123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191 |
- /* Copyright (c) 2015-2018 the Civetweb developers
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in
- * all copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
- * THE SOFTWARE.
- */
- /**
- * We include the source file so that we have access to the internal private
- * static functions
- */
- #ifdef _MSC_VER
- #ifndef _CRT_SECURE_NO_WARNINGS
- #define _CRT_SECURE_NO_WARNINGS
- #endif
- #define CIVETWEB_API static
- #endif
- #ifdef REPLACE_CHECK_FOR_LOCAL_DEBUGGING
- #undef MEMORY_DEBUGGING
- #endif
- #include "../src/civetweb.c"
- #include <stdlib.h>
- #include <time.h>
- #include "private.h"
- /* This unit test file uses the excellent Check unit testing library.
- * The API documentation is available here:
- * http://check.sourceforge.net/doc/check_html/index.html
- */
- static char tmp_parse_buffer[1024];
- static int
- test_parse_http_response(char *buf, int len, struct mg_response_info *ri)
- {
- ck_assert_int_lt(len, (int)sizeof(tmp_parse_buffer));
- memcpy(tmp_parse_buffer, buf, (size_t)len);
- return parse_http_response(tmp_parse_buffer, len, ri);
- }
- static int
- test_parse_http_request(char *buf, int len, struct mg_request_info *ri)
- {
- ck_assert_int_lt(len, (int)sizeof(tmp_parse_buffer));
- memcpy(tmp_parse_buffer, buf, (size_t)len);
- return parse_http_request(tmp_parse_buffer, len, ri);
- }
- START_TEST(test_parse_http_message)
- {
- /* Adapted from unit_test.c */
- /* Copyright (c) 2013-2015 the Civetweb developers */
- /* Copyright (c) 2004-2013 Sergey Lyubka */
- struct mg_request_info ri;
- struct mg_response_info respi;
- char empty[] = "";
- char space[] = " \x00";
- char req1[] = "GET / HTTP/1.1\r\n\r\n";
- char req2[] = "BLAH / HTTP/1.1\r\n\r\n";
- char req3[] = "GET / HTTP/1.1\nKey: Val\n\n";
- char req4[] =
- "GET / HTTP/1.1\r\nA: foo bar\r\nB: bar\r\nskip\r\nbaz:\r\n\r\n";
- char req5[] = "GET / HTTP/1.0\n\n";
- char req6[] = "G";
- char req7[] = " blah ";
- char req8[] = "HTTP/1.0 404 Not Found\n\n";
- char req9[] = "HTTP/1.1 200 OK\r\nConnection: close\r\n\r\n";
- char req10[] = "GET / HTTP/1.1\r\nA: foo bar\r\nB: bar\r\n\r\n";
- char req11[] = "GET /\r\nError: X\r\n\r\n";
- char req12[] =
- "POST /a/b/c.d?e=f&g HTTP/1.1\r\nKey1: val1\r\nKey2: val2\r\n\r\nBODY";
- int lenreq1 = (int)strlen(req1);
- int lenreq2 = (int)strlen(req2);
- int lenreq3 = (int)strlen(req3);
- int lenreq4 = (int)strlen(req4);
- int lenreq5 = (int)strlen(req5);
- int lenreq6 = (int)strlen(req6);
- int lenreq7 = (int)strlen(req7);
- int lenreq8 = (int)strlen(req8);
- int lenreq9 = (int)strlen(req9);
- int lenreq10 = (int)strlen(req10);
- int lenreq11 = (int)strlen(req11);
- int lenreq12 = (int)strlen(req12);
- int lenhdr12 = lenreq12 - 4; /* length without body */
- mark_point();
- /* An empty string is neither a complete request nor a complete
- * response, so it must return 0 */
- ck_assert_int_eq(0, get_http_header_len(empty, 0));
- ck_assert_int_eq(0, test_parse_http_request(empty, 0, &ri));
- ck_assert_int_eq(0, test_parse_http_response(empty, 0, &respi));
- /* Same is true for a leading space */
- ck_assert_int_eq(0, get_http_header_len(space, 1));
- ck_assert_int_eq(0, test_parse_http_request(space, 1, &ri));
- ck_assert_int_eq(0, test_parse_http_response(space, 1, &respi));
- /* But a control character (like 0) makes it invalid */
- ck_assert_int_eq(-1, get_http_header_len(space, 2));
- ck_assert_int_eq(-1, test_parse_http_request(space, 2, &ri));
- ck_assert_int_eq(-1, test_parse_http_response(space, 2, &respi));
- /* req1 minus 1 byte at the end is incomplete */
- ck_assert_int_eq(0, get_http_header_len(req1, lenreq1 - 1));
- /* req1 minus 1 byte at the start is complete but invalid */
- ck_assert_int_eq(lenreq1 - 1, get_http_header_len(req1 + 1, lenreq1 - 1));
- ck_assert_int_eq(-1, test_parse_http_request(req1 + 1, lenreq1 - 1, &ri));
- /* req1 is a valid request */
- ck_assert_int_eq(lenreq1, get_http_header_len(req1, lenreq1));
- ck_assert_int_eq(-1, test_parse_http_response(req1, lenreq1, &respi));
- ck_assert_int_eq(lenreq1, test_parse_http_request(req1, lenreq1, &ri));
- ck_assert_str_eq("1.1", ri.http_version);
- ck_assert_int_eq(0, ri.num_headers);
- /* req2 is a complete, but invalid request */
- ck_assert_int_eq(lenreq2, get_http_header_len(req2, lenreq2));
- ck_assert_int_eq(-1, test_parse_http_request(req2, lenreq2, &ri));
- /* req3 is a complete and valid request */
- ck_assert_int_eq(lenreq3, get_http_header_len(req3, lenreq3));
- ck_assert_int_eq(lenreq3, test_parse_http_request(req3, lenreq3, &ri));
- ck_assert_int_eq(-1, test_parse_http_response(req3, lenreq3, &respi));
- /* Multiline header are obsolete, so return an error
- * (https://tools.ietf.org/html/rfc7230#section-3.2.4). */
- ck_assert_int_eq(-1, test_parse_http_request(req4, lenreq4, &ri));
- /* req5 is a complete and valid request (also somewhat malformed,
- * since it uses \n\n instead of \r\n\r\n) */
- ck_assert_int_eq(lenreq5, get_http_header_len(req5, lenreq5));
- ck_assert_int_eq(-1, test_parse_http_response(req5, lenreq5, &respi));
- ck_assert_int_eq(lenreq5, test_parse_http_request(req5, lenreq5, &ri));
- ck_assert_str_eq("GET", ri.request_method);
- ck_assert_str_eq("1.0", ri.http_version);
- /* req6 is incomplete */
- ck_assert_int_eq(0, get_http_header_len(req6, lenreq6));
- ck_assert_int_eq(0, test_parse_http_request(req6, lenreq6, &ri));
- /* req7 is invalid, but not yet complete */
- ck_assert_int_eq(0, get_http_header_len(req7, lenreq7));
- ck_assert_int_eq(0, test_parse_http_request(req7, lenreq7, &ri));
- /* req8 is a valid response */
- ck_assert_int_eq(lenreq8, get_http_header_len(req8, lenreq8));
- ck_assert_int_eq(-1, test_parse_http_request(req8, lenreq8, &ri));
- ck_assert_int_eq(lenreq8, test_parse_http_response(req8, lenreq8, &respi));
- /* req9 is a valid response */
- ck_assert_int_eq(lenreq9, get_http_header_len(req9, lenreq9));
- ck_assert_int_eq(-1, test_parse_http_request(req9, lenreq9, &ri));
- ck_assert_int_eq(lenreq9, test_parse_http_response(req9, lenreq9, &respi));
- ck_assert_int_eq(1, respi.num_headers);
- /* req10 is a valid request */
- ck_assert_int_eq(lenreq10, get_http_header_len(req10, lenreq10));
- ck_assert_int_eq(lenreq10, test_parse_http_request(req10, lenreq10, &ri));
- ck_assert_str_eq("1.1", ri.http_version);
- ck_assert_int_eq(2, ri.num_headers);
- ck_assert_str_eq("A", ri.http_headers[0].name);
- ck_assert_str_eq("foo bar", ri.http_headers[0].value);
- ck_assert_str_eq("B", ri.http_headers[1].name);
- ck_assert_str_eq("bar", ri.http_headers[1].value);
- /* req11 is a complete but valid request */
- ck_assert_int_eq(-1, test_parse_http_request(req11, lenreq11, &ri));
- /* req12 is a valid request with body data */
- ck_assert_int_gt(lenreq12, lenhdr12);
- ck_assert_int_eq(lenhdr12, get_http_header_len(req12, lenreq12));
- ck_assert_int_eq(lenhdr12, test_parse_http_request(req12, lenreq12, &ri));
- }
- END_TEST
- START_TEST(test_should_keep_alive)
- {
- /* Adapted from unit_test.c */
- /* Copyright (c) 2013-2015 the Civetweb developers */
- /* Copyright (c) 2004-2013 Sergey Lyubka */
- struct mg_connection conn;
- struct mg_context ctx;
- char req1[] = "GET / HTTP/1.1\r\n\r\n";
- char req2[] = "GET / HTTP/1.0\r\n\r\n";
- char req3[] = "GET / HTTP/1.1\r\nConnection: close\r\n\r\n";
- char req4[] = "GET / HTTP/1.1\r\nConnection: keep-alive\r\n\r\n";
- char yes[] = "yes";
- char no[] = "no";
- int lenreq1 = (int)strlen(req1);
- int lenreq2 = (int)strlen(req2);
- int lenreq3 = (int)strlen(req3);
- int lenreq4 = (int)strlen(req4);
- mark_point();
- memset(&ctx, 0, sizeof(ctx));
- memset(&conn, 0, sizeof(conn));
- conn.phys_ctx = &ctx;
- conn.dom_ctx = &(ctx.dd);
- ck_assert_int_eq(test_parse_http_request(req1, lenreq1, &conn.request_info),
- lenreq1);
- conn.connection_type = 1; /* Valid request */
- ck_assert_int_eq(conn.request_info.num_headers, 0);
- ctx.dd.config[ENABLE_KEEP_ALIVE] = no;
- ck_assert_int_eq(should_keep_alive(&conn), 0);
- ctx.dd.config[ENABLE_KEEP_ALIVE] = yes;
- ck_assert_int_eq(should_keep_alive(&conn), 1);
- conn.must_close = 1;
- ck_assert_int_eq(should_keep_alive(&conn), 0);
- conn.must_close = 0;
- test_parse_http_request(req2, lenreq2, &conn.request_info);
- conn.connection_type = 1; /* Valid request */
- ck_assert_int_eq(conn.request_info.num_headers, 0);
- ck_assert_int_eq(should_keep_alive(&conn), 0);
- test_parse_http_request(req3, lenreq3, &conn.request_info);
- conn.connection_type = 1; /* Valid request */
- ck_assert_int_eq(conn.request_info.num_headers, 1);
- ck_assert_int_eq(should_keep_alive(&conn), 0);
- test_parse_http_request(req4, lenreq4, &conn.request_info);
- conn.connection_type = 1; /* Valid request */
- ck_assert_int_eq(conn.request_info.num_headers, 1);
- ck_assert_int_eq(should_keep_alive(&conn), 1);
- conn.status_code = 200;
- conn.must_close = 1;
- ck_assert_int_eq(should_keep_alive(&conn), 0);
- conn.status_code = 200;
- conn.must_close = 0;
- ck_assert_int_eq(should_keep_alive(&conn), 1);
- conn.status_code = 200;
- conn.must_close = 0;
- conn.connection_type = 0; /* invalid */
- ck_assert_int_eq(should_keep_alive(&conn), 0);
- }
- END_TEST
- START_TEST(test_match_prefix)
- {
- /* Adapted from unit_test.c */
- /* Copyright (c) 2013-2015 the Civetweb developers */
- /* Copyright (c) 2004-2013 Sergey Lyubka */
- ck_assert_int_eq(4, match_prefix("/api", 4, "/api"));
- ck_assert_int_eq(3, match_prefix("/a/", 3, "/a/b/c"));
- ck_assert_int_eq(-1, match_prefix("/a/", 3, "/ab/c"));
- ck_assert_int_eq(4, match_prefix("/*/", 3, "/ab/c"));
- ck_assert_int_eq(6, match_prefix("**", 2, "/a/b/c"));
- ck_assert_int_eq(2, match_prefix("/*", 2, "/a/b/c"));
- ck_assert_int_eq(2, match_prefix("*/*", 3, "/a/b/c"));
- ck_assert_int_eq(5, match_prefix("**/", 3, "/a/b/c"));
- ck_assert_int_eq(5, match_prefix("**.foo|**.bar", 13, "a.bar"));
- ck_assert_int_eq(2, match_prefix("a|b|cd", 6, "cdef"));
- ck_assert_int_eq(2, match_prefix("a|b|c?", 6, "cdef"));
- ck_assert_int_eq(1, match_prefix("a|?|cd", 6, "cdef"));
- ck_assert_int_eq(-1, match_prefix("/a/**.cgi", 9, "/foo/bar/x.cgi"));
- ck_assert_int_eq(12, match_prefix("/a/**.cgi", 9, "/a/bar/x.cgi"));
- ck_assert_int_eq(5, match_prefix("**/", 3, "/a/b/c"));
- ck_assert_int_eq(-1, match_prefix("**/$", 4, "/a/b/c"));
- ck_assert_int_eq(5, match_prefix("**/$", 4, "/a/b/"));
- ck_assert_int_eq(0, match_prefix("$", 1, ""));
- ck_assert_int_eq(-1, match_prefix("$", 1, "x"));
- ck_assert_int_eq(1, match_prefix("*$", 2, "x"));
- ck_assert_int_eq(1, match_prefix("/$", 2, "/"));
- ck_assert_int_eq(-1, match_prefix("**/$", 4, "/a/b/c"));
- ck_assert_int_eq(5, match_prefix("**/$", 4, "/a/b/"));
- ck_assert_int_eq(0, match_prefix("*", 1, "/hello/"));
- ck_assert_int_eq(-1, match_prefix("**.a$|**.b$", 11, "/a/b.b/"));
- ck_assert_int_eq(6, match_prefix("**.a$|**.b$", 11, "/a/b.b"));
- ck_assert_int_eq(6, match_prefix("**.a$|**.b$", 11, "/a/B.A"));
- ck_assert_int_eq(5, match_prefix("**o$", 4, "HELLO"));
- }
- END_TEST
- START_TEST(test_remove_double_dots_and_double_slashes)
- {
- /* Adapted from unit_test.c */
- /* Copyright (c) 2013-2015 the Civetweb developers */
- /* Copyright (c) 2004-2013 Sergey Lyubka */
- struct {
- char before[20], after[20];
- } data[] = {
- {"////a", "/a"},
- {"/.....", "/."},
- {"/......", "/"},
- {"..", "."},
- {"...", "."},
- {"/...///", "/./"},
- {"/a...///", "/a.../"},
- {"/.x", "/.x"},
- {"/\\", "/"},
- {"/a\\", "/a\\"},
- {"/a\\\\...", "/a\\."},
- };
- size_t i;
- mark_point();
- for (i = 0; i < ARRAY_SIZE(data); i++) {
- remove_double_dots_and_double_slashes(data[i].before);
- ck_assert_str_eq(data[i].before, data[i].after);
- }
- }
- END_TEST
- START_TEST(test_is_valid_uri)
- {
- /* is_valid_uri is superseeded by get_uri_type */
- ck_assert_int_eq(2, get_uri_type("/api"));
- ck_assert_int_eq(2, get_uri_type("/api/"));
- ck_assert_int_eq(2,
- get_uri_type("/some/long/path%20with%20space/file.xyz"));
- ck_assert_int_eq(0, get_uri_type("api"));
- ck_assert_int_eq(1, get_uri_type("*"));
- ck_assert_int_eq(0, get_uri_type("*xy"));
- ck_assert_int_eq(3, get_uri_type("http://somewhere/"));
- ck_assert_int_eq(3, get_uri_type("https://somewhere/some/file.html"));
- ck_assert_int_eq(4, get_uri_type("http://somewhere:8080/"));
- ck_assert_int_eq(4, get_uri_type("https://somewhere:8080/some/file.html"));
- }
- END_TEST
- START_TEST(test_next_option)
- {
- /* Adapted from unit_test.c */
- /* Copyright (c) 2013-2015 the Civetweb developers */
- /* Copyright (c) 2004-2013 Sergey Lyubka */
- const char *p, *list = "x/8,/y**=1;2k,z";
- struct vec a, b;
- int i;
- mark_point();
- ck_assert(next_option(NULL, &a, &b) == NULL);
- for (i = 0, p = list; (p = next_option(p, &a, &b)) != NULL; i++) {
- ck_assert(i != 0 || (a.ptr == list && a.len == 3 && b.len == 0));
- ck_assert(i != 1
- || (a.ptr == list + 4 && a.len == 4 && b.ptr == list + 9
- && b.len == 4));
- ck_assert(i != 2 || (a.ptr == list + 14 && a.len == 1 && b.len == 0));
- }
- }
- END_TEST
- START_TEST(test_skip_quoted)
- {
- /* Adapted from unit_test.c */
- /* Copyright (c) 2013-2015 the Civetweb developers */
- /* Copyright (c) 2004-2013 Sergey Lyubka */
- char x[] = "a=1, b=2, c='hi \' there', d='here\\, there'", *s = x, *p;
- mark_point();
- p = skip_quoted(&s, ", ", ", ", 0);
- ck_assert(p != NULL && !strcmp(p, "a=1"));
- p = skip_quoted(&s, ", ", ", ", 0);
- ck_assert(p != NULL && !strcmp(p, "b=2"));
- p = skip_quoted(&s, ",", " ", 0);
- ck_assert(p != NULL && !strcmp(p, "c='hi \' there'"));
- p = skip_quoted(&s, ",", " ", '\\');
- ck_assert(p != NULL && !strcmp(p, "d='here, there'"));
- ck_assert(*s == 0);
- }
- END_TEST
- static int
- alloc_printf(char **buf, size_t size, const char *fmt, ...)
- {
- /* Test helper function - adapted from unit_test.c */
- /* Copyright (c) 2013-2015 the Civetweb developers */
- /* Copyright (c) 2004-2013 Sergey Lyubka */
- va_list ap;
- int ret = 0;
- mark_point();
- va_start(ap, fmt);
- ret = alloc_vprintf(buf, *buf, size, fmt, ap);
- va_end(ap);
- return ret;
- }
- static int
- alloc_printf2(char **buf, const char *fmt, ...)
- {
- /* Test alternative implementation */
- va_list ap;
- int ret = 0;
- mark_point();
- va_start(ap, fmt);
- ret = alloc_vprintf2(buf, fmt, ap);
- va_end(ap);
- return ret;
- }
- START_TEST(test_alloc_vprintf)
- {
- /* Adapted from unit_test.c */
- /* Copyright (c) 2013-2015 the Civetweb developers */
- /* Copyright (c) 2004-2013 Sergey Lyubka */
- char buf[MG_BUF_LEN], *p = buf;
- mark_point();
- ck_assert(alloc_printf(&p, sizeof(buf), "%s", "hi") == 2);
- ck_assert(p == buf);
- ck_assert(alloc_printf(&p, sizeof(buf), "%s", "") == 0);
- ck_assert(p == buf);
- ck_assert(alloc_printf(&p, sizeof(buf), "") == 0);
- ck_assert(p == buf);
- /* Pass small buffer, make sure alloc_printf allocates */
- ck_assert(alloc_printf(&p, 1, "%s", "hello") == 5);
- ck_assert(p != buf);
- mg_free(p);
- p = buf;
- /* Test alternative implementation */
- ck_assert(alloc_printf2(&p, "%s", "hello") == 5);
- ck_assert(p != buf);
- mg_free(p);
- p = buf;
- }
- END_TEST
- START_TEST(test_mg_vsnprintf)
- {
- char buf[16];
- int is_trunc;
- #if defined(_WIN32)
- /* If the string is truncated, mg_snprintf calls mg_cry.
- * If DEBUG is defined, mg_cry calls DEBUG_TRACE.
- * In DEBUG_TRACE_FUNC, flockfile(stdout) is called.
- * For Windows, flockfile/funlockfile calls Enter-/
- * LeaveCriticalSection(&global_log_file_lock).
- * So, we need to initialize global_log_file_lock:
- */
- InitializeCriticalSection(&global_log_file_lock);
- #endif
- memset(buf, 0, sizeof(buf));
- mark_point();
- is_trunc = 777;
- mg_snprintf(NULL, &is_trunc, buf, 10, "%8i", 123);
- ck_assert_str_eq(buf, " 123");
- ck_assert_int_eq(is_trunc, 0);
- is_trunc = 777;
- mg_snprintf(NULL, &is_trunc, buf, 10, "%9i", 123);
- ck_assert_str_eq(buf, " 123");
- ck_assert_int_eq(is_trunc, 0);
- is_trunc = 777;
- mg_snprintf(NULL, &is_trunc, buf, 9, "%9i", 123);
- ck_assert_str_eq(buf, " 12");
- ck_assert_int_eq(is_trunc, 1);
- is_trunc = 777;
- mg_snprintf(NULL, &is_trunc, buf, 8, "%9i", 123);
- ck_assert_str_eq(buf, " 1");
- ck_assert_int_eq(is_trunc, 1);
- is_trunc = 777;
- mg_snprintf(NULL, &is_trunc, buf, 7, "%9i", 123);
- ck_assert_str_eq(buf, " ");
- ck_assert_int_eq(is_trunc, 1);
- is_trunc = 777;
- strcpy(buf, "1234567890");
- mg_snprintf(NULL, &is_trunc, buf, 0, "%i", 543);
- ck_assert_str_eq(buf, "1234567890");
- ck_assert_int_eq(is_trunc, 1);
- }
- END_TEST
- START_TEST(test_mg_strcasestr)
- {
- /* Adapted from unit_test.c */
- /* Copyright (c) 2013-2015 the Civetweb developers */
- /* Copyright (c) 2004-2013 Sergey Lyubka */
- static const char *big1 = "abcdef";
- mark_point();
- ck_assert(mg_strcasestr("Y", "X") == NULL);
- ck_assert(mg_strcasestr("Y", "y") != NULL);
- ck_assert(mg_strcasestr(big1, "X") == NULL);
- ck_assert(mg_strcasestr(big1, "CD") == big1 + 2);
- ck_assert(mg_strcasestr("aa", "AAB") == NULL);
- }
- END_TEST
- START_TEST(test_parse_port_string)
- {
- /* Adapted from unit_test.c */
- /* Copyright (c) 2013-2018 the Civetweb developers */
- /* Copyright (c) 2004-2013 Sergey Lyubka */
- struct t_test_parse_port_string {
- const char *port_string;
- int valid;
- int ip_family;
- };
- static struct t_test_parse_port_string testdata[] =
- { {"0", 1, 4},
- {"1", 1, 4},
- {"65535", 1, 4},
- {"65536", 0, 0},
- {"1s", 1, 4},
- {"1r", 1, 4},
- {"1k", 0, 0},
- {"1.2.3", 0, 0},
- {"1.2.3.", 0, 0},
- {"1.2.3.4", 0, 0},
- {"1.2.3.4:", 0, 0},
- {"1.2.3.4:0", 1, 4},
- {"1.2.3.4:1", 1, 4},
- {"1.2.3.4:65535", 1, 4},
- {"1.2.3.4:65536", 0, 0},
- {"1.2.3.4:1s", 1, 4},
- {"1.2.3.4:1r", 1, 4},
- {"1.2.3.4:1k", 0, 0},
- #if defined(USE_IPV6)
- /* IPv6 config */
- {"[::1]:123", 1, 6},
- {"[::]:80", 1, 6},
- {"[3ffe:2a00:100:7031::1]:900", 1, 6},
- /* IPv4 + IPv6 config */
- {"+80", 1, 4 + 6},
- #else
- /* IPv6 config: invalid if IPv6 is not activated */
- {"[::1]:123", 0, 0},
- {"[::]:80", 0, 0},
- {"[3ffe:2a00:100:7031::1]:900", 0, 0},
- /* IPv4 + IPv6 config: only IPv4 if IPv6 is not activated */
- {"+80", 1, 4},
- #endif
- {NULL, 0, 0} };
- struct socket so;
- struct vec vec;
- int ip_family;
- int i, ret;
- mark_point();
- for (i = 0; testdata[i].port_string != NULL; i++) {
- vec.ptr = testdata[i].port_string;
- vec.len = strlen(vec.ptr);
- ip_family = 123;
- ret = parse_port_string(&vec, &so, &ip_family);
- if ((ret != testdata[i].valid)
- || (ip_family != testdata[i].ip_family)) {
- ck_abort_msg("Port string [%s]: "
- "expected valid=%i, family=%i; "
- "got valid=%i, family=%i",
- testdata[i].port_string,
- testdata[i].valid,
- testdata[i].ip_family,
- ret,
- ip_family);
- }
- }
- }
- END_TEST
- START_TEST(test_encode_decode)
- {
- char buf[128];
- const char *alpha = "abcdefghijklmnopqrstuvwxyz";
- const char *nonalpha = " !\"#$%&'()*+,-./0123456789:;<=>?@";
- const char *nonalpha_url_enc1 =
- "%20%21%22%23$%25%26%27()%2a%2b,-.%2f0123456789%3a;%3c%3d%3e%3f%40";
- const char *nonalpha_url_enc2 =
- "%20!%22%23%24%25%26'()*%2B%2C-.%2F0123456789%3A%3B%3C%3D%3E%3F%40";
- int ret;
- size_t len;
- #if defined(USE_WEBSOCKET) || defined(USE_LUA)
- const char *alpha_b64_enc = "YWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXo=";
- const char *nonalpha_b64_enc =
- "ICEiIyQlJicoKSorLC0uLzAxMjM0NTY3ODk6Ozw9Pj9A";
- mark_point();
- memset(buf, 77, sizeof(buf));
- base64_encode((unsigned char *)"a", 1, buf);
- ck_assert_str_eq(buf, "YQ==");
- memset(buf, 77, sizeof(buf));
- base64_encode((unsigned char *)"ab", 1, buf);
- ck_assert_str_eq(buf, "YQ==");
- memset(buf, 77, sizeof(buf));
- base64_encode((unsigned char *)"ab", 2, buf);
- ck_assert_str_eq(buf, "YWI=");
- memset(buf, 77, sizeof(buf));
- base64_encode((unsigned char *)alpha, 3, buf);
- ck_assert_str_eq(buf, "YWJj");
- memset(buf, 77, sizeof(buf));
- base64_encode((unsigned char *)alpha, 4, buf);
- ck_assert_str_eq(buf, "YWJjZA==");
- memset(buf, 77, sizeof(buf));
- base64_encode((unsigned char *)alpha, 5, buf);
- ck_assert_str_eq(buf, "YWJjZGU=");
- memset(buf, 77, sizeof(buf));
- base64_encode((unsigned char *)alpha, 6, buf);
- ck_assert_str_eq(buf, "YWJjZGVm");
- memset(buf, 77, sizeof(buf));
- base64_encode((unsigned char *)alpha, (int)strlen(alpha), buf);
- ck_assert_str_eq(buf, alpha_b64_enc);
- memset(buf, 77, sizeof(buf));
- base64_encode((unsigned char *)nonalpha, (int)strlen(nonalpha), buf);
- ck_assert_str_eq(buf, nonalpha_b64_enc);
- #endif
- #if defined(USE_LUA)
- memset(buf, 77, sizeof(buf));
- len = 9999;
- ret = base64_decode((unsigned char *)alpha_b64_enc,
- (int)strlen(alpha_b64_enc),
- buf,
- &len);
- ck_assert_int_eq(ret, -1);
- ck_assert_uint_eq((unsigned int)len, (unsigned int)strlen(alpha));
- ck_assert_str_eq(buf, alpha);
- memset(buf, 77, sizeof(buf));
- len = 9999;
- ret = base64_decode((unsigned char *)"AAA*AAA", 7, buf, &len);
- ck_assert_int_eq(ret, 3);
- #endif
- memset(buf, 77, sizeof(buf));
- ret = mg_url_encode(alpha, buf, sizeof(buf));
- ck_assert_int_eq(ret, (int)strlen(buf));
- ck_assert_int_eq(ret, (int)strlen(alpha));
- ck_assert_str_eq(buf, alpha);
- memset(buf, 77, sizeof(buf));
- ret = mg_url_encode(nonalpha, buf, sizeof(buf));
- ck_assert_int_eq(ret, (int)strlen(buf));
- ck_assert_int_eq(ret, (int)strlen(nonalpha_url_enc1));
- ck_assert_str_eq(buf, nonalpha_url_enc1);
- memset(buf, 77, sizeof(buf));
- ret = mg_url_decode(alpha, (int)strlen(alpha), buf, sizeof(buf), 0);
- ck_assert_int_eq(ret, (int)strlen(buf));
- ck_assert_int_eq(ret, (int)strlen(alpha));
- ck_assert_str_eq(buf, alpha);
- memset(buf, 77, sizeof(buf));
- ret = mg_url_decode(
- nonalpha_url_enc1, (int)strlen(nonalpha_url_enc1), buf, sizeof(buf), 0);
- ck_assert_int_eq(ret, (int)strlen(buf));
- ck_assert_int_eq(ret, (int)strlen(nonalpha));
- ck_assert_str_eq(buf, nonalpha);
- memset(buf, 77, sizeof(buf));
- ret = mg_url_decode(
- nonalpha_url_enc2, (int)strlen(nonalpha_url_enc2), buf, sizeof(buf), 0);
- ck_assert_int_eq(ret, (int)strlen(buf));
- ck_assert_int_eq(ret, (int)strlen(nonalpha));
- ck_assert_str_eq(buf, nonalpha);
- /* len could be unused, if base64_decode is not tested because USE_LUA is
- * not defined */
- (void)len;
- }
- END_TEST
- START_TEST(test_mask_data)
- {
- #if defined(USE_WEBSOCKET)
- char in[1024];
- char out[1024];
- int i;
- #endif
- uint32_t mask = 0x61626364;
- /* TODO: adapt test for big endian */
- ck_assert((*(unsigned char *)&mask) == 0x64u);
- #if defined(USE_WEBSOCKET)
- memset(in, 0, sizeof(in));
- memset(out, 99, sizeof(out));
- mask_data(in, sizeof(out), 0, out);
- ck_assert(!memcmp(out, in, sizeof(out)));
- for (i = 0; i < 1024; i++) {
- in[i] = (char)((unsigned char)i);
- }
- mask_data(in, 107, 0, out);
- ck_assert(!memcmp(out, in, 107));
- mask_data(in, 256, 0x01010101, out);
- for (i = 0; i < 256; i++) {
- ck_assert_int_eq((int)((unsigned char)out[i]),
- (int)(((unsigned char)in[i]) ^ (char)1u));
- }
- for (i = 256; i < (int)sizeof(out); i++) {
- ck_assert_int_eq((int)((unsigned char)out[i]), (int)0);
- }
- /* TODO: check this for big endian */
- mask_data(in, 5, 0x01020304, out);
- ck_assert_uint_eq((unsigned char)out[0], 0u ^ 4u);
- ck_assert_uint_eq((unsigned char)out[1], 1u ^ 3u);
- ck_assert_uint_eq((unsigned char)out[2], 2u ^ 2u);
- ck_assert_uint_eq((unsigned char)out[3], 3u ^ 1u);
- ck_assert_uint_eq((unsigned char)out[4], 4u ^ 4u);
- #endif
- }
- END_TEST
- START_TEST(test_parse_date_string)
- {
- #if !defined(NO_CACHING)
- time_t now = time(0);
- struct tm *tm = gmtime(&now);
- char date[64] = {0};
- unsigned long i;
- ck_assert_uint_eq((unsigned long)parse_date_string("1/Jan/1970 00:01:02"),
- 62ul);
- ck_assert_uint_eq((unsigned long)parse_date_string("1 Jan 1970 00:02:03"),
- 123ul);
- ck_assert_uint_eq((unsigned long)parse_date_string("1-Jan-1970 00:03:04"),
- 184ul);
- ck_assert_uint_eq((unsigned long)parse_date_string(
- "Xyz, 1 Jan 1970 00:04:05"),
- 245ul);
- gmt_time_string(date, sizeof(date), &now);
- ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now);
- sprintf(date,
- "%02u %s %04u %02u:%02u:%02u",
- (unsigned int)tm->tm_mday,
- month_names[tm->tm_mon],
- (unsigned int)(tm->tm_year + 1900),
- (unsigned int)tm->tm_hour,
- (unsigned int)tm->tm_min,
- (unsigned int)tm->tm_sec);
- ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now);
- gmt_time_string(date, 1, NULL);
- ck_assert_str_eq(date, "");
- gmt_time_string(date, 6, NULL);
- ck_assert_str_eq(date,
- "Thu, "); /* part of "Thu, 01 Jan 1970 00:00:00 GMT" */
- gmt_time_string(date, sizeof(date), NULL);
- ck_assert_str_eq(date, "Thu, 01 Jan 1970 00:00:00 GMT");
- for (i = 2ul; i < 0x8000000ul; i += i / 2) {
- now = (time_t)i;
- gmt_time_string(date, sizeof(date), &now);
- ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now);
- tm = gmtime(&now);
- sprintf(date,
- "%02u-%s-%04u %02u:%02u:%02u",
- (unsigned int)tm->tm_mday,
- month_names[tm->tm_mon],
- (unsigned int)(tm->tm_year + 1900),
- (unsigned int)tm->tm_hour,
- (unsigned int)tm->tm_min,
- (unsigned int)tm->tm_sec);
- ck_assert_uint_eq((uintmax_t)parse_date_string(date), (uintmax_t)now);
- }
- #endif
- }
- END_TEST
- START_TEST(test_sha1)
- {
- #ifdef SHA1_DIGEST_SIZE
- SHA_CTX sha_ctx;
- uint8_t digest[SHA1_DIGEST_SIZE] = {0};
- char str[48] = {0};
- int i;
- const char *test_str;
- ck_assert_uint_eq(sizeof(digest), 20);
- ck_assert_uint_gt(sizeof(str), sizeof(digest) * 2 + 1);
- /* empty string */
- SHA1_Init(&sha_ctx);
- SHA1_Final(digest, &sha_ctx);
- bin2str(str, digest, sizeof(digest));
- ck_assert_uint_eq(strlen(str), 40);
- ck_assert_str_eq(str, "da39a3ee5e6b4b0d3255bfef95601890afd80709");
- /* empty string */
- SHA1_Init(&sha_ctx);
- SHA1_Update(&sha_ctx, (uint8_t *)"abc", 0);
- SHA1_Final(digest, &sha_ctx);
- bin2str(str, digest, sizeof(digest));
- ck_assert_uint_eq(strlen(str), 40);
- ck_assert_str_eq(str, "da39a3ee5e6b4b0d3255bfef95601890afd80709");
- /* "abc" */
- SHA1_Init(&sha_ctx);
- SHA1_Update(&sha_ctx, (uint8_t *)"abc", 3);
- SHA1_Final(digest, &sha_ctx);
- bin2str(str, digest, sizeof(digest));
- ck_assert_uint_eq(strlen(str), 40);
- ck_assert_str_eq(str, "a9993e364706816aba3e25717850c26c9cd0d89d");
- /* "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" */
- test_str = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
- SHA1_Init(&sha_ctx);
- SHA1_Update(&sha_ctx, (uint8_t *)test_str, (uint32_t)strlen(test_str));
- SHA1_Final(digest, &sha_ctx);
- bin2str(str, digest, sizeof(digest));
- ck_assert_uint_eq(strlen(str), 40);
- ck_assert_str_eq(str, "84983e441c3bd26ebaae4aa1f95129e5e54670f1");
- /* a million "a" */
- SHA1_Init(&sha_ctx);
- for (i = 0; i < 1000000; i++) {
- SHA1_Update(&sha_ctx, (uint8_t *)"a", 1);
- }
- SHA1_Final(digest, &sha_ctx);
- bin2str(str, digest, sizeof(digest));
- ck_assert_uint_eq(strlen(str), 40);
- ck_assert_str_eq(str, "34aa973cd4c4daa4f61eeb2bdbad27316534016f");
- /* a million "a" in blocks of 10 */
- SHA1_Init(&sha_ctx);
- for (i = 0; i < 100000; i++) {
- SHA1_Update(&sha_ctx, (uint8_t *)"aaaaaaaaaa", 10);
- }
- SHA1_Final(digest, &sha_ctx);
- bin2str(str, digest, sizeof(digest));
- ck_assert_uint_eq(strlen(str), 40);
- ck_assert_str_eq(str, "34aa973cd4c4daa4f61eeb2bdbad27316534016f");
- #else
- /* Can not test, if SHA1 is not included */
- ck_assert(1);
- #endif
- }
- END_TEST
- START_TEST(test_config_options)
- {
- /* Check size of config_options vs. number of options in enum. */
- ck_assert_ptr_eq(NULL, config_options[NUM_OPTIONS].name);
- ck_assert_int_eq((int)MG_CONFIG_TYPE_UNKNOWN,
- config_options[NUM_OPTIONS].type);
- ck_assert_uint_eq(sizeof(config_options) / sizeof(config_options[0]),
- (size_t)(NUM_OPTIONS + 1));
- /* Check option enums vs. option names. */
- /* Check if the order in
- * static struct mg_option config_options[]
- * is the same as in the option enum
- * This test allows to reorder config_options and the enum,
- * and check if the order is still consistent. */
- ck_assert_str_eq("cgi_pattern", config_options[CGI_EXTENSIONS].name);
- ck_assert_str_eq("cgi_environment", config_options[CGI_ENVIRONMENT].name);
- ck_assert_str_eq("put_delete_auth_file",
- config_options[PUT_DELETE_PASSWORDS_FILE].name);
- ck_assert_str_eq("cgi_interpreter", config_options[CGI_INTERPRETER].name);
- ck_assert_str_eq("protect_uri", config_options[PROTECT_URI].name);
- ck_assert_str_eq("authentication_domain",
- config_options[AUTHENTICATION_DOMAIN].name);
- ck_assert_str_eq("enable_auth_domain_check",
- config_options[ENABLE_AUTH_DOMAIN_CHECK].name);
- ck_assert_str_eq("ssi_pattern", config_options[SSI_EXTENSIONS].name);
- ck_assert_str_eq("throttle", config_options[THROTTLE].name);
- ck_assert_str_eq("access_log_file", config_options[ACCESS_LOG_FILE].name);
- ck_assert_str_eq("enable_directory_listing",
- config_options[ENABLE_DIRECTORY_LISTING].name);
- ck_assert_str_eq("error_log_file", config_options[ERROR_LOG_FILE].name);
- ck_assert_str_eq("global_auth_file",
- config_options[GLOBAL_PASSWORDS_FILE].name);
- ck_assert_str_eq("index_files", config_options[INDEX_FILES].name);
- ck_assert_str_eq("enable_keep_alive",
- config_options[ENABLE_KEEP_ALIVE].name);
- ck_assert_str_eq("access_control_list",
- config_options[ACCESS_CONTROL_LIST].name);
- ck_assert_str_eq("extra_mime_types", config_options[EXTRA_MIME_TYPES].name);
- ck_assert_str_eq("listening_ports", config_options[LISTENING_PORTS].name);
- ck_assert_str_eq("document_root", config_options[DOCUMENT_ROOT].name);
- ck_assert_str_eq("ssl_certificate", config_options[SSL_CERTIFICATE].name);
- ck_assert_str_eq("ssl_certificate_chain",
- config_options[SSL_CERTIFICATE_CHAIN].name);
- ck_assert_str_eq("num_threads", config_options[NUM_THREADS].name);
- ck_assert_str_eq("run_as_user", config_options[RUN_AS_USER].name);
- ck_assert_str_eq("url_rewrite_patterns",
- config_options[URL_REWRITE_PATTERN].name);
- ck_assert_str_eq("hide_files_patterns", config_options[HIDE_FILES].name);
- ck_assert_str_eq("request_timeout_ms",
- config_options[REQUEST_TIMEOUT].name);
- ck_assert_str_eq("keep_alive_timeout_ms",
- config_options[KEEP_ALIVE_TIMEOUT].name);
- ck_assert_str_eq("linger_timeout_ms", config_options[LINGER_TIMEOUT].name);
- ck_assert_str_eq("ssl_verify_peer",
- config_options[SSL_DO_VERIFY_PEER].name);
- ck_assert_str_eq("ssl_ca_path", config_options[SSL_CA_PATH].name);
- ck_assert_str_eq("ssl_ca_file", config_options[SSL_CA_FILE].name);
- ck_assert_str_eq("ssl_verify_depth", config_options[SSL_VERIFY_DEPTH].name);
- ck_assert_str_eq("ssl_default_verify_paths",
- config_options[SSL_DEFAULT_VERIFY_PATHS].name);
- ck_assert_str_eq("ssl_cipher_list", config_options[SSL_CIPHER_LIST].name);
- ck_assert_str_eq("ssl_protocol_version",
- config_options[SSL_PROTOCOL_VERSION].name);
- ck_assert_str_eq("ssl_short_trust", config_options[SSL_SHORT_TRUST].name);
- #if defined(USE_WEBSOCKET)
- ck_assert_str_eq("websocket_timeout_ms",
- config_options[WEBSOCKET_TIMEOUT].name);
- ck_assert_str_eq("enable_websocket_ping_pong",
- config_options[ENABLE_WEBSOCKET_PING_PONG].name);
- #endif
- ck_assert_str_eq("decode_url", config_options[DECODE_URL].name);
- #if defined(USE_LUA)
- ck_assert_str_eq("lua_preload_file", config_options[LUA_PRELOAD_FILE].name);
- ck_assert_str_eq("lua_script_pattern",
- config_options[LUA_SCRIPT_EXTENSIONS].name);
- ck_assert_str_eq("lua_server_page_pattern",
- config_options[LUA_SERVER_PAGE_EXTENSIONS].name);
- #endif
- #if defined(USE_DUKTAPE)
- ck_assert_str_eq("duktape_script_pattern",
- config_options[DUKTAPE_SCRIPT_EXTENSIONS].name);
- #endif
- #if defined(USE_WEBSOCKET)
- ck_assert_str_eq("websocket_root", config_options[WEBSOCKET_ROOT].name);
- #endif
- #if defined(USE_LUA) && defined(USE_WEBSOCKET)
- ck_assert_str_eq("lua_websocket_pattern",
- config_options[LUA_WEBSOCKET_EXTENSIONS].name);
- #endif
- ck_assert_str_eq("access_control_allow_origin",
- config_options[ACCESS_CONTROL_ALLOW_ORIGIN].name);
- ck_assert_str_eq("access_control_allow_methods",
- config_options[ACCESS_CONTROL_ALLOW_METHODS].name);
- ck_assert_str_eq("access_control_allow_headers",
- config_options[ACCESS_CONTROL_ALLOW_HEADERS].name);
- ck_assert_str_eq("error_pages", config_options[ERROR_PAGES].name);
- ck_assert_str_eq("tcp_nodelay", config_options[CONFIG_TCP_NODELAY].name);
- #if !defined(NO_CACHING)
- ck_assert_str_eq("static_file_max_age",
- config_options[STATIC_FILE_MAX_AGE].name);
- #endif
- #if !defined(NO_SSL)
- ck_assert_str_eq("strict_transport_security_max_age",
- config_options[STRICT_HTTPS_MAX_AGE].name);
- #endif
- #if defined(__linux__)
- ck_assert_str_eq("allow_sendfile_call",
- config_options[ALLOW_SENDFILE_CALL].name);
- #endif
- #if defined(_WIN32)
- ck_assert_str_eq("case_sensitive",
- config_options[CASE_SENSITIVE_FILES].name);
- #endif
- #if defined(USE_LUA)
- ck_assert_str_eq("lua_background_script",
- config_options[LUA_BACKGROUND_SCRIPT].name);
- ck_assert_str_eq("lua_background_script_params",
- config_options[LUA_BACKGROUND_SCRIPT_PARAMS].name);
- #endif
- ck_assert_str_eq("additional_header",
- config_options[ADDITIONAL_HEADER].name);
- ck_assert_str_eq("max_request_size", config_options[MAX_REQUEST_SIZE].name);
- ck_assert_str_eq("allow_index_script_resource",
- config_options[ALLOW_INDEX_SCRIPT_SUB_RES].name);
- }
- END_TEST
- #if !defined(REPLACE_CHECK_FOR_LOCAL_DEBUGGING)
- Suite *
- make_private_suite(void)
- {
- Suite *const suite = suite_create("Private");
- TCase *const tcase_http_message = tcase_create("HTTP Message");
- TCase *const tcase_http_keep_alive = tcase_create("HTTP Keep Alive");
- TCase *const tcase_url_parsing_1 = tcase_create("URL Parsing 1");
- TCase *const tcase_url_parsing_2 = tcase_create("URL Parsing 2");
- TCase *const tcase_url_parsing_3 = tcase_create("URL Parsing 3");
- TCase *const tcase_internal_parse_1 = tcase_create("Internal Parsing 1");
- TCase *const tcase_internal_parse_2 = tcase_create("Internal Parsing 2");
- TCase *const tcase_internal_parse_3 = tcase_create("Internal Parsing 3");
- TCase *const tcase_internal_parse_4 = tcase_create("Internal Parsing 4");
- TCase *const tcase_internal_parse_5 = tcase_create("Internal Parsing 5");
- TCase *const tcase_internal_parse_6 = tcase_create("Internal Parsing 6");
- TCase *const tcase_encode_decode = tcase_create("Encode Decode");
- TCase *const tcase_mask_data = tcase_create("Mask Data");
- TCase *const tcase_parse_date_string = tcase_create("Date Parsing");
- TCase *const tcase_sha1 = tcase_create("SHA1");
- TCase *const tcase_config_options = tcase_create("Config Options");
- tcase_add_test(tcase_http_message, test_parse_http_message);
- tcase_set_timeout(tcase_http_message, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_http_message);
- tcase_add_test(tcase_http_keep_alive, test_should_keep_alive);
- tcase_set_timeout(tcase_http_keep_alive, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_http_keep_alive);
- tcase_add_test(tcase_url_parsing_1, test_match_prefix);
- tcase_set_timeout(tcase_url_parsing_1, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_url_parsing_1);
- tcase_add_test(tcase_url_parsing_2,
- test_remove_double_dots_and_double_slashes);
- tcase_set_timeout(tcase_url_parsing_2, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_url_parsing_2);
- tcase_add_test(tcase_url_parsing_3, test_is_valid_uri);
- tcase_set_timeout(tcase_url_parsing_3, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_url_parsing_3);
- tcase_add_test(tcase_internal_parse_1, test_next_option);
- tcase_set_timeout(tcase_internal_parse_1, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_internal_parse_1);
- tcase_add_test(tcase_internal_parse_2, test_skip_quoted);
- tcase_set_timeout(tcase_internal_parse_2, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_internal_parse_2);
- tcase_add_test(tcase_internal_parse_3, test_mg_strcasestr);
- tcase_set_timeout(tcase_internal_parse_3, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_internal_parse_3);
- tcase_add_test(tcase_internal_parse_4, test_alloc_vprintf);
- tcase_set_timeout(tcase_internal_parse_4, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_internal_parse_4);
- tcase_add_test(tcase_internal_parse_5, test_mg_vsnprintf);
- tcase_set_timeout(tcase_internal_parse_5, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_internal_parse_5);
- tcase_add_test(tcase_internal_parse_6, test_parse_port_string);
- tcase_set_timeout(tcase_internal_parse_6, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_internal_parse_6);
- tcase_add_test(tcase_encode_decode, test_encode_decode);
- tcase_set_timeout(tcase_encode_decode, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_encode_decode);
- tcase_add_test(tcase_mask_data, test_mask_data);
- tcase_set_timeout(tcase_mask_data, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_mask_data);
- tcase_add_test(tcase_parse_date_string, test_parse_date_string);
- tcase_set_timeout(tcase_parse_date_string, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_parse_date_string);
- tcase_add_test(tcase_sha1, test_sha1);
- tcase_set_timeout(tcase_sha1, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_sha1);
- tcase_add_test(tcase_config_options, test_config_options);
- tcase_set_timeout(tcase_config_options, civetweb_min_test_timeout);
- suite_add_tcase(suite, tcase_config_options);
- return suite;
- }
- #endif
- #ifdef REPLACE_CHECK_FOR_LOCAL_DEBUGGING
- /* Used to debug test cases without using the check framework */
- void
- MAIN_PRIVATE(void)
- {
- #if defined(_WIN32)
- /* test_parse_port_string requires WSAStartup for IPv6 */
- WSADATA data;
- WSAStartup(MAKEWORD(2, 2), &data);
- #endif
- test_alloc_vprintf(0);
- test_mg_vsnprintf(0);
- test_remove_double_dots_and_double_slashes(0);
- test_parse_date_string(0);
- test_parse_port_string(0);
- test_parse_http_message(0);
- test_sha1(0);
- #if defined(_WIN32)
- WSACleanup();
- #endif
- }
- #endif
|