summaryrefslogtreecommitdiffabout
authorMichael Krelin <hacker@klever.net>2007-11-23 22:18:54 (UTC)
committer Michael Krelin <hacker@klever.net>2007-11-24 07:09:40 (UTC)
commit70f85314fcd188a182aae3a4291c0cd95ba16ee2 (patch) (unidiff)
treecad4bf188542d4319280a3c30757e72ec2d20bf6
parent2589c69c4a909563098365fba141082db4657353 (diff)
downloadlibopkele-70f85314fcd188a182aae3a4291c0cd95ba16ee2.zip
libopkele-70f85314fcd188a182aae3a4291c0cd95ba16ee2.tar.gz
libopkele-70f85314fcd188a182aae3a4291c0cd95ba16ee2.tar.bz2
added URI normalization procedure to opkele::util
as specified in RFC3896, section 6 Signed-off-by: Michael Krelin <hacker@klever.net>
Diffstat (more/less context) (ignore whitespace changes)
-rw-r--r--include/opkele/util.h10
-rw-r--r--lib/util.cc131
-rw-r--r--test/test.cc67
3 files changed, 208 insertions, 0 deletions
diff --git a/include/opkele/util.h b/include/opkele/util.h
index edc1859..085c9e6 100644
--- a/include/opkele/util.h
+++ b/include/opkele/util.h
@@ -1,133 +1,143 @@
1#ifndef __OPKELE_UTIL_H 1#ifndef __OPKELE_UTIL_H
2#define __OPKELE_UTIL_H 2#define __OPKELE_UTIL_H
3 3
4#include <time.h> 4#include <time.h>
5#include <string> 5#include <string>
6#include <vector> 6#include <vector>
7#include <openssl/bn.h> 7#include <openssl/bn.h>
8#include <openssl/dh.h> 8#include <openssl/dh.h>
9 9
10namespace opkele { 10namespace opkele {
11 using std::string; 11 using std::string;
12 using std::vector; 12 using std::vector;
13 13
14 /** 14 /**
15 * @brief opkele utils namespace 15 * @brief opkele utils namespace
16 */ 16 */
17 namespace util { 17 namespace util {
18 18
19 /** 19 /**
20 * Convenience class encapsulating SSL BIGNUM object for the purpose of 20 * Convenience class encapsulating SSL BIGNUM object for the purpose of
21 * automatical freeing. 21 * automatical freeing.
22 */ 22 */
23 class bignum_t { 23 class bignum_t {
24 public: 24 public:
25 BIGNUM *_bn; 25 BIGNUM *_bn;
26 26
27 bignum_t() : _bn(0) { } 27 bignum_t() : _bn(0) { }
28 bignum_t(BIGNUM *bn) : _bn(bn) { } 28 bignum_t(BIGNUM *bn) : _bn(bn) { }
29 ~bignum_t() throw() { if(_bn) BN_free(_bn); } 29 ~bignum_t() throw() { if(_bn) BN_free(_bn); }
30 30
31 bignum_t& operator=(BIGNUM *bn) { if(_bn) BN_free(_bn); _bn = bn; return *this; } 31 bignum_t& operator=(BIGNUM *bn) { if(_bn) BN_free(_bn); _bn = bn; return *this; }
32 32
33 operator const BIGNUM*(void) const { return _bn; } 33 operator const BIGNUM*(void) const { return _bn; }
34 operator BIGNUM*(void) { return _bn; } 34 operator BIGNUM*(void) { return _bn; }
35 }; 35 };
36 /** 36 /**
37 * Convenience clas encapsulating SSL DH object for the purpose of 37 * Convenience clas encapsulating SSL DH object for the purpose of
38 * automatic freeing. 38 * automatic freeing.
39 */ 39 */
40 class dh_t { 40 class dh_t {
41 public: 41 public:
42 DH *_dh; 42 DH *_dh;
43 43
44 dh_t() : _dh(0) { } 44 dh_t() : _dh(0) { }
45 dh_t(DH *dh) : _dh(dh) { } 45 dh_t(DH *dh) : _dh(dh) { }
46 ~dh_t() throw() { if(_dh) DH_free(_dh); } 46 ~dh_t() throw() { if(_dh) DH_free(_dh); }
47 47
48 dh_t& operator=(DH *dh) { if(_dh) DH_free(_dh); _dh = dh; return *this; } 48 dh_t& operator=(DH *dh) { if(_dh) DH_free(_dh); _dh = dh; return *this; }
49 49
50 operator const DH*(void) const { return _dh; } 50 operator const DH*(void) const { return _dh; }
51 operator DH*(void) { return _dh; } 51 operator DH*(void) { return _dh; }
52 52
53 DH* operator->() { return _dh; } 53 DH* operator->() { return _dh; }
54 const DH* operator->() const { return _dh; } 54 const DH* operator->() const { return _dh; }
55 }; 55 };
56 56
57 /** 57 /**
58 * Convert base64-encoded SSL BIGNUM to internal representation. 58 * Convert base64-encoded SSL BIGNUM to internal representation.
59 * @param b64 base64-encoded number 59 * @param b64 base64-encoded number
60 * @return SSL BIGNUM 60 * @return SSL BIGNUM
61 * @throw failed_conversion in case of error 61 * @throw failed_conversion in case of error
62 */ 62 */
63 BIGNUM *base64_to_bignum(const string& b64); 63 BIGNUM *base64_to_bignum(const string& b64);
64 /** 64 /**
65 * Convert decimal representation to SSL BIGNUM. 65 * Convert decimal representation to SSL BIGNUM.
66 * @param dec decimal representation 66 * @param dec decimal representation
67 * @return resulting BIGNUM 67 * @return resulting BIGNUM
68 * @throw failed_conversion in case of error 68 * @throw failed_conversion in case of error
69 */ 69 */
70 BIGNUM *dec_to_bignum(const string& dec); 70 BIGNUM *dec_to_bignum(const string& dec);
71 /** 71 /**
72 * Convert SSL BIGNUM data to base64 encoded string. 72 * Convert SSL BIGNUM data to base64 encoded string.
73 * @param bn BIGNUM 73 * @param bn BIGNUM
74 * @return base64encoded string 74 * @return base64encoded string
75 */ 75 */
76 string bignum_to_base64(const BIGNUM *bn); 76 string bignum_to_base64(const BIGNUM *bn);
77 77
78 /** 78 /**
79 * Convert internal time representation to w3c format 79 * Convert internal time representation to w3c format
80 * @param t internal representation 80 * @param t internal representation
81 * @return w3c time 81 * @return w3c time
82 * @throw failed_conversion in case of error 82 * @throw failed_conversion in case of error
83 */ 83 */
84 string time_to_w3c(time_t t); 84 string time_to_w3c(time_t t);
85 /** 85 /**
86 * Convert W3C time representation to internal time_t 86 * Convert W3C time representation to internal time_t
87 * @param w w3c representation 87 * @param w w3c representation
88 * @return converted time 88 * @return converted time
89 * @throw failed_conversion in case of error 89 * @throw failed_conversion in case of error
90 */ 90 */
91 time_t w3c_to_time(const string& w); 91 time_t w3c_to_time(const string& w);
92 92
93 /** 93 /**
94 * Encode string to the representation suitable for using in URL. 94 * Encode string to the representation suitable for using in URL.
95 * @param str string to encode 95 * @param str string to encode
96 * @return encoded string 96 * @return encoded string
97 * @throw failed_conversion in case of failure 97 * @throw failed_conversion in case of failure
98 */ 98 */
99 string url_encode(const string& str); 99 string url_encode(const string& str);
100 100
101 /** 101 /**
102 * Convert number to string 102 * Convert number to string
103 * @param l number 103 * @param l number
104 * @return string representation 104 * @return string representation
105 * @throw failed_conversion in case of failure 105 * @throw failed_conversion in case of failure
106 */ 106 */
107 string long_to_string(long l); 107 string long_to_string(long l);
108 /** 108 /**
109 * Convert string to number 109 * Convert string to number
110 * @param s string, containing the number 110 * @param s string, containing the number
111 * @return the number 111 * @return the number
112 * @throw failed_conversion in case of failure 112 * @throw failed_conversion in case of failure
113 */ 113 */
114 long string_to_long(const string& s); 114 long string_to_long(const string& s);
115 115
116 /** 116 /**
117 * Encode binary data using base64. 117 * Encode binary data using base64.
118 * @param data pointer to binary data 118 * @param data pointer to binary data
119 * @param length length of data 119 * @param length length of data
120 * @return encoded data 120 * @return encoded data
121 */ 121 */
122 string encode_base64(const void *data,size_t length); 122 string encode_base64(const void *data,size_t length);
123 /** 123 /**
124 * Decode binary data from base64 representation. 124 * Decode binary data from base64 representation.
125 * @param data base64-encoded data 125 * @param data base64-encoded data
126 * @param rv container for decoded binary 126 * @param rv container for decoded binary
127 */ 127 */
128 void decode_base64(const string& data,vector<unsigned char>& rv); 128 void decode_base64(const string& data,vector<unsigned char>& rv);
129
130 /**
131 * Normalize http(s) URI according to RFC3986, section 6. URI is
132 * expected to have scheme: in front of it.
133 * @param uri URI
134 * @return normalized URI
135 * @throw not_implemented in case of non-httpi(s) URI
136 * @throw bad_input in case of malformed URI
137 */
138 string rfc_3986_normalize_uri(const string& uri);
129 } 139 }
130 140
131} 141}
132 142
133#endif /* __OPKELE_UTIL_H */ 143#endif /* __OPKELE_UTIL_H */
diff --git a/lib/util.cc b/lib/util.cc
index 26be66a..eacf6d7 100644
--- a/lib/util.cc
+++ b/lib/util.cc
@@ -1,164 +1,295 @@
1#include <errno.h> 1#include <errno.h>
2#include <cassert> 2#include <cassert>
3#include <cctype>
3#include <cstring> 4#include <cstring>
4#include <vector> 5#include <vector>
5#include <string> 6#include <string>
7#include <stack>
6#include <openssl/bio.h> 8#include <openssl/bio.h>
7#include <openssl/evp.h> 9#include <openssl/evp.h>
8#include <curl/curl.h> 10#include <curl/curl.h>
9#include "opkele/util.h" 11#include "opkele/util.h"
10#include "opkele/exception.h" 12#include "opkele/exception.h"
11 13
12namespace opkele { 14namespace opkele {
13 using namespace std; 15 using namespace std;
14 16
15 namespace util { 17 namespace util {
16 18
17 /* 19 /*
18 * base64 20 * base64
19 */ 21 */
20 string encode_base64(const void *data,size_t length) { 22 string encode_base64(const void *data,size_t length) {
21 BIO *b64 = 0, *bmem = 0; 23 BIO *b64 = 0, *bmem = 0;
22 try { 24 try {
23 b64 = BIO_new(BIO_f_base64()); 25 b64 = BIO_new(BIO_f_base64());
24 if(!b64) 26 if(!b64)
25 throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 encoder"); 27 throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 encoder");
26 BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); 28 BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL);
27 bmem = BIO_new(BIO_s_mem()); 29 bmem = BIO_new(BIO_s_mem());
28 BIO_set_flags(b64,BIO_CLOSE); 30 BIO_set_flags(b64,BIO_CLOSE);
29 if(!bmem) 31 if(!bmem)
30 throw exception_openssl(OPKELE_CP_ "failed to BIO_new() memory buffer"); 32 throw exception_openssl(OPKELE_CP_ "failed to BIO_new() memory buffer");
31 BIO_push(b64,bmem); 33 BIO_push(b64,bmem);
32 if(((size_t)BIO_write(b64,data,length))!=length) 34 if(((size_t)BIO_write(b64,data,length))!=length)
33 throw exception_openssl(OPKELE_CP_ "failed to BIO_write()"); 35 throw exception_openssl(OPKELE_CP_ "failed to BIO_write()");
34 if(BIO_flush(b64)!=1) 36 if(BIO_flush(b64)!=1)
35 throw exception_openssl(OPKELE_CP_ "failed to BIO_flush()"); 37 throw exception_openssl(OPKELE_CP_ "failed to BIO_flush()");
36 char *rvd; 38 char *rvd;
37 long rvl = BIO_get_mem_data(bmem,&rvd); 39 long rvl = BIO_get_mem_data(bmem,&rvd);
38 string rv(rvd,rvl); 40 string rv(rvd,rvl);
39 BIO_free_all(b64); 41 BIO_free_all(b64);
40 return rv; 42 return rv;
41 }catch(...) { 43 }catch(...) {
42 if(b64) BIO_free_all(b64); 44 if(b64) BIO_free_all(b64);
43 throw; 45 throw;
44 } 46 }
45 } 47 }
46 48
47 void decode_base64(const string& data,vector<unsigned char>& rv) { 49 void decode_base64(const string& data,vector<unsigned char>& rv) {
48 BIO *b64 = 0, *bmem = 0; 50 BIO *b64 = 0, *bmem = 0;
49 rv.clear(); 51 rv.clear();
50 try { 52 try {
51 bmem = BIO_new_mem_buf((void*)data.data(),data.size()); 53 bmem = BIO_new_mem_buf((void*)data.data(),data.size());
52 if(!bmem) 54 if(!bmem)
53 throw exception_openssl(OPKELE_CP_ "failed to BIO_new_mem_buf()"); 55 throw exception_openssl(OPKELE_CP_ "failed to BIO_new_mem_buf()");
54 b64 = BIO_new(BIO_f_base64()); 56 b64 = BIO_new(BIO_f_base64());
55 if(!b64) 57 if(!b64)
56 throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 decoder"); 58 throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 decoder");
57 BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); 59 BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL);
58 BIO_push(b64,bmem); 60 BIO_push(b64,bmem);
59 unsigned char tmp[512]; 61 unsigned char tmp[512];
60 size_t rb = 0; 62 size_t rb = 0;
61 while((rb=BIO_read(b64,tmp,sizeof(tmp)))>0) 63 while((rb=BIO_read(b64,tmp,sizeof(tmp)))>0)
62 rv.insert(rv.end(),tmp,&tmp[rb]); 64 rv.insert(rv.end(),tmp,&tmp[rb]);
63 BIO_free_all(b64); 65 BIO_free_all(b64);
64 }catch(...) { 66 }catch(...) {
65 if(b64) BIO_free_all(b64); 67 if(b64) BIO_free_all(b64);
66 throw; 68 throw;
67 } 69 }
68 } 70 }
69 71
70 /* 72 /*
71 * big numerics 73 * big numerics
72 */ 74 */
73 75
74 BIGNUM *base64_to_bignum(const string& b64) { 76 BIGNUM *base64_to_bignum(const string& b64) {
75 vector<unsigned char> bin; 77 vector<unsigned char> bin;
76 decode_base64(b64,bin); 78 decode_base64(b64,bin);
77 BIGNUM *rv = BN_bin2bn(&(bin.front()),bin.size(),0); 79 BIGNUM *rv = BN_bin2bn(&(bin.front()),bin.size(),0);
78 if(!rv) 80 if(!rv)
79 throw failed_conversion(OPKELE_CP_ "failed to BN_bin2bn()"); 81 throw failed_conversion(OPKELE_CP_ "failed to BN_bin2bn()");
80 return rv; 82 return rv;
81 } 83 }
82 84
83 BIGNUM *dec_to_bignum(const string& dec) { 85 BIGNUM *dec_to_bignum(const string& dec) {
84 BIGNUM *rv = 0; 86 BIGNUM *rv = 0;
85 if(!BN_dec2bn(&rv,dec.c_str())) 87 if(!BN_dec2bn(&rv,dec.c_str()))
86 throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); 88 throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()");
87 return rv; 89 return rv;
88 } 90 }
89 91
90 string bignum_to_base64(const BIGNUM *bn) { 92 string bignum_to_base64(const BIGNUM *bn) {
91 vector<unsigned char> bin(BN_num_bytes(bn)+1); 93 vector<unsigned char> bin(BN_num_bytes(bn)+1);
92 unsigned char *binptr = &(bin.front())+1; 94 unsigned char *binptr = &(bin.front())+1;
93 int l = BN_bn2bin(bn,binptr); 95 int l = BN_bn2bin(bn,binptr);
94 if(l && (*binptr)&0x80){ 96 if(l && (*binptr)&0x80){
95 (*(--binptr)) = 0; ++l; 97 (*(--binptr)) = 0; ++l;
96 } 98 }
97 return encode_base64(binptr,l); 99 return encode_base64(binptr,l);
98 } 100 }
99 101
100 /* 102 /*
101 * w3c times 103 * w3c times
102 */ 104 */
103 105
104 string time_to_w3c(time_t t) { 106 string time_to_w3c(time_t t) {
105 struct tm tm_t; 107 struct tm tm_t;
106 if(!gmtime_r(&t,&tm_t)) 108 if(!gmtime_r(&t,&tm_t))
107 throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); 109 throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()");
108 char rv[25]; 110 char rv[25];
109 if(!strftime(rv,sizeof(rv)-1,"%Y-%m-%dT%H:%M:%SZ",&tm_t)) 111 if(!strftime(rv,sizeof(rv)-1,"%Y-%m-%dT%H:%M:%SZ",&tm_t))
110 throw failed_conversion(OPKELE_CP_ "failed to strftime()"); 112 throw failed_conversion(OPKELE_CP_ "failed to strftime()");
111 return rv; 113 return rv;
112 } 114 }
113 115
114 time_t w3c_to_time(const string& w) { 116 time_t w3c_to_time(const string& w) {
115 struct tm tm_t; 117 struct tm tm_t;
116 memset(&tm_t,0,sizeof(tm_t)); 118 memset(&tm_t,0,sizeof(tm_t));
117 if( 119 if(
118 sscanf( 120 sscanf(
119 w.c_str(), 121 w.c_str(),
120 "%04d-%02d-%02dT%02d:%02d:%02dZ", 122 "%04d-%02d-%02dT%02d:%02d:%02dZ",
121 &tm_t.tm_year,&tm_t.tm_mon,&tm_t.tm_mday, 123 &tm_t.tm_year,&tm_t.tm_mon,&tm_t.tm_mday,
122 &tm_t.tm_hour,&tm_t.tm_min,&tm_t.tm_sec 124 &tm_t.tm_hour,&tm_t.tm_min,&tm_t.tm_sec
123 ) != 6 ) 125 ) != 6 )
124 throw failed_conversion(OPKELE_CP_ "failed to sscanf()"); 126 throw failed_conversion(OPKELE_CP_ "failed to sscanf()");
125 tm_t.tm_mon--; 127 tm_t.tm_mon--;
126 tm_t.tm_year-=1900; 128 tm_t.tm_year-=1900;
127 time_t rv = mktime(&tm_t); 129 time_t rv = mktime(&tm_t);
128 if(rv==(time_t)-1) 130 if(rv==(time_t)-1)
129 throw failed_conversion(OPKELE_CP_ "failed to mktime()"); 131 throw failed_conversion(OPKELE_CP_ "failed to mktime()");
130 return rv; 132 return rv;
131 } 133 }
132 134
133 /* 135 /*
134 * 136 *
135 */ 137 */
136 138
137 string url_encode(const string& str) { 139 string url_encode(const string& str) {
138 char * t = curl_escape(str.c_str(),str.length()); 140 char * t = curl_escape(str.c_str(),str.length());
139 if(!t) 141 if(!t)
140 throw failed_conversion(OPKELE_CP_ "failed to curl_escape()"); 142 throw failed_conversion(OPKELE_CP_ "failed to curl_escape()");
141 string rv(t); 143 string rv(t);
142 curl_free(t); 144 curl_free(t);
143 return rv; 145 return rv;
144 } 146 }
145 147
146 string long_to_string(long l) { 148 string long_to_string(long l) {
147 char rv[32]; 149 char rv[32];
148 int r=snprintf(rv,sizeof(rv),"%ld",l); 150 int r=snprintf(rv,sizeof(rv),"%ld",l);
149 if(r<0 || r>=(int)sizeof(rv)) 151 if(r<0 || r>=(int)sizeof(rv))
150 throw failed_conversion(OPKELE_CP_ "failed to snprintf()"); 152 throw failed_conversion(OPKELE_CP_ "failed to snprintf()");
151 return rv; 153 return rv;
152 } 154 }
153 155
154 long string_to_long(const string& s) { 156 long string_to_long(const string& s) {
155 char *endptr = 0; 157 char *endptr = 0;
156 long rv = strtol(s.c_str(),&endptr,10); 158 long rv = strtol(s.c_str(),&endptr,10);
157 if((!endptr) || endptr==s.c_str()) 159 if((!endptr) || endptr==s.c_str())
158 throw failed_conversion(OPKELE_CP_ "failed to strtol()"); 160 throw failed_conversion(OPKELE_CP_ "failed to strtol()");
159 return rv; 161 return rv;
160 } 162 }
161 163
164 /*
165 * Normalize URL according to the rules, described in rfc 3986, section 6
166 *
167 * - uppercase hext triplets (e.g. %ab -> %AB)
168 * - lowercase scheme and host
169 * - decode %-encoded characters, specified as unreserved in rfc 3986, section 2.3,
170 * that is - [:alpha:][:digit:]._~-
171 * - remove dot segments
172 * - remove empty and default ports
173 * - if there's no path component, add '/'
174 */
175 string rfc_3986_normalize_uri(const string& uri) {
176 string rv;
177 string::size_type colon = uri.find(':');
178 if(colon==string::npos)
179 throw bad_input(OPKELE_CP_ "No scheme specified in URI");
180 transform(
181 uri.begin(), uri.begin()+colon+1,
182 back_inserter(rv), ::tolower );
183 bool s;
184 if(rv=="http:")
185 s = false;
186 else if(rv=="https:")
187 s = true;
188 else
189 throw not_implemented(OPKELE_CP_ "Only http(s) URIs can be normalized here");
190 string::size_type ul = uri.length();
191 if(ul <= (colon+3))
192 throw bad_input(OPKELE_CP_ "Unexpected end of URI being normalized encountered");
193 if(uri[colon+1]!='/' || uri[colon+2]!='/')
194 throw bad_input(OPKELE_CP_ "Unexpected input in URI being normalized after scheme component");
195 rv += "//";
196 string::size_type interesting = uri.find_first_of(":/#?",colon+3);
197 if(interesting==string::npos) {
198 transform(
199 uri.begin()+colon+3,uri.end(),
200 back_inserter(rv), ::tolower );
201 rv += '/'; return rv;
202 }
203 transform(
204 uri.begin()+colon+3,uri.begin()+interesting,
205 back_inserter(rv), ::tolower );
206 bool qf = false;
207 char ic = uri[interesting];
208 if(ic==':') {
209 string::size_type ni = uri.find_first_of("/#?%",interesting+1);
210 const char *nptr = uri.data()+interesting+1;
211 char *eptr = 0;
212 long port = strtol(nptr,&eptr,10);
213 if( (port>0) && (port<65535) && port!=(s?443:80) ) {
214 char tmp[6];
215 snprintf(tmp,sizeof(tmp),"%d",port);
216 rv += ':'; rv += tmp;
217 }
218 if(ni==string::npos) {
219 rv += '/'; return rv;
220 }
221 interesting = ni;
222 }else if(ic!='/') {
223 rv += '/'; rv += ic;
224 qf = true;
225 ++interesting;
226 }
227 string::size_type n = interesting;
228 char tmp[3] = { 0,0,0 };
229 stack<string::size_type> psegs; psegs.push(rv.length());
230 string pseg;
231 for(;n<ul;) {
232 string::size_type unsafe = uri.find_first_of(qf?"%":"%/?#",n);
233 if(unsafe==string::npos) {
234 pseg.append(uri,n,ul-n-1); n = ul-1;
235 }else{
236 pseg.append(uri,n,unsafe-n);
237 n = unsafe;
238 }
239 char c = uri[n++];
240 if(c=='%') {
241 if((n+1)>=ul)
242 throw bad_input(OPKELE_CP_ "Unexpected end of URI encountered while parsing percent-encoded character");
243 tmp[0] = uri[n++];
244 tmp[1] = uri[n++];
245 if(!( isxdigit(tmp[0]) && isxdigit(tmp[1]) ))
246 throw bad_input(OPKELE_CP_ "Invalid percent-encoded character in URI being normalized");
247 int cc = strtol(tmp,0,16);
248 if( isalpha(cc) || isdigit(cc) || strchr("._~-",cc) )
249 pseg += cc;
250 else{
251 pseg += '%';
252 pseg += toupper(tmp[0]); pseg += toupper(tmp[1]);
253 }
254 }else if(qf) {
255 rv += pseg; rv += c;
256 pseg.clear();
257 }else if(n>=ul || strchr("?/#",c)) {
258 if(pseg.empty() || pseg==".") {
259 }else if(pseg=="..") {
260 if(psegs.size()>1) {
261 rv.resize(psegs.top()); psegs.pop();
262 }
263 }else{
264 psegs.push(rv.length());
265 if(c!='/') {
266 pseg += c;
267 qf = true;
268 }
269 rv += '/'; rv += pseg;
270 }
271 if(c=='/' && (n>=ul || strchr("?#",uri[n])) ) {
272 rv += '/';
273 if(n<ul)
274 qf = true;
275 }else if(strchr("?#",c)) {
276 if(psegs.size()==1 && psegs.top()==rv.length())
277 rv += '/';
278 if(pseg.empty())
279 rv += c;
280 qf = true;
281 }
282 pseg.clear();
283 }else{
284 pseg += c;
285 }
286 }
287 if(!pseg.empty()) {
288 rv += '/'; rv += pseg;
289 }
290 return rv;
291 }
292
162 } 293 }
163 294
164} 295}
diff --git a/test/test.cc b/test/test.cc
index f92284c..1a012b5 100644
--- a/test/test.cc
+++ b/test/test.cc
@@ -1,72 +1,139 @@
1#include <iostream> 1#include <iostream>
2#include <stdexcept> 2#include <stdexcept>
3using namespace std; 3using namespace std;
4#include <opkele/exception.h> 4#include <opkele/exception.h>
5#include <opkele/consumer.h> 5#include <opkele/consumer.h>
6#include <opkele/util.h>
6 7
7#include "config.h" 8#include "config.h"
8 9
9class failed_test : public opkele::exception { 10class failed_test : public opkele::exception {
10 public: 11 public:
11 failed_test(OPKELE_E_PARS) 12 failed_test(OPKELE_E_PARS)
12 : exception(OPKELE_E_CONS) { } 13 : exception(OPKELE_E_CONS) { }
13}; 14};
14 15
15class dummy_consumer_t : public opkele::consumer_t { 16class dummy_consumer_t : public opkele::consumer_t {
16 public: 17 public:
17 virtual opkele::assoc_t store_assoc(const string& /* server */,const string& /* handle */,const opkele::secret_t& /* secret */,int /* expires_in */) { 18 virtual opkele::assoc_t store_assoc(const string& /* server */,const string& /* handle */,const opkele::secret_t& /* secret */,int /* expires_in */) {
18 throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); 19 throw opkele::not_implemented(OPKELE_CP_ "Not implemented");
19 } 20 }
20 virtual opkele::assoc_t retrieve_assoc(const string& /* server */ ,const string& /* handle */) { 21 virtual opkele::assoc_t retrieve_assoc(const string& /* server */ ,const string& /* handle */) {
21 throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); 22 throw opkele::not_implemented(OPKELE_CP_ "Not implemented");
22 } 23 }
23 virtual void invalidate_assoc(const string& /* server */,const string& /* handle */) { 24 virtual void invalidate_assoc(const string& /* server */,const string& /* handle */) {
24 throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); 25 throw opkele::not_implemented(OPKELE_CP_ "Not implemented");
25 } 26 }
26}; 27};
27 28
28 29
29void test_retrieve_links(const string& f,bool success,const string& s="",const string& d="") { 30void test_retrieve_links(const string& f,bool success,const string& s="",const string& d="") {
30 dummy_consumer_t dc; 31 dummy_consumer_t dc;
31 string server, delegate; 32 string server, delegate;
32 try { 33 try {
33 dc.retrieve_links("file://" OPKELE_SRC_DIR "/test/html/"+f,server,delegate); 34 dc.retrieve_links("file://" OPKELE_SRC_DIR "/test/html/"+f,server,delegate);
34 if(!success) 35 if(!success)
35 throw failed_test(OPKELE_CP_ "Retrieved links when it shouldn't"); 36 throw failed_test(OPKELE_CP_ "Retrieved links when it shouldn't");
36 if(server!=s) 37 if(server!=s)
37 throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected server '"+s+"', got '"+server+"'"); 38 throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected server '"+s+"', got '"+server+"'");
38 if(delegate!=d) 39 if(delegate!=d)
39 throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected delegate '"+d+"', got '"+delegate+"'"); 40 throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected delegate '"+d+"', got '"+delegate+"'");
40 }catch(opkele::bad_input& obi) { 41 }catch(opkele::bad_input& obi) {
41 if(success) 42 if(success)
42 throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'bad_input'["+obi.what()+"]"); 43 throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'bad_input'["+obi.what()+"]");
43 }catch(opkele::failed_assertion& ofa) { 44 }catch(opkele::failed_assertion& ofa) {
44 if(success) 45 if(success)
45 throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'failed_assertion'["+ofa.what()+"]"); 46 throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'failed_assertion'["+ofa.what()+"]");
46 } 47 }
47} 48}
48 49
49void test_retrieve_links() { 50void test_retrieve_links() {
50 test_retrieve_links("empty.html",false); 51 test_retrieve_links("empty.html",false);
51 test_retrieve_links("in-body.html",false); 52 test_retrieve_links("in-body.html",false);
52 test_retrieve_links("head-in-body.html",false); 53 test_retrieve_links("head-in-body.html",false);
53 test_retrieve_links("hkn.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); 54 test_retrieve_links("hkn.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/");
54 test_retrieve_links("hkn-server.html",true,"http://www.klever.net/openid.server"); 55 test_retrieve_links("hkn-server.html",true,"http://www.klever.net/openid.server");
55 test_retrieve_links("hkn-delegate.html",false); 56 test_retrieve_links("hkn-delegate.html",false);
56 test_retrieve_links("unclosed-head.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); 57 test_retrieve_links("unclosed-head.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/");
57 test_retrieve_links("spaced-links.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); 58 test_retrieve_links("spaced-links.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/");
58 test_retrieve_links("spaced-link-attrs.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); 59 test_retrieve_links("spaced-link-attrs.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/");
59 test_retrieve_links("2rels.html",true,"http://www.klever.net/openid.server","http://www.klever.net/openid.server"); 60 test_retrieve_links("2rels.html",true,"http://www.klever.net/openid.server","http://www.klever.net/openid.server");
60} 61}
61 62
63void test_rfc_3986_normalize_uri(const string &ouri,bool success,const string& nuri="") {
64 try {
65 string n = opkele::util::rfc_3986_normalize_uri(ouri);
66 if(!success)
67 throw failed_test(OPKELE_CP_ "Normalized URI when it shouldn't");
68 if(n!=nuri)
69 throw failed_test(OPKELE_CP_ "rfc_3986_test_failed for '"+ouri+"' failed, expected '"+nuri+"', got '"+n+"'");
70 }catch(opkele::bad_input& obi) {
71 if(success)
72 throw failed_test(OPKELE_CP_ "Test '"+ouri+"' failed due to 'bad_input'["+obi.what()+"]");
73 }catch(opkele::not_implemented& oni) {
74 if(success)
75 throw failed_test(OPKELE_CP_ "Test '"+ouri+"' failed due to 'not_implemented'["+oni.what()+"]");
76 }
77}
78
79void test_rfc_3986_normalize_uri() {
80 test_rfc_3986_normalize_uri(
81 "invalid", false );
82 test_rfc_3986_normalize_uri(
83 "ftp://hacker.klever.net/", false );
84 test_rfc_3986_normalize_uri(
85 "http://", false );
86 test_rfc_3986_normalize_uri(
87 "http:/hacker.klever.net/", false );
88 test_rfc_3986_normalize_uri(
89 "hTTp://hacker.klever.net#uh?oh", true, "http://hacker.klever.net/#uh?oh" );
90 test_rfc_3986_normalize_uri(
91 "http://hacker.klever.net?uh#oh", true, "http://hacker.klever.net/?uh#oh" );
92 test_rfc_3986_normalize_uri(
93 "http://hacker.klever.net:80/", true, "http://hacker.klever.net/" );
94 test_rfc_3986_normalize_uri(
95 "http://hacker.klever.net:80?uh", true, "http://hacker.klever.net/?uh" );
96 test_rfc_3986_normalize_uri(
97 "http://hacker.klever.net:80#uh", true, "http://hacker.klever.net/#uh" );
98 test_rfc_3986_normalize_uri(
99 "https://hacker.klever.net:443", true, "https://hacker.klever.net/" );
100 test_rfc_3986_normalize_uri(
101 "http://hacker.klever.net:?oh", true, "http://hacker.klever.net/?oh" );
102 test_rfc_3986_normalize_uri(
103 "http://hacker.klever.net/ah%2E", true, "http://hacker.klever.net/ah." );
104 test_rfc_3986_normalize_uri(
105 "http://hacker.klever.net/ah/%2E/", true, "http://hacker.klever.net/ah/" );
106 test_rfc_3986_normalize_uri(
107 "http://hacker.klever.net/ah/%2b/", true, "http://hacker.klever.net/ah/%2B/" );
108 test_rfc_3986_normalize_uri(
109 "http://hacker.klever.net/ah/./oh?eh", true, "http://hacker.klever.net/ah/oh?eh" );
110 test_rfc_3986_normalize_uri(
111 "http://hacker.klever.net/ah/../oh?", true, "http://hacker.klever.net/oh?" );
112 test_rfc_3986_normalize_uri(
113 "http://hacker.klever.net/ah//oh?", true, "http://hacker.klever.net/ah/oh?" );
114 test_rfc_3986_normalize_uri(
115 "http://hacker.klever.net/ah/?", true, "http://hacker.klever.net/ah/?" );
116 test_rfc_3986_normalize_uri(
117 "http://hacker.klever.net/ah/%", false );
118 test_rfc_3986_normalize_uri(
119 "http://hacker.klever.net/ah/%a", false );
120 test_rfc_3986_normalize_uri(
121 "http://hacker.klever.net/ah/%zx", false );
122 test_rfc_3986_normalize_uri(
123 "http://hacker.klever.net/ah/%5x", false );
124 test_rfc_3986_normalize_uri(
125 "Http://Hacker.Klever.Net:", true, "http://hacker.klever.net/" );
126}
127
62int main() { 128int main() {
63 try { 129 try {
130 test_rfc_3986_normalize_uri();
64 test_retrieve_links(); 131 test_retrieve_links();
65 }catch(failed_test& ft) { 132 }catch(failed_test& ft) {
66 cerr << "Test failed: " << ft.what() << endl; 133 cerr << "Test failed: " << ft.what() << endl;
67 }catch(exception& e) { 134 }catch(exception& e) {
68 cerr << "oops: " << e.what() << endl; 135 cerr << "oops: " << e.what() << endl;
69 _exit(1); 136 _exit(1);
70 } 137 }
71 _exit(0); 138 _exit(0);
72} 139}