| Index: net/http/http_auth_handler_negotiate_parse_unittest.cc
|
| diff --git a/net/http/http_auth_handler_negotiate_parse_unittest.cc b/net/http/http_auth_handler_negotiate_parse_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..138c689543190f80b2feda243f2c747396b934bd
|
| --- /dev/null
|
| +++ b/net/http/http_auth_handler_negotiate_parse_unittest.cc
|
| @@ -0,0 +1,78 @@
|
| +// Copyright 2015 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "net/http/http_auth_challenge_tokenizer.h"
|
| +#include "net/http/http_auth_handler_negotiate_parse.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +namespace net {
|
| +
|
| +TEST(HttpAuthHandlerNegotiateParseTest, ParseFirstNegotiateChallenge) {
|
| + // The first round should just consist of an unadorned header with the scheme
|
| + // name.
|
| + std::string challenge_text = "DummyScheme";
|
| + HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
|
| + challenge_text.end());
|
| + EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
|
| + ParseFirstNegotiateChallenge("dummyscheme", &challenge));
|
| +}
|
| +
|
| +TEST(HttpAuthHandlerNegotiateParseTest,
|
| + ParseFirstNegotiateChallenge_UnexpectedToken) {
|
| + // If the first round challenge has an additional authentication token, it
|
| + // should be treated as an invalid challenge from the server.
|
| + std::string challenge_text = "Negotiate Zm9vYmFy";
|
| + HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
|
| + challenge_text.end());
|
| + EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID,
|
| + ParseFirstNegotiateChallenge("negotiate", &challenge));
|
| +}
|
| +
|
| +TEST(HttpAuthHandlerNegotiateParseTest,
|
| + ParseFirstNegotiateChallenge_BadScheme) {
|
| + std::string challenge_text = "DummyScheme";
|
| + HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
|
| + challenge_text.end());
|
| + EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID,
|
| + ParseFirstNegotiateChallenge("negotiate", &challenge));
|
| +}
|
| +
|
| +TEST(HttpAuthHandlerNegotiateParseTest, ParseAnotherNegotiateChallenge) {
|
| + // Later rounds should always have a Base64 encoded token.
|
| + std::string challenge_text = "Negotiate Zm9vYmFy";
|
| + HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
|
| + challenge_text.end());
|
| + std::string encoded_token;
|
| + std::string decoded_token;
|
| + EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
|
| + ParseAnotherNegotiateChallenge("negotiate", &challenge,
|
| + &encoded_token, &decoded_token));
|
| + EXPECT_EQ("Zm9vYmFy", encoded_token);
|
| + EXPECT_EQ("foobar", decoded_token);
|
| +}
|
| +
|
| +TEST(HttpAuthHandlerNegotiateParseTest,
|
| + ParseAnotherNegotiateChallenge_MissingToken) {
|
| + std::string challenge_text = "Negotiate";
|
| + HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
|
| + challenge_text.end());
|
| + std::string encoded_token;
|
| + std::string decoded_token;
|
| + EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_REJECT,
|
| + ParseAnotherNegotiateChallenge("negotiate", &challenge,
|
| + &encoded_token, &decoded_token));
|
| +}
|
| +
|
| +TEST(HttpAuthHandlerNegotiateParseTest,
|
| + ParseAnotherNegotiateChallenge_InvalidToken) {
|
| + std::string challenge_text = "Negotiate ***";
|
| + HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
|
| + challenge_text.end());
|
| + std::string encoded_token;
|
| + std::string decoded_token;
|
| + EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID,
|
| + ParseAnotherNegotiateChallenge("negotiate", &challenge,
|
| + &encoded_token, &decoded_token));
|
| +}
|
| +}
|
|
|