OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "remoting/protocol/authenticator_test_base.h" | 5 #include "remoting/protocol/authenticator_test_base.h" |
6 | 6 |
7 #include "base/base64.h" | 7 #include "base/base64.h" |
8 #include "base/file_path.h" | 8 #include "base/file_path.h" |
9 #include "base/file_util.h" | 9 #include "base/file_util.h" |
10 #include "base/path_service.h" | 10 #include "base/path_service.h" |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
49 base::FilePath cert_path = certs_dir.AppendASCII("unittest.selfsigned.der"); | 49 base::FilePath cert_path = certs_dir.AppendASCII("unittest.selfsigned.der"); |
50 ASSERT_TRUE(file_util::ReadFileToString(cert_path, &host_cert_)); | 50 ASSERT_TRUE(file_util::ReadFileToString(cert_path, &host_cert_)); |
51 | 51 |
52 base::FilePath key_path = certs_dir.AppendASCII("unittest.key.bin"); | 52 base::FilePath key_path = certs_dir.AppendASCII("unittest.key.bin"); |
53 std::string key_string; | 53 std::string key_string; |
54 ASSERT_TRUE(file_util::ReadFileToString(key_path, &key_string)); | 54 ASSERT_TRUE(file_util::ReadFileToString(key_path, &key_string)); |
55 std::string key_base64; | 55 std::string key_base64; |
56 base::Base64Encode(key_string, &key_base64); | 56 base::Base64Encode(key_string, &key_base64); |
57 key_pair_ = new RsaKeyPair(); | 57 key_pair_ = new RsaKeyPair(); |
58 key_pair_->LoadFromString(key_base64); | 58 key_pair_->LoadFromString(key_base64); |
| 59 host_public_key_ = key_pair_->GetPublicKey(); |
59 } | 60 } |
60 | 61 |
61 void AuthenticatorTestBase::RunAuthExchange() { | 62 void AuthenticatorTestBase::RunAuthExchange() { |
62 do { | 63 ContinueAuthExchangeWith(client_.get(), host_.get()); |
63 scoped_ptr<buzz::XmlElement> message; | 64 } |
64 | 65 |
65 // Pass message from client to host. | 66 // static |
66 ASSERT_EQ(Authenticator::MESSAGE_READY, client_->state()); | 67 void AuthenticatorTestBase::ContinueAuthExchangeWith(Authenticator* sender, |
67 message = client_->GetNextMessage(); | 68 Authenticator* receiver) { |
68 ASSERT_TRUE(message.get()); | 69 scoped_ptr<buzz::XmlElement> message; |
69 ASSERT_NE(Authenticator::MESSAGE_READY, client_->state()); | 70 ASSERT_NE(Authenticator::WAITING_MESSAGE, sender->state()); |
| 71 if (sender->state() == Authenticator::ACCEPTED || |
| 72 sender->state() == Authenticator::REJECTED) |
| 73 return; |
| 74 // Pass message from client to host. |
| 75 ASSERT_EQ(Authenticator::MESSAGE_READY, sender->state()); |
| 76 message = sender->GetNextMessage(); |
| 77 ASSERT_TRUE(message.get()); |
| 78 ASSERT_NE(Authenticator::MESSAGE_READY, sender->state()); |
70 | 79 |
71 ASSERT_EQ(Authenticator::WAITING_MESSAGE, host_->state()); | 80 ASSERT_EQ(Authenticator::WAITING_MESSAGE, receiver->state()); |
72 host_->ProcessMessage(message.get()); | 81 receiver->ProcessMessage(message.get(), base::Bind( |
73 ASSERT_NE(Authenticator::WAITING_MESSAGE, host_->state()); | 82 &AuthenticatorTestBase::ContinueAuthExchangeWith, |
74 | 83 base::Unretained(receiver), base::Unretained(sender))); |
75 // Are we done yet? | |
76 if (host_->state() == Authenticator::ACCEPTED || | |
77 host_->state() == Authenticator::REJECTED) { | |
78 break; | |
79 } | |
80 | |
81 // Pass message from host to client. | |
82 ASSERT_EQ(Authenticator::MESSAGE_READY, host_->state()); | |
83 message = host_->GetNextMessage(); | |
84 ASSERT_TRUE(message.get()); | |
85 ASSERT_NE(Authenticator::MESSAGE_READY, host_->state()); | |
86 | |
87 ASSERT_EQ(Authenticator::WAITING_MESSAGE, client_->state()); | |
88 client_->ProcessMessage(message.get()); | |
89 ASSERT_NE(Authenticator::WAITING_MESSAGE, client_->state()); | |
90 } while (client_->state() != Authenticator::ACCEPTED && | |
91 client_->state() != Authenticator::REJECTED); | |
92 } | 84 } |
93 | 85 |
94 void AuthenticatorTestBase::RunChannelAuth(bool expected_fail) { | 86 void AuthenticatorTestBase::RunChannelAuth(bool expected_fail) { |
95 client_fake_socket_.reset(new FakeSocket()); | 87 client_fake_socket_.reset(new FakeSocket()); |
96 host_fake_socket_.reset(new FakeSocket()); | 88 host_fake_socket_.reset(new FakeSocket()); |
97 client_fake_socket_->PairWith(host_fake_socket_.get()); | 89 client_fake_socket_->PairWith(host_fake_socket_.get()); |
98 | 90 |
99 client_auth_->SecureAndAuthenticate( | 91 client_auth_->SecureAndAuthenticate( |
100 client_fake_socket_.PassAs<net::StreamSocket>(), | 92 client_fake_socket_.PassAs<net::StreamSocket>(), |
101 base::Bind(&AuthenticatorTestBase::OnClientConnected, | 93 base::Bind(&AuthenticatorTestBase::OnClientConnected, |
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
146 | 138 |
147 void AuthenticatorTestBase::OnClientConnected( | 139 void AuthenticatorTestBase::OnClientConnected( |
148 net::Error error, | 140 net::Error error, |
149 scoped_ptr<net::StreamSocket> socket) { | 141 scoped_ptr<net::StreamSocket> socket) { |
150 client_callback_.OnDone(error); | 142 client_callback_.OnDone(error); |
151 client_socket_ = socket.Pass(); | 143 client_socket_ = socket.Pass(); |
152 } | 144 } |
153 | 145 |
154 } // namespace protocol | 146 } // namespace protocol |
155 } // namespace remoting | 147 } // namespace remoting |
OLD | NEW |