| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "remoting/protocol/v2_authenticator.h" | 5 #include "remoting/protocol/spake2_authenticator.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | 7 #include "base/bind.h" |
| 8 #include "base/macros.h" | 8 #include "base/macros.h" |
| 9 #include "net/base/net_errors.h" | |
| 10 #include "remoting/base/rsa_key_pair.h" | 9 #include "remoting/base/rsa_key_pair.h" |
| 11 #include "remoting/protocol/authenticator_test_base.h" | 10 #include "remoting/protocol/authenticator_test_base.h" |
| 12 #include "remoting/protocol/channel_authenticator.h" | 11 #include "remoting/protocol/channel_authenticator.h" |
| 13 #include "remoting/protocol/connection_tester.h" | 12 #include "remoting/protocol/connection_tester.h" |
| 14 #include "testing/gmock/include/gmock/gmock.h" | 13 #include "testing/gmock/include/gmock/gmock.h" |
| 15 #include "testing/gtest/include/gtest/gtest.h" | 14 #include "testing/gtest/include/gtest/gtest.h" |
| 16 #include "third_party/webrtc/libjingle/xmllite/xmlelement.h" | 15 #include "third_party/webrtc/libjingle/xmllite/xmlelement.h" |
| 17 | 16 |
| 18 using testing::_; | 17 using testing::_; |
| 19 using testing::DeleteArg; | 18 using testing::DeleteArg; |
| 20 using testing::SaveArg; | 19 using testing::SaveArg; |
| 21 | 20 |
| 22 namespace remoting { | 21 namespace remoting { |
| 23 namespace protocol { | 22 namespace protocol { |
| 24 | 23 |
| 25 namespace { | 24 namespace { |
| 26 | 25 |
| 27 const int kMessageSize = 100; | 26 const int kMessageSize = 100; |
| 28 const int kMessages = 1; | 27 const int kMessages = 1; |
| 29 | 28 |
| 29 const char kClientId[] = "alice@gmail.com/abc"; |
| 30 const char kHostId[] = "alice@gmail.com/123"; |
| 31 |
| 30 const char kTestSharedSecret[] = "1234-1234-5678"; | 32 const char kTestSharedSecret[] = "1234-1234-5678"; |
| 31 const char kTestSharedSecretBad[] = "0000-0000-0001"; | 33 const char kTestSharedSecretBad[] = "0000-0000-0001"; |
| 32 | 34 |
| 33 } // namespace | 35 } // namespace |
| 34 | 36 |
| 35 class V2AuthenticatorTest : public AuthenticatorTestBase { | 37 class Spake2AuthenticatorTest : public AuthenticatorTestBase { |
| 36 public: | 38 public: |
| 37 V2AuthenticatorTest() { | 39 Spake2AuthenticatorTest() {} |
| 38 } | 40 ~Spake2AuthenticatorTest() override {} |
| 39 ~V2AuthenticatorTest() override {} | |
| 40 | 41 |
| 41 protected: | 42 protected: |
| 42 void InitAuthenticators(const std::string& client_secret, | 43 void InitAuthenticators(const std::string& client_secret, |
| 43 const std::string& host_secret) { | 44 const std::string& host_secret) { |
| 44 host_ = V2Authenticator::CreateForHost( | 45 host_ = Spake2Authenticator::CreateForHost(kHostId, kClientId, host_secret, |
| 45 host_cert_, key_pair_, host_secret, | 46 host_cert_, key_pair_, |
| 46 Authenticator::WAITING_MESSAGE); | 47 Authenticator::WAITING_MESSAGE); |
| 47 client_ = V2Authenticator::CreateForClient( | 48 client_ = Spake2Authenticator::CreateForClient( |
| 48 client_secret, Authenticator::MESSAGE_READY); | 49 kClientId, kHostId, client_secret, Authenticator::MESSAGE_READY); |
| 49 } | 50 } |
| 50 | 51 |
| 51 DISALLOW_COPY_AND_ASSIGN(V2AuthenticatorTest); | 52 DISALLOW_COPY_AND_ASSIGN(Spake2AuthenticatorTest); |
| 52 }; | 53 }; |
| 53 | 54 |
| 54 TEST_F(V2AuthenticatorTest, SuccessfulAuth) { | 55 TEST_F(Spake2AuthenticatorTest, SuccessfulAuth) { |
| 55 ASSERT_NO_FATAL_FAILURE( | 56 ASSERT_NO_FATAL_FAILURE( |
| 56 InitAuthenticators(kTestSharedSecret, kTestSharedSecret)); | 57 InitAuthenticators(kTestSharedSecret, kTestSharedSecret)); |
| 57 ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); | 58 ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); |
| 58 | 59 |
| 59 ASSERT_EQ(Authenticator::ACCEPTED, host_->state()); | 60 ASSERT_EQ(Authenticator::ACCEPTED, host_->state()); |
| 60 ASSERT_EQ(Authenticator::ACCEPTED, client_->state()); | 61 ASSERT_EQ(Authenticator::ACCEPTED, client_->state()); |
| 61 | 62 |
| 62 client_auth_ = client_->CreateChannelAuthenticator(); | 63 client_auth_ = client_->CreateChannelAuthenticator(); |
| 63 host_auth_ = host_->CreateChannelAuthenticator(); | 64 host_auth_ = host_->CreateChannelAuthenticator(); |
| 64 RunChannelAuth(false); | 65 RunChannelAuth(false); |
| 65 | 66 |
| 66 StreamConnectionTester tester(host_socket_.get(), client_socket_.get(), | 67 StreamConnectionTester tester(host_socket_.get(), client_socket_.get(), |
| 67 kMessageSize, kMessages); | 68 kMessageSize, kMessages); |
| 68 | 69 |
| 69 tester.Start(); | 70 tester.Start(); |
| 70 message_loop_.Run(); | 71 message_loop_.Run(); |
| 71 tester.CheckResults(); | 72 tester.CheckResults(); |
| 72 } | 73 } |
| 73 | 74 |
| 74 // Verify that connection is rejected when secrets don't match. | 75 // Verify that connection is rejected when secrets don't match. |
| 75 TEST_F(V2AuthenticatorTest, InvalidSecret) { | 76 TEST_F(Spake2AuthenticatorTest, InvalidSecret) { |
| 76 ASSERT_NO_FATAL_FAILURE( | 77 ASSERT_NO_FATAL_FAILURE( |
| 77 InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret)); | 78 InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret)); |
| 78 ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); | 79 ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); |
| 79 | 80 |
| 80 ASSERT_EQ(Authenticator::REJECTED, client_->state()); | 81 ASSERT_EQ(Authenticator::REJECTED, client_->state()); |
| 82 ASSERT_EQ(Authenticator::INVALID_CREDENTIALS, client_->rejection_reason()); |
| 81 | 83 |
| 82 // Change |client_| so that we can get the last message. | 84 // Change |client_| so that we can get the last message. |
| 83 reinterpret_cast<V2Authenticator*>(client_.get())->state_ = | 85 reinterpret_cast<Spake2Authenticator*>(client_.get())->state_ = |
| 84 Authenticator::MESSAGE_READY; | 86 Authenticator::MESSAGE_READY; |
| 85 | 87 |
| 86 scoped_ptr<buzz::XmlElement> message(client_->GetNextMessage()); | 88 scoped_ptr<buzz::XmlElement> message(client_->GetNextMessage()); |
| 87 ASSERT_TRUE(message.get()); | 89 ASSERT_TRUE(message.get()); |
| 88 | 90 |
| 89 ASSERT_EQ(Authenticator::WAITING_MESSAGE, client_->state()); | 91 ASSERT_EQ(Authenticator::WAITING_MESSAGE, client_->state()); |
| 90 host_->ProcessMessage(message.get(), base::Bind(&base::DoNothing)); | 92 host_->ProcessMessage(message.get(), base::Bind(&base::DoNothing)); |
| 91 // This assumes that V2Authenticator::ProcessMessage runs synchronously. | 93 // This assumes that Spake2Authenticator::ProcessMessage runs synchronously. |
| 92 ASSERT_EQ(Authenticator::REJECTED, host_->state()); | 94 ASSERT_EQ(Authenticator::REJECTED, host_->state()); |
| 93 } | 95 } |
| 94 | 96 |
| 95 } // namespace protocol | 97 } // namespace protocol |
| 96 } // namespace remoting | 98 } // namespace remoting |
| OLD | NEW |