446. }
  447. END_TEST
  448. START_TEST(test_parse_port_string)
  449. {
  450. /* Adapted from unit_test.c */
  451. /* Copyright (c) 2013-2018 the Civetweb developers */
  452. /* Copyright (c) 2004-2013 Sergey Lyubka */
  453. struct t_test_parse_port_string {
  454. const char *port_string;
  455. int valid;
  456. int ip_family;
  457. };
  458. static struct t_test_parse_port_string testdata[] =
  459. { {"0", 1, 4},
  460. {"1", 1, 4},
  461. {"1s", 1, 4},
  462. {"1r", 1, 4},
  463. {"1.2.3.4:1", 1, 4},
  464. {"1.2.3.4:1s", 1, 4},
  465. {"1.2.3.4:1r", 1, 4},
  466. #if defined(USE_IPV6)
  467. {"[::1]:123", 1, 6},
  468. {"[::]:80", 1, 6},
  469. {"[3ffe:2a00:100:7031::1]:900", 1, 6},
  470. {"+80", 1, 4 + 6},
  471. #else
  472. {"[::1]:123", 0, 0},
  473. {"[::]:80", 0, 0},
  474. {"[3ffe:2a00:100:7031::1]:900", 0, 0},
  475. {"+80", 0, 0},
  476. #endif
  477. {"99999", 0, 0},
  478. {"1k", 0, 0},
  479. {"1.2.3", 0, 0},
  480. {"1.2.3.4:", 0, 0},
  481. {"1.2.3.4:2p", 0, 0},
  482. {NULL, 0, 0} };
  483. struct socket so;
  484. struct vec vec;
  485. int ip_family;
  486. int i, ret;
  487. mark_point();
  488. for (i = 0; testdata[i].port_string != NULL; i++) {
  489. vec.ptr = testdata[i].port_string;
  490. vec.len = strlen(vec.ptr);
  491. ip_family = 123;
  492. ret = parse_port_string(&vec, &so, &ip_family);
  493. if (testdata[i].valid) {
  494. ck_assert_int_ne(ret, 0);
  495. } else {
  496. ck_assert_int_eq(ret, 0);
  497. }
  498. ck_assert_int_eq(ip_family, testdata[i].ip_family);
  499. }
  500. }
  501. END_TEST
  502. START_TEST(test_encode_decode)
  503. {
  504. char buf[128];
  505. const char *alpha = "abcdefghijklmnopqrstuvwxyz";
  506. const char *nonalpha = " !\"#$%&'()*+,-./0123456789:;<=>?@";
  507. const char *nonalpha_url_enc1 =
  508. "%20%21%22%23$%25%26%27()%2a%2b,-.%2f0123456789%3a;%3c%3d%3e%3f%40";
  509. const char *nonalpha_url_enc2 =
  510. "%20!%22%23%24%25%26'()*%2B%2C-.%2F0123456789%3A%3B%3C%3D%3E%3F%40";
  511. int ret;
  512. size_t len;
  513. #if defined(USE_WEBSOCKET) || defined(USE_LUA)
  514. const char *alpha_b64_enc = "YWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXo=";
  515. const char *nonalpha_b64_enc =
  516. "ICEiIyQlJicoKSorLC0uLzAxMjM0NTY3ODk6Ozw9Pj9A";
  517. mark_point();
  518. memset(buf, 77, sizeof(buf));
  519. base64_encode((unsigned char *)"a", 1, buf);
  520. ck_assert_str_eq(buf, "YQ==");
  521. memset(buf, 77, sizeof(buf));
  522. base64_encode((unsigned char *)"ab", 1, buf);
  523. ck_assert_str_eq(buf, "YQ==");
  524. memset(buf, 77, sizeof(buf));
  525. base64_encode((unsigned char *)"ab", 2, buf);
  526. ck_assert_str_eq(buf, "YWI=");
  527. memset(buf, 77, sizeof(buf));
  528. base64_encode((unsigned char *)alpha, 3, buf);
  529. ck_assert_str_eq(buf, "YWJj");
  530. memset(buf, 77, sizeof(buf));
  531. base64_encode((unsigned char *)alpha, 4, buf);
  532. ck_assert_str_eq(buf, "YWJjZA==");
  533. memset(buf, 77, sizeof(buf));
  534. base64_encode((unsigned char *)alpha, 5, buf);
  535. ck_assert_str_eq(buf, "YWJjZGU=");
  536. memset(buf, 77, sizeof(buf));
  537. base64_encode((unsigned char *)alpha, 6, buf);
  538. ck_assert_str_eq(buf, "YWJjZGVm");
  539. memset(buf, 77, sizeof(buf));
  540. base64_encode((unsigned char *)alpha, (int)strlen(alpha), buf);
  541. ck_assert_str_eq(buf, alpha_b64_enc);
  542. memset(buf, 77, sizeof(buf));
  543. base64_encode((unsigned char *)nonalpha, (int)strlen(nonalpha), buf);
  544. ck_assert_str_eq(buf, nonalpha_b64_enc);
  545. #endif
  546. #if defined(USE_LUA)
  547. memset(buf, 77, sizeof(buf));
  548. len = 9999;
  549. ret = base64_decode((unsigned char *)alpha_b64_enc,
  550. (int)strlen(alpha_b64_enc),
  551. buf,
  552. &len);
  553. ck_assert_int_eq(ret, -1);
  554. ck_assert_uint_eq((unsigned int)len, (unsigned int)strlen(alpha));
  555. ck_assert_str_eq(buf, alpha);
  556. memset(buf, 77, sizeof(buf));
  557. len = 9999;
  558. ret = base64_decode((unsigned char *)"AAA*AAA", 7, buf, &len);
  559. ck_assert_int_eq(ret, 3);
  560. #endif
  561. memset(buf, 77, sizeof(buf));
  562. ret = mg_url_encode(alpha, buf, sizeof(buf));
  563. ck_assert_int_eq(ret, (int)strlen(buf));
  564. ck_assert_int_eq(ret, (int)strlen(alpha));
  565. ck_assert_str_eq(buf, alpha);
  566. memset(buf, 77, sizeof(buf));
  567. ret = mg_url_encode(nonalpha, buf, sizeof(buf));
  568. ck_assert_int_eq(ret, (int)strlen(buf));
  569. ck_assert_int_eq(ret, (int)strlen(nonalpha_url_enc1));
  570. ck_assert_str_eq(buf, nonalpha_url_enc1);
  571. memset(buf, 77, sizeof(buf));
  572. ret = mg_url_decode(alpha, (int)strlen(alpha), buf, sizeof(buf), 0);
  573. ck_assert_int_eq(ret, (int)strlen(buf));
  574. ck_assert_int_eq(ret, (int)strlen(alpha));
  575. ck_assert_str_eq(buf, alpha);
  576. memset(buf, 77, sizeof(buf));
  577. ret = mg_url_decode(
  578. nonalpha_url_enc1, (int)strlen(nonalpha_url_enc1), buf, sizeof(buf), 0);
  579. ck_assert_int_eq(ret, (int)strlen(buf));
  580. ck_assert_int_eq(ret, (int)strlen(nonalpha));
  581. ck_assert_str_eq(buf, nonalpha);
  582. memset(buf, 77, sizeof(buf));
  583. ret = mg_url_decode(
  584. nonalpha_url_enc2, (int)strlen(nonalpha_url_enc2), buf, sizeof(buf), 0);
  585. ck_assert_int_eq(ret, (int)strlen(buf));
  586. ck_assert_int_eq(ret, (int)strlen(nonalpha));
  587. ck_assert_str_eq(buf, nonalpha);
  588. /* len could be unused, if base64_decode is not tested because USE_LUA is
  589. * not defined */
  590. (void)len;
  591. }
  592. END_TEST
  593. START_TEST(test_mask_data)
  594. {
  595. #if defined(USE_WEBSOCKET)
  596. char in[1024];
  597. char out[1024];
  598. int i;
  599. #endif
  600. uint32_t mask = 0x61626364;
  601. /* TODO: adapt test for big endian */
  602. ck_assert((*(unsigned char *)&mask) == 0x64u);
  603. #if defined(USE_WEBSOCKET)
  604. memset(in, 0, sizeof(in));
  605. memset(out, 99, sizeof(out));
  606. mask_data(in, sizeof(out), 0, out);
  607. ck_assert(!memcmp(out, in, sizeof(out)));
  608. for (i = 0; i < 1024; i++) {
  609. in[i] = (char)((unsigned char)i);
  610. }
  611. mask_data(in, 107, 0, out);
  612. ck_assert(!memcmp(out, in, 107));
  613. mask_data(in, 256, 0x01010101, out);
  614. for (i = 0; i < 256; i++) {
  615. ck_assert_int_eq((int)((unsigned char)out[i]),
  616. (int)(((unsigned char)in[i]) ^ (char)1u));
  617. }
  618. for (i = 256; i < (int)sizeof(out); i++) {
  619. ck_assert_int_eq((int)((unsigned char)out[i]), (int)0);
  620. }
  621. /* TODO: check this for big endian */
  622. mask_data(in, 5, 0x01020304, out);
  623. ck_assert_uint_eq((unsigned char)out[0], 0u ^ 4u);
  624. ck_assert_uint_eq((unsigned char)out[1], 1u ^ 3u);
  625. ck_assert_uint_eq((unsigned char)out[2], 2u ^ 2u);
  626. ck_assert_uint_eq((unsigned char)out[3], 3u ^ 1u);
  627. ck_assert_uint_eq((unsigned char)out[4], 4u ^ 4u);
  628. #endif
  629. }
  630. END_TEST
  631. START_TEST(test_parse_date_string)
  632. {
  633. #if !defined(NO_CACHING)
  634. time_t now = time(0);
  635. struct tm *tm = gmtime(&now);
  636. char date[64] = {0};
  637. unsigned long i;
  638. ck_assert_uint_eq((unsigned long)parse_date_string("1/Jan/1970 00:01:02"),
  639. 62ul);
  640. ck_assert_uint_eq((unsigned long)parse_date_string("1 Jan 1970 00:02:03"),
  641. 123ul);
  642. ck_assert_uint_eq((unsigned long)parse_date_string("1-Jan-1970 00:03:04"),
  643. 184ul);
  644. ck_assert_uint_eq((unsigned long)parse_date_string(
  645. "Xyz, 1 Jan 1970 00:04:05"),
  646. 245ul);
  647. gmt_time_string(date, sizeof(date), &now);
  648. ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now);
  649. sprintf(date,
  650. "%02u %s %04u %02u:%02u:%02u",
  651. (unsigned int)tm->tm_mday,
  652. month_names[tm->tm_mon],
  653. (unsigned int)(tm->tm_year + 1900),
  654. (unsigned int)tm->tm_hour,
  655. (unsigned int)tm->tm_min,
  656. (unsigned int)tm->tm_sec);
  657. ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now);
  658. gmt_time_string(date, 1, NULL);
  659. ck_assert_str_eq(date, "");
  660. gmt_time_string(date, 6, NULL);
  661. ck_assert_str_eq(date,
  662. "Thu, "); /* part of "Thu, 01 Jan 1970 00:00:00 GMT" */
  663. gmt_time_string(date, sizeof(date), NULL);
  664. ck_assert_str_eq(date, "Thu, 01 Jan 1970 00:00:00 GMT");
  665. for (i = 2ul; i < 0x8000000ul; i += i / 2) {
  666. now = (time_t)i;
  667. gmt_time_string(date, sizeof(date), &now);
  668. ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now);
  669. tm = gmtime(&now);
  670. sprintf(date,
  671. "%02u-%s-%04u %02u:%02u:%02u",
  672. (unsigned int)tm->tm_mday,
  673. month_names[tm->tm_mon],
  674. (unsigned int)(tm->tm_year + 1900),
  675. (unsigned int)tm->tm_hour,
  676. (unsigned int)tm->tm_min,
  677. (unsigned int)tm->tm_sec);
  678. ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now);
  679. }
  680. #endif
  681. }
  682. END_TEST
  683. START_TEST(test_sha1)
  684. {
  685. #ifdef SHA1_DIGEST_SIZE
  686. SHA_CTX sha_ctx;
  687. uint8_t digest[SHA1_DIGEST_SIZE] = {0};
  688. char str[48] = {0};
  689. int i;
  690. const char *test_str;
  691. ck_assert_uint_eq(sizeof(digest), 20);
  692. ck_assert_uint_gt(sizeof(str), sizeof(digest) * 2 + 1);
  693. /* empty string */
  694. SHA1_Init(&sha_ctx);
  695. SHA1_Final(digest, &sha_ctx);
  696. bin2str(str, digest, sizeof(digest));
  697. ck_assert_uint_eq(strlen(str), 40);
  698. ck_assert_str_eq(str, "da39a3ee5e6b4b0d3255bfef95601890afd80709");
  699. /* empty string */
  700. SHA1_Init(&sha_ctx);
  701. SHA1_Update(&sha_ctx, (uint8_t *)"abc", 0);
  702. SHA1_Final(digest, &sha_ctx);
  703. bin2str(str, digest, sizeof(digest));
  704. ck_assert_uint_eq(strlen(str), 40);
  705. ck_assert_str_eq(str, "da39a3ee5e6b4b0d3255bfef95601890afd80709");
  706. /* "abc" */
  707. SHA1_Init(&sha_ctx);
  708. SHA1_Update(&sha_ctx, (uint8_t *)"abc", 3);
  709. SHA1_Final(digest, &sha_ctx);
  710. bin2str(str, digest, sizeof(digest));
  711. ck_assert_uint_eq(strlen(str), 40);
  712. ck_assert_str_eq(str, "a9993e364706816aba3e25717850c26c9cd0d89d");
  713. /* "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" */
  714. test_str = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
  715. SHA1_Init(&sha_ctx);
  716. SHA1_Update(&sha_ctx, (uint8_t *)test_str, (uint32_t)strlen(test_str));
  717. SHA1_Final(digest, &sha_ctx);
  718. bin2str(str, digest, sizeof(digest));
  719. ck_assert_uint_eq(strlen(str), 40);
  720. ck_assert_str_eq(str, "84983e441c3bd26ebaae4aa1f95129e5e54670f1");
  721. /* a million "a" */
  722. SHA1_Init(&sha_ctx);
  723. for (i = 0; i < 1000000; i++) {
  724. SHA1_Update(&sha_ctx, (uint8_t *)"a", 1);
  725. }
  726. SHA1_Final(digest, &sha_ctx);
  727. bin2str(str, digest, sizeof(digest));
  728. ck_assert_uint_eq(strlen(str), 40);
  729. ck_assert_str_eq(str, "34aa973cd4c4daa4f61eeb2bdbad27316534016f");
  730. /* a million "a" in blocks of 10 */
  731. SHA1_Init(&sha_ctx);
  732. for (i = 0; i < 100000; i++) {
  733. SHA1_Update(&sha_ctx, (uint8_t *)"aaaaaaaaaa", 10);
  734. }
  735. SHA1_Final(digest, &sha_ctx);
  736. bin2str(str, digest, sizeof(digest));
  737. ck_assert_uint_eq(strlen(str), 40);
  738. ck_assert_str_eq(str, "34aa973cd4c4daa4f61eeb2bdbad27316534016f");
  739. #else
  740. /* Can not test, if SHA1 is not included */
  741. ck_assert(1);
  742. #endif
  743. }
  744. END_TEST
  745. START_TEST(test_config_options)
  746. {
  747. /* Check size of config_options vs. number of options in enum. */
  748. ck_assert_ptr_eq(NULL, config_options[NUM_OPTIONS].name);
  749. ck_assert_int_eq((int)MG_CONFIG_TYPE_UNKNOWN,
  750. config_options[NUM_OPTIONS].type);
  751. ck_assert_uint_eq(sizeof(config_options) / sizeof(config_options[0]),
  752. (size_t)(NUM_OPTIONS + 1));
  753. /* Check option enums vs. option names. */
  754. /* Check if the order in
  755. * static struct mg_option config_options[]
  756. * is the same as in the option enum
  757. * This test allows to reorder config_options and the enum,
  758. * and check if the order is still consistent. */
  759. ck_assert_str_eq("cgi_pattern", config_options[CGI_EXTENSIONS].name);
  760. ck_assert_str_eq("cgi_environment", config_options[CGI_ENVIRONMENT].name);
  761. ck_assert_str_eq("put_delete_auth_file",
  762. config_options[PUT_DELETE_PASSWORDS_FILE].name);
  763. ck_assert_str_eq("cgi_interpreter", config_options[CGI_INTERPRETER].name);
  764. ck_assert_str_eq("protect_uri", config_options[PROTECT_URI].name);
  765. ck_assert_str_eq("authentication_domain",
  766. config_options[AUTHENTICATION_DOMAIN].name);
  767. ck_assert_str_eq("enable_auth_domain_check",
  768. config_options[ENABLE_AUTH_DOMAIN_CHECK].name);
  769. ck_assert_str_eq("ssi_pattern", config_options[SSI_EXTENSIONS].name);
  770. ck_assert_str_eq("throttle", config_options[THROTTLE].name);
  771. ck_assert_str_eq("access_log_file", config_options[ACCESS_LOG_FILE].name);
  772. ck_assert_str_eq("enable_directory_listing",
  773. config_options[ENABLE_DIRECTORY_LISTING].name);
  774. ck_assert_str_eq("error_log_file", config_options[ERROR_LOG_FILE].name);
  775. ck_assert_str_eq("global_auth_file",
  776. config_options[GLOBAL_PASSWORDS_FILE].name);
  777. ck_assert_str_eq("index_files", config_options[INDEX_FILES].name);
  778. ck_assert_str_eq("enable_keep_alive",
  779. config_options[ENABLE_KEEP_ALIVE].name);
  780. ck_assert_str_eq("access_control_list",
  781. config_options[ACCESS_CONTROL_LIST].name);
  782. ck_assert_str_eq("extra_mime_types", config_options[EXTRA_MIME_TYPES].name);
  783. ck_assert_str_eq("listening_ports", config_options[LISTENING_PORTS].name);
  784. ck_assert_str_eq("document_root", config_options[DOCUMENT_ROOT].name);
  785. ck_assert_str_eq("ssl_certificate", config_options[SSL_CERTIFICATE].name);
  786. ck_assert_str_eq("ssl_certificate_chain",
  787. config_options[SSL_CERTIFICATE_CHAIN].name);
  788. ck_assert_str_eq("num_threads", config_options[NUM_THREADS].name);
  789. ck_assert_str_eq("run_as_user", config_options[RUN_AS_USER].name);
  790. ck_assert_str_eq("url_rewrite_patterns",
  791. config_options[URL_REWRITE_PATTERN].name);
  792. ck_assert_str_eq("hide_files_patterns", config_options[HIDE_FILES].name);
  793. ck_assert_str_eq("request_timeout_ms",
  794. config_options[REQUEST_TIMEOUT].name);
  795. ck_assert_str_eq("keep_alive_timeout_ms",
  796. config_options[KEEP_ALIVE_TIMEOUT].name);
  797. ck_assert_str_eq("linger_timeout_ms", config_options[LINGER_TIMEOUT].name);
  798. ck_assert_str_eq("ssl_verify_peer",
  799. config_options[SSL_DO_VERIFY_PEER].name);
  800. ck_assert_str_eq("ssl_ca_path", config_options[SSL_CA_PATH].name);
  801. ck_assert_str_eq("ssl_ca_file", config_options[SSL_CA_FILE].name);
  802. ck_assert_str_eq("ssl_verify_depth", config_options[SSL_VERIFY_DEPTH].name);
  803. ck_assert_str_eq("ssl_default_verify_paths",
  804. config_options[SSL_DEFAULT_VERIFY_PATHS].name);
  805. ck_assert_str_eq("ssl_cipher_list", config_options[SSL_CIPHER_LIST].name);
  806. ck_assert_str_eq("ssl_protocol_version",
  807. config_options[SSL_PROTOCOL_VERSION].name);
  808. ck_assert_str_eq("ssl_short_trust", config_options[SSL_SHORT_TRUST].name);
  809. #if defined(USE_WEBSOCKET)
  810. ck_assert_str_eq("websocket_timeout_ms",
  811. config_options[WEBSOCKET_TIMEOUT].name);
  812. ck_assert_str_eq("enable_websocket_ping_pong",
  813. config_options[ENABLE_WEBSOCKET_PING_PONG].name);
  814. #endif
  815. ck_assert_str_eq("decode_url", config_options[DECODE_URL].name);
  816. #if defined(USE_LUA)
  817. ck_assert_str_eq("lua_preload_file", config_options[LUA_PRELOAD_FILE].name);
  818. ck_assert_str_eq("lua_script_pattern",
  819. config_options[LUA_SCRIPT_EXTENSIONS].name);
  820. ck_assert_str_eq("lua_server_page_pattern",
  821. config_options[LUA_SERVER_PAGE_EXTENSIONS].name);
  822. #endif
  823. #if defined(USE_DUKTAPE)
  824. ck_assert_str_eq("duktape_script_pattern",
  825. config_options[DUKTAPE_SCRIPT_EXTENSIONS].name);
  826. #endif
  827. #if defined(USE_WEBSOCKET)
  828. ck_assert_str_eq("websocket_root", config_options[WEBSOCKET_ROOT].name);
  829. #endif
  830. #if defined(USE_LUA) && defined(USE_WEBSOCKET)
  831. ck_assert_str_eq("lua_websocket_pattern",
  832. config_options[LUA_WEBSOCKET_EXTENSIONS].name);
  833. #endif
  834. ck_assert_str_eq("access_control_allow_origin",
  835. config_options[ACCESS_CONTROL_ALLOW_ORIGIN].name);
  836. ck_assert_str_eq("access_control_allow_methods",
  837. config_options[ACCESS_CONTROL_ALLOW_METHODS].name);
  838. ck_assert_str_eq("access_control_allow_headers",
  839. config_options[ACCESS_CONTROL_ALLOW_HEADERS].name);
  840. ck_assert_str_eq("error_pages", config_options[ERROR_PAGES].name);
  841. ck_assert_str_eq("tcp_nodelay", config_options[CONFIG_TCP_NODELAY].name);
  842. #if !defined(NO_CACHING)
  843. ck_assert_str_eq("static_file_max_age",
  844. config_options[STATIC_FILE_MAX_AGE].name);
  845. #endif
  846. #if !defined(NO_SSL)
  847. ck_assert_str_eq("strict_transport_security_max_age",
  848. config_options[STRICT_HTTPS_MAX_AGE].name);
  849. #endif
  850. #if defined(__linux__)
  851. ck_assert_str_eq("allow_sendfile_call",
  852. config_options[ALLOW_SENDFILE_CALL].name);
  853. #endif
  854. #if defined(_WIN32)
  855. ck_assert_str_eq("case_sensitive",
  856. config_options[CASE_SENSITIVE_FILES].name);
  857. #endif
  858. #if defined(USE_LUA)
  859. ck_assert_str_eq("lua_background_script",
  860. config_options[LUA_BACKGROUND_SCRIPT].name);
  861. ck_assert_str_eq("lua_background_script_params",
  862. config_options[LUA_BACKGROUND_SCRIPT_PARAMS].name);
  863. #endif
  864. ck_assert_str_eq("additional_header",
  865. config_options[ADDITIONAL_HEADER].name);
  866. ck_assert_str_eq("max_request_size", config_options[MAX_REQUEST_SIZE].name);
  867. ck_assert_str_eq("allow_index_script_resource",
  868. config_options[ALLOW_INDEX_SCRIPT_SUB_RES].name);
  869. }
  870. END_TEST
  871. #if !defined(REPLACE_CHECK_FOR_LOCAL_DEBUGGING)
  872. Suite *
  873. make_private_suite(void)
  874. {
  875. Suite *const suite = suite_create("Private");
  876. TCase *const tcase_http_message = tcase_create("HTTP Message");
  877. TCase *const tcase_http_keep_alive = tcase_create("HTTP Keep Alive");
  878. TCase *const tcase_url_parsing_1 = tcase_create("URL Parsing 1");
  879. TCase *const tcase_url_parsing_2 = tcase_create("URL Parsing 2");
  880. TCase *const tcase_url_parsing_3 = tcase_create("URL Parsing 3");
  881. TCase *const tcase_internal_parse_1 = tcase_create("Internal Parsing 1");
  882. TCase *const tcase_internal_parse_2 = tcase_create("Internal Parsing 2");
  883. TCase *const tcase_internal_parse_3 = tcase_create("Internal Parsing 3");
  884. TCase *const tcase_internal_parse_4 = tcase_create("Internal Parsing 4");
  885. TCase *const tcase_internal_parse_5 = tcase_create("Internal Parsing 5");
  886. TCase *const tcase_internal_parse_6 = tcase_create("Internal Parsing 6");
  887. TCase *const tcase_encode_decode = tcase_create("Encode Decode");
  888. TCase *const tcase_mask_data = tcase_create("Mask Data");
  889. TCase *const tcase_parse_date_string = tcase_create("Date Parsing");
  890. TCase *const tcase_sha1 = tcase_create("SHA1");
  891. TCase *const tcase_config_options = tcase_create("Config Options");
  892. tcase_add_test(tcase_http_message, test_parse_http_message);
  893. tcase_set_timeout(tcase_http_message, civetweb_min_test_timeout);
  894. suite_add_tcase(suite, tcase_http_message);
  895. tcase_add_test(tcase_http_keep_alive, test_should_keep_alive);
  896. tcase_set_timeout(tcase_http_keep_alive, civetweb_min_test_timeout);
  897. suite_add_tcase(suite, tcase_http_keep_alive);
  898. tcase_add_test(tcase_url_parsing_1, test_match_prefix);
  899. tcase_set_timeout(tcase_url_parsing_1, civetweb_min_test_timeout);
  900. suite_add_tcase(suite, tcase_url_parsing_1);
  901. tcase_add_test(tcase_url_parsing_2,
  902. test_remove_double_dots_and_double_slashes);
  903. tcase_set_timeout(tcase_url_parsing_2, civetweb_min_test_timeout);
  904. suite_add_tcase(suite, tcase_url_parsing_2);
  905. tcase_add_test(tcase_url_parsing_3, test_is_valid_uri);
  906. tcase_set_timeout(tcase_url_parsing_3, civetweb_min_test_timeout);
  907. suite_add_tcase(suite, tcase_url_parsing_3);
  908. tcase_add_test(tcase_internal_parse_1, test_next_option);
  909. tcase_set_timeout(tcase_internal_parse_1, civetweb_min_test_timeout);
  910. suite_add_tcase(suite, tcase_internal_parse_1);
  911. tcase_add_test(tcase_internal_parse_2, test_skip_quoted);
  912. tcase_set_timeout(tcase_internal_parse_2, civetweb_min_test_timeout);
  913. suite_add_tcase(suite, tcase_internal_parse_2);
  914. tcase_add_test(tcase_internal_parse_3, test_mg_strcasestr);
  915. tcase_set_timeout(tcase_internal_parse_3, civetweb_min_test_timeout);
  916. suite_add_tcase(suite, tcase_internal_parse_3);
  917. tcase_add_test(tcase_internal_parse_4, test_alloc_vprintf);
  918. tcase_set_timeout(tcase_internal_parse_4, civetweb_min_test_timeout);
  919. suite_add_tcase(suite, tcase_internal_parse_4);
  920. tcase_add_test(tcase_internal_parse_5, test_mg_vsnprintf);
  921. tcase_set_timeout(tcase_internal_parse_5, civetweb_min_test_timeout);
  922. suite_add_tcase(suite, tcase_internal_parse_5);
  923. tcase_add_test(tcase_internal_parse_6, test_parse_port_string);
  924. tcase_set_timeout(tcase_internal_parse_6, civetweb_min_test_timeout);
  925. suite_add_tcase(suite, tcase_internal_parse_6);
  926. tcase_add_test(tcase_encode_decode, test_encode_decode);
  927. tcase_set_timeout(tcase_encode_decode, civetweb_min_test_timeout);
  928. suite_add_tcase(suite, tcase_encode_decode);
  929. tcase_add_test(tcase_mask_data, test_mask_data);
  930. tcase_set_timeout(tcase_mask_data, civetweb_min_test_timeout);
  931. suite_add_tcase(suite, tcase_mask_data);
  932. tcase_add_test(tcase_parse_date_string, test_parse_date_string);
  933. tcase_set_timeout(tcase_parse_date_string, civetweb_min_test_timeout);
  934. suite_add_tcase(suite, tcase_parse_date_string);
  935. tcase_add_test(tcase_sha1, test_sha1);
  936. tcase_set_timeout(tcase_sha1, civetweb_min_test_timeout);
  937. suite_add_tcase(suite, tcase_sha1);
  938. tcase_add_test(tcase_config_options, test_config_options);
  939. tcase_set_timeout(tcase_config_options, civetweb_min_test_timeout);
  940. suite_add_tcase(suite, tcase_config_options);
  941. return suite;
  942. }
  943. #endif
  944. #ifdef REPLACE_CHECK_FOR_LOCAL_DEBUGGING
  945. /* Used to debug test cases without using the check framework */
  946. void
  947. MAIN_PRIVATE(void)
  948. {
  949. #if defined(_WIN32)
  950. /* test_parse_port_string requires WSAStartup for IPv6 */
  951. WSADATA data;
  952. WSAStartup(MAKEWORD(2, 2), &data);
  953. #endif
  954. test_alloc_vprintf(0);
  955. test_mg_vsnprintf(0);
  956. test_remove_double_dots_and_double_slashes(0);
  957. test_parse_date_string(0);
  958. test_parse_port_string(0);
  959. test_parse_http_message(0);
  960. test_sha1(0);
  961. #if defined(_WIN32)
  962. WSACleanup();
  963. #endif
  964. }
  965. #endif