OLD | NEW |
| (Empty) |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "remoting/protocol/spake2_authenticator.h" | |
6 | |
7 #include "base/bind.h" | |
8 #include "base/macros.h" | |
9 #include "remoting/base/rsa_key_pair.h" | |
10 #include "remoting/protocol/authenticator_test_base.h" | |
11 #include "remoting/protocol/channel_authenticator.h" | |
12 #include "remoting/protocol/connection_tester.h" | |
13 #include "testing/gmock/include/gmock/gmock.h" | |
14 #include "testing/gtest/include/gtest/gtest.h" | |
15 #include "third_party/webrtc/libjingle/xmllite/xmlelement.h" | |
16 | |
17 using testing::_; | |
18 using testing::DeleteArg; | |
19 using testing::SaveArg; | |
20 | |
21 namespace remoting { | |
22 namespace protocol { | |
23 | |
24 namespace { | |
25 | |
26 const int kMessageSize = 100; | |
27 const int kMessages = 1; | |
28 | |
29 const char kClientId[] = "alice@gmail.com/abc"; | |
30 const char kHostId[] = "alice@gmail.com/123"; | |
31 | |
32 const char kTestSharedSecret[] = "1234-1234-5678"; | |
33 const char kTestSharedSecretBad[] = "0000-0000-0001"; | |
34 | |
35 } // namespace | |
36 | |
37 class Spake2AuthenticatorTest : public AuthenticatorTestBase { | |
38 public: | |
39 Spake2AuthenticatorTest() {} | |
40 ~Spake2AuthenticatorTest() override {} | |
41 | |
42 protected: | |
43 void InitAuthenticators(const std::string& client_secret, | |
44 const std::string& host_secret) { | |
45 host_ = Spake2Authenticator::CreateForHost(kHostId, kClientId, host_secret, | |
46 host_cert_, key_pair_, | |
47 Authenticator::WAITING_MESSAGE); | |
48 client_ = Spake2Authenticator::CreateForClient( | |
49 kClientId, kHostId, client_secret, Authenticator::MESSAGE_READY); | |
50 } | |
51 | |
52 DISALLOW_COPY_AND_ASSIGN(Spake2AuthenticatorTest); | |
53 }; | |
54 | |
55 TEST_F(Spake2AuthenticatorTest, SuccessfulAuth) { | |
56 ASSERT_NO_FATAL_FAILURE( | |
57 InitAuthenticators(kTestSharedSecret, kTestSharedSecret)); | |
58 ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); | |
59 | |
60 ASSERT_EQ(Authenticator::ACCEPTED, host_->state()); | |
61 ASSERT_EQ(Authenticator::ACCEPTED, client_->state()); | |
62 | |
63 client_auth_ = client_->CreateChannelAuthenticator(); | |
64 host_auth_ = host_->CreateChannelAuthenticator(); | |
65 RunChannelAuth(false); | |
66 | |
67 StreamConnectionTester tester(host_socket_.get(), client_socket_.get(), | |
68 kMessageSize, kMessages); | |
69 | |
70 tester.Start(); | |
71 message_loop_.Run(); | |
72 tester.CheckResults(); | |
73 } | |
74 | |
75 // Verify that connection is rejected when secrets don't match. | |
76 TEST_F(Spake2AuthenticatorTest, InvalidSecret) { | |
77 ASSERT_NO_FATAL_FAILURE( | |
78 InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret)); | |
79 ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); | |
80 | |
81 ASSERT_EQ(Authenticator::REJECTED, client_->state()); | |
82 ASSERT_EQ(Authenticator::INVALID_CREDENTIALS, client_->rejection_reason()); | |
83 | |
84 // Change |client_| so that we can get the last message. | |
85 reinterpret_cast<Spake2Authenticator*>(client_.get())->state_ = | |
86 Authenticator::MESSAGE_READY; | |
87 | |
88 scoped_ptr<buzz::XmlElement> message(client_->GetNextMessage()); | |
89 ASSERT_TRUE(message.get()); | |
90 | |
91 ASSERT_EQ(Authenticator::WAITING_MESSAGE, client_->state()); | |
92 host_->ProcessMessage(message.get(), base::Bind(&base::DoNothing)); | |
93 // This assumes that Spake2Authenticator::ProcessMessage runs synchronously. | |
94 ASSERT_EQ(Authenticator::REJECTED, host_->state()); | |
95 } | |
96 | |
97 } // namespace protocol | |
98 } // namespace remoting | |
OLD | NEW |