unit1604.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353
  1. /***************************************************************************
  2. * _ _ ____ _
  3. * Project ___| | | | _ \| |
  4. * / __| | | | |_) | |
  5. * | (__| |_| | _ <| |___
  6. * \___|\___/|_| \_\_____|
  7. *
  8. * Copyright (C) 1998 - 2018, Daniel Stenberg, <daniel@haxx.se>, et al.
  9. *
  10. * This software is licensed as described in the file COPYING, which
  11. * you should have received as part of this distribution. The terms
  12. * are also available at https://curl.haxx.se/docs/copyright.html.
  13. *
  14. * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. * copies of the Software, and permit persons to whom the Software is
  16. * furnished to do so, under the terms of the COPYING file.
  17. *
  18. * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. * KIND, either express or implied.
  20. *
  21. ***************************************************************************/
  22. #include "curlcheck.h"
  23. #include "tool_cfgable.h"
  24. #include "tool_doswin.h"
  25. #include <stdio.h>
  26. #include <stdlib.h>
  27. #include <string.h>
  28. #include "memdebug.h" /* LAST include file */
  29. static CURLcode unit_setup(void)
  30. {
  31. return CURLE_OK;
  32. }
  33. static void unit_stop(void)
  34. {
  35. }
  36. #if defined(MSDOS) || defined(WIN32)
  37. static char *getflagstr(int flags)
  38. {
  39. char *buf = malloc(256);
  40. if(buf) {
  41. snprintf(buf, 256, "%s,%s,%s,%s",
  42. ((flags & SANITIZE_ALLOW_COLONS) ? "SANITIZE_ALLOW_COLONS" : ""),
  43. ((flags & SANITIZE_ALLOW_PATH) ? "SANITIZE_ALLOW_PATH" : ""),
  44. ((flags & SANITIZE_ALLOW_RESERVED) ? "SANITIZE_ALLOW_RESERVED" : ""),
  45. ((flags & SANITIZE_ALLOW_TRUNCATE) ? "SANITIZE_ALLOW_TRUNCATE" : ""));
  46. }
  47. return buf;
  48. }
  49. static char *getcurlcodestr(int cc)
  50. {
  51. char *buf = malloc(256);
  52. if(buf) {
  53. snprintf(buf, 256, "%s (%d)",
  54. (cc == SANITIZE_ERR_OK ? "SANITIZE_ERR_OK" :
  55. cc == SANITIZE_ERR_BAD_ARGUMENT ? "SANITIZE_ERR_BAD_ARGUMENT" :
  56. cc == SANITIZE_ERR_INVALID_PATH ? "SANITIZE_ERR_INVALID_PATH" :
  57. cc == SANITIZE_ERR_OUT_OF_MEMORY ? "SANITIZE_ERR_OUT_OF_MEMORY" :
  58. "unexpected error code - add name"),
  59. cc);
  60. }
  61. return buf;
  62. }
  63. struct data {
  64. const char *input;
  65. int flags;
  66. const char *expected_output;
  67. CURLcode expected_result;
  68. };
  69. UNITTEST_START
  70. { /* START sanitize_file_name */
  71. struct data data[] = {
  72. { "", 0,
  73. "", SANITIZE_ERR_OK
  74. },
  75. { "normal filename", 0,
  76. "normal filename", SANITIZE_ERR_OK
  77. },
  78. { "control\tchar", 0,
  79. "control_char", SANITIZE_ERR_OK
  80. },
  81. { "banned*char", 0,
  82. "banned_char", SANITIZE_ERR_OK
  83. },
  84. { "f:foo", 0,
  85. "f_foo", SANITIZE_ERR_OK
  86. },
  87. { "f:foo", SANITIZE_ALLOW_COLONS,
  88. "f:foo", SANITIZE_ERR_OK
  89. },
  90. { "f:foo", SANITIZE_ALLOW_PATH,
  91. "f:foo", SANITIZE_ERR_OK
  92. },
  93. { "f:\\foo", 0,
  94. "f__foo", SANITIZE_ERR_OK
  95. },
  96. { "f:\\foo", SANITIZE_ALLOW_PATH,
  97. "f:\\foo", SANITIZE_ERR_OK
  98. },
  99. { "f:/foo", 0,
  100. "f__foo", SANITIZE_ERR_OK
  101. },
  102. { "f:/foo", SANITIZE_ALLOW_PATH,
  103. "f:/foo", SANITIZE_ERR_OK
  104. },
  105. #ifndef MSDOS
  106. { "\\\\?\\C:\\foo", SANITIZE_ALLOW_PATH,
  107. "\\\\?\\C:\\foo", SANITIZE_ERR_OK
  108. },
  109. { "\\\\?\\C:\\foo", 0,
  110. "____C__foo", SANITIZE_ERR_OK
  111. },
  112. #endif
  113. { "foo:bar", 0,
  114. "foo_bar", SANITIZE_ERR_OK
  115. },
  116. { "foo|<>/bar\\\":?*baz", 0,
  117. "foo____bar_____baz", SANITIZE_ERR_OK
  118. },
  119. { "f:foo::$DATA", 0,
  120. "f_foo__$DATA", SANITIZE_ERR_OK
  121. },
  122. { "con . air", 0,
  123. "con _ air", SANITIZE_ERR_OK
  124. },
  125. { "con.air", 0,
  126. "con_air", SANITIZE_ERR_OK
  127. },
  128. { "con:/x", 0,
  129. "con__x", SANITIZE_ERR_OK
  130. },
  131. { "file . . . . .. .", 0,
  132. "file", SANITIZE_ERR_OK
  133. },
  134. { "foo . . ? . . ", 0,
  135. "foo . . _", SANITIZE_ERR_OK
  136. },
  137. { "com1", 0,
  138. "_com1", SANITIZE_ERR_OK
  139. },
  140. { "com1", SANITIZE_ALLOW_RESERVED,
  141. "com1", SANITIZE_ERR_OK
  142. },
  143. { "f:\\com1", 0,
  144. "f__com1", SANITIZE_ERR_OK
  145. },
  146. { "f:\\com1", SANITIZE_ALLOW_PATH,
  147. "f:\\_com1", SANITIZE_ERR_OK
  148. },
  149. { "f:\\com1", SANITIZE_ALLOW_RESERVED,
  150. "f__com1", SANITIZE_ERR_OK
  151. },
  152. { "f:\\com1", SANITIZE_ALLOW_RESERVED | SANITIZE_ALLOW_COLONS,
  153. "f:_com1", SANITIZE_ERR_OK
  154. },
  155. { "f:\\com1", SANITIZE_ALLOW_RESERVED | SANITIZE_ALLOW_PATH,
  156. "f:\\com1", SANITIZE_ERR_OK
  157. },
  158. { "com1:\\com1", SANITIZE_ALLOW_PATH,
  159. "_com1:\\_com1", SANITIZE_ERR_OK
  160. },
  161. { "com1:\\com1", SANITIZE_ALLOW_RESERVED | SANITIZE_ALLOW_PATH,
  162. "com1:\\com1", SANITIZE_ERR_OK
  163. },
  164. { "com1:\\com1", SANITIZE_ALLOW_RESERVED,
  165. "com1__com1", SANITIZE_ERR_OK
  166. },
  167. #ifndef MSDOS
  168. { "\\com1", SANITIZE_ALLOW_PATH,
  169. "\\_com1", SANITIZE_ERR_OK
  170. },
  171. { "\\\\com1", SANITIZE_ALLOW_PATH,
  172. "\\\\com1", SANITIZE_ERR_OK
  173. },
  174. { "\\\\?\\C:\\com1", SANITIZE_ALLOW_PATH,
  175. "\\\\?\\C:\\com1", SANITIZE_ERR_OK
  176. },
  177. #endif
  178. { "CoM1", 0,
  179. "_CoM1", SANITIZE_ERR_OK
  180. },
  181. { "CoM1", SANITIZE_ALLOW_RESERVED,
  182. "CoM1", SANITIZE_ERR_OK
  183. },
  184. { "COM56", 0,
  185. "COM56", SANITIZE_ERR_OK
  186. },
  187. /* At the moment we expect a maximum path length of 259. I assume MSDOS
  188. has variable max path lengths depending on compiler that are shorter
  189. so currently these "good" truncate tests won't run on MSDOS */
  190. #ifndef MSDOS
  191. { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  192. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  193. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  194. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  195. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  196. "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
  197. SANITIZE_ALLOW_TRUNCATE,
  198. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  199. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  200. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  201. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  202. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  203. "FFFFF", SANITIZE_ERR_OK
  204. },
  205. { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  206. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  207. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  208. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  209. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  210. "FFF\\FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
  211. SANITIZE_ALLOW_TRUNCATE | SANITIZE_ALLOW_PATH,
  212. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  213. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  214. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  215. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  216. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  217. "FFF\\FFFFF", SANITIZE_ERR_OK
  218. },
  219. { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  220. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  221. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  222. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  223. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  224. "FFF\\FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
  225. SANITIZE_ALLOW_TRUNCATE,
  226. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  227. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  228. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  229. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  230. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  231. "FFF_F", SANITIZE_ERR_OK
  232. },
  233. #endif /* !MSDOS */
  234. { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  235. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  236. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  237. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  238. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  239. "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
  240. 0,
  241. NULL, SANITIZE_ERR_INVALID_PATH
  242. },
  243. { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  244. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  245. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  246. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  247. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  248. "FFFF\\FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
  249. SANITIZE_ALLOW_TRUNCATE,
  250. NULL, SANITIZE_ERR_INVALID_PATH
  251. },
  252. { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  253. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  254. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  255. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  256. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  257. "FFFFFFFFFFFFFFFFFFFFFFFFF\\FFFFFFFFFFFFFFFFFFFFFFFF",
  258. SANITIZE_ALLOW_TRUNCATE | SANITIZE_ALLOW_PATH,
  259. NULL, SANITIZE_ERR_INVALID_PATH
  260. },
  261. { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  262. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  263. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  264. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  265. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  266. "FFF\\FFFFFFFFFFFFFFFFFFFFF:FFFFFFFFFFFFFFFFFFFFFFFF",
  267. SANITIZE_ALLOW_TRUNCATE | SANITIZE_ALLOW_PATH,
  268. NULL, SANITIZE_ERR_INVALID_PATH
  269. },
  270. { "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  271. "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
  272. "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
  273. "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
  274. "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
  275. "FF\\F:FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF",
  276. SANITIZE_ALLOW_TRUNCATE | SANITIZE_ALLOW_PATH,
  277. NULL, SANITIZE_ERR_INVALID_PATH
  278. },
  279. { NULL, 0,
  280. NULL, SANITIZE_ERR_BAD_ARGUMENT
  281. },
  282. };
  283. size_t i;
  284. for(i = 0; i < sizeof(data) / sizeof(data[0]); ++i) {
  285. char *output = NULL;
  286. char *flagstr = NULL;
  287. char *received_ccstr = NULL;
  288. char *expected_ccstr = NULL;
  289. CURLcode res = sanitize_file_name(&output, data[i].input, data[i].flags);
  290. if(res == data[i].expected_result &&
  291. ((!output && !data[i].expected_output) ||
  292. (output && data[i].expected_output &&
  293. !strcmp(output, data[i].expected_output)))) { /* OK */
  294. free(output);
  295. continue;
  296. }
  297. flagstr = getflagstr(data[i].flags);
  298. abort_unless(flagstr, "out of memory");
  299. received_ccstr = getcurlcodestr(res);
  300. abort_unless(received_ccstr, "out of memory");
  301. expected_ccstr = getcurlcodestr(data[i].expected_result);
  302. abort_unless(expected_ccstr, "out of memory");
  303. unitfail++;
  304. fprintf(stderr, "\n"
  305. "%s:%d sanitize_file_name failed.\n"
  306. "input: %s\n"
  307. "flags: %s\n"
  308. "output: %s\n"
  309. "result: %s\n"
  310. "expected output: %s\n"
  311. "expected result: %s\n",
  312. __FILE__, __LINE__,
  313. data[i].input,
  314. flagstr,
  315. (output ? output : "(null)"),
  316. received_ccstr,
  317. (data[i].expected_output ? data[i].expected_output : "(null)"),
  318. expected_ccstr);
  319. free(output);
  320. free(flagstr);
  321. free(received_ccstr);
  322. free(expected_ccstr);
  323. }
  324. } /* END sanitize_file_name */
  325. #else
  326. UNITTEST_START
  327. {
  328. fprintf(stderr, "Skipped test not for this platform\n");
  329. }
  330. #endif /* MSDOS || WIN32 */
  331. UNITTEST_STOP