| OLD | NEW |
| (Empty) |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "components/proximity_auth/cryptauth/cryptauth_enroller_impl.h" | |
| 6 | |
| 7 #include "base/bind.h" | |
| 8 #include "base/macros.h" | |
| 9 #include "base/memory/ptr_util.h" | |
| 10 #include "components/proximity_auth/cryptauth/cryptauth_enrollment_utils.h" | |
| 11 #include "components/proximity_auth/cryptauth/fake_secure_message_delegate.h" | |
| 12 #include "components/proximity_auth/cryptauth/mock_cryptauth_client.h" | |
| 13 #include "testing/gtest/include/gtest/gtest.h" | |
| 14 | |
| 15 using ::testing::_; | |
| 16 using ::testing::Return; | |
| 17 | |
| 18 namespace proximity_auth { | |
| 19 | |
| 20 namespace { | |
| 21 | |
| 22 const char kAccessTokenUsed[] = "access token used by CryptAuthClient"; | |
| 23 | |
| 24 const char kClientSessionPublicKey[] = "throw away after one use"; | |
| 25 const char kServerSessionPublicKey[] = "disposables are not eco-friendly"; | |
| 26 | |
| 27 cryptauth::InvocationReason kInvocationReason = | |
| 28 cryptauth::INVOCATION_REASON_MANUAL; | |
| 29 const int kGCMMetadataVersion = 1; | |
| 30 const char kSupportedEnrollmentTypeGcmV1[] = "gcmV1"; | |
| 31 const char kResponseStatusOk[] = "ok"; | |
| 32 const char kResponseStatusNotOk[] = "Your key was too bland."; | |
| 33 const char kEnrollmentSessionId[] = "0123456789876543210"; | |
| 34 const char kFinishEnrollmentError[] = "A hungry router ate all your packets."; | |
| 35 | |
| 36 const char kDeviceId[] = "2015 AD"; | |
| 37 const cryptauth::DeviceType kDeviceType = cryptauth::CHROME; | |
| 38 const char kDeviceOsVersion[] = "41.0.0"; | |
| 39 | |
| 40 // Creates and returns the GcmDeviceInfo message to be uploaded. | |
| 41 cryptauth::GcmDeviceInfo GetDeviceInfo() { | |
| 42 cryptauth::GcmDeviceInfo device_info; | |
| 43 device_info.set_long_device_id(kDeviceId); | |
| 44 device_info.set_device_type(kDeviceType); | |
| 45 device_info.set_device_os_version(kDeviceOsVersion); | |
| 46 return device_info; | |
| 47 } | |
| 48 | |
| 49 // Creates and returns the SetupEnrollmentResponse message to be returned to the | |
| 50 // enroller with the session_. If |success| is false, then a bad response will | |
| 51 // be returned. | |
| 52 cryptauth::SetupEnrollmentResponse GetSetupEnrollmentResponse(bool success) { | |
| 53 cryptauth::SetupEnrollmentResponse response; | |
| 54 if (!success) { | |
| 55 response.set_status(kResponseStatusNotOk); | |
| 56 return response; | |
| 57 } | |
| 58 | |
| 59 response.set_status(kResponseStatusOk); | |
| 60 cryptauth::SetupEnrollmentInfo* info = response.add_infos(); | |
| 61 info->set_type(kSupportedEnrollmentTypeGcmV1); | |
| 62 info->set_enrollment_session_id(kEnrollmentSessionId); | |
| 63 info->set_server_ephemeral_key(kServerSessionPublicKey); | |
| 64 return response; | |
| 65 } | |
| 66 | |
| 67 // Creates and returns the FinishEnrollmentResponse message to be returned to | |
| 68 // the enroller with the session_. If |success| is false, then a bad response | |
| 69 // will be returned. | |
| 70 cryptauth::FinishEnrollmentResponse GetFinishEnrollmentResponse(bool success) { | |
| 71 cryptauth::FinishEnrollmentResponse response; | |
| 72 if (success) { | |
| 73 response.set_status(kResponseStatusOk); | |
| 74 } else { | |
| 75 response.set_status(kResponseStatusNotOk); | |
| 76 response.set_error_message(kFinishEnrollmentError); | |
| 77 } | |
| 78 return response; | |
| 79 } | |
| 80 | |
| 81 // Callback that saves the key returned by SecureMessageDelegate::DeriveKey(). | |
| 82 void SaveDerivedKey(std::string* value_out, const std::string& value) { | |
| 83 *value_out = value; | |
| 84 } | |
| 85 | |
| 86 // Callback that saves the results returned by | |
| 87 // SecureMessageDelegate::UnwrapSecureMessage(). | |
| 88 void SaveUnwrapResults(bool* verified_out, | |
| 89 std::string* payload_out, | |
| 90 securemessage::Header* header_out, | |
| 91 bool verified, | |
| 92 const std::string& payload, | |
| 93 const securemessage::Header& header) { | |
| 94 *verified_out = verified; | |
| 95 *payload_out = payload; | |
| 96 *header_out = header; | |
| 97 } | |
| 98 | |
| 99 } // namespace | |
| 100 | |
| 101 class ProximityAuthCryptAuthEnrollerTest | |
| 102 : public testing::Test, | |
| 103 public MockCryptAuthClientFactory::Observer { | |
| 104 public: | |
| 105 ProximityAuthCryptAuthEnrollerTest() | |
| 106 : client_factory_(new MockCryptAuthClientFactory( | |
| 107 MockCryptAuthClientFactory::MockType::MAKE_NICE_MOCKS)), | |
| 108 secure_message_delegate_(new FakeSecureMessageDelegate()), | |
| 109 enroller_(base::WrapUnique(client_factory_), | |
| 110 base::WrapUnique(secure_message_delegate_)) { | |
| 111 client_factory_->AddObserver(this); | |
| 112 | |
| 113 // This call is actually synchronous. | |
| 114 secure_message_delegate_->GenerateKeyPair( | |
| 115 base::Bind(&ProximityAuthCryptAuthEnrollerTest::OnKeyPairGenerated, | |
| 116 base::Unretained(this))); | |
| 117 } | |
| 118 | |
| 119 // Starts the enroller. | |
| 120 void StartEnroller(const cryptauth::GcmDeviceInfo& device_info) { | |
| 121 secure_message_delegate_->set_next_public_key(kClientSessionPublicKey); | |
| 122 enroller_result_.reset(); | |
| 123 enroller_.Enroll( | |
| 124 user_public_key_, user_private_key_, device_info, kInvocationReason, | |
| 125 base::Bind(&ProximityAuthCryptAuthEnrollerTest::OnEnrollerCompleted, | |
| 126 base::Unretained(this))); | |
| 127 } | |
| 128 | |
| 129 // Verifies that |serialized_message| is a valid SecureMessage sent with the | |
| 130 // FinishEnrollment API call. | |
| 131 void ValidateEnrollmentMessage(const std::string& serialized_message) { | |
| 132 // Derive the session symmetric key. | |
| 133 std::string server_session_private_key = | |
| 134 secure_message_delegate_->GetPrivateKeyForPublicKey( | |
| 135 kServerSessionPublicKey); | |
| 136 std::string symmetric_key; | |
| 137 secure_message_delegate_->DeriveKey( | |
| 138 server_session_private_key, kClientSessionPublicKey, | |
| 139 base::Bind(&SaveDerivedKey, &symmetric_key)); | |
| 140 | |
| 141 std::string inner_message; | |
| 142 std::string inner_payload; | |
| 143 { | |
| 144 // Unwrap the outer message. | |
| 145 bool verified; | |
| 146 securemessage::Header header; | |
| 147 SecureMessageDelegate::UnwrapOptions unwrap_options; | |
| 148 unwrap_options.encryption_scheme = securemessage::AES_256_CBC; | |
| 149 unwrap_options.signature_scheme = securemessage::HMAC_SHA256; | |
| 150 secure_message_delegate_->UnwrapSecureMessage( | |
| 151 serialized_message, symmetric_key, unwrap_options, | |
| 152 base::Bind(&SaveUnwrapResults, &verified, &inner_message, &header)); | |
| 153 EXPECT_TRUE(verified); | |
| 154 | |
| 155 cryptauth::GcmMetadata metadata; | |
| 156 ASSERT_TRUE(metadata.ParseFromString(header.public_metadata())); | |
| 157 EXPECT_EQ(kGCMMetadataVersion, metadata.version()); | |
| 158 EXPECT_EQ(cryptauth::MessageType::ENROLLMENT, metadata.type()); | |
| 159 } | |
| 160 | |
| 161 { | |
| 162 // Unwrap inner message. | |
| 163 bool verified; | |
| 164 securemessage::Header header; | |
| 165 SecureMessageDelegate::UnwrapOptions unwrap_options; | |
| 166 unwrap_options.encryption_scheme = securemessage::NONE; | |
| 167 unwrap_options.signature_scheme = securemessage::ECDSA_P256_SHA256; | |
| 168 secure_message_delegate_->UnwrapSecureMessage( | |
| 169 inner_message, user_public_key_, unwrap_options, | |
| 170 base::Bind(&SaveUnwrapResults, &verified, &inner_payload, &header)); | |
| 171 EXPECT_TRUE(verified); | |
| 172 EXPECT_EQ(user_public_key_, header.verification_key_id()); | |
| 173 } | |
| 174 | |
| 175 // Check that the decrypted GcmDeviceInfo is correct. | |
| 176 cryptauth::GcmDeviceInfo device_info; | |
| 177 ASSERT_TRUE(device_info.ParseFromString(inner_payload)); | |
| 178 EXPECT_EQ(kDeviceId, device_info.long_device_id()); | |
| 179 EXPECT_EQ(kDeviceType, device_info.device_type()); | |
| 180 EXPECT_EQ(kDeviceOsVersion, device_info.device_os_version()); | |
| 181 EXPECT_EQ(user_public_key_, device_info.user_public_key()); | |
| 182 EXPECT_EQ(user_public_key_, device_info.key_handle()); | |
| 183 EXPECT_EQ(kEnrollmentSessionId, device_info.enrollment_session_id()); | |
| 184 } | |
| 185 | |
| 186 protected: | |
| 187 // MockCryptAuthClientFactory::Observer: | |
| 188 void OnCryptAuthClientCreated(MockCryptAuthClient* client) override { | |
| 189 ON_CALL(*client, SetupEnrollment(_, _, _)) | |
| 190 .WillByDefault(Invoke( | |
| 191 this, &ProximityAuthCryptAuthEnrollerTest::OnSetupEnrollment)); | |
| 192 | |
| 193 ON_CALL(*client, FinishEnrollment(_, _, _)) | |
| 194 .WillByDefault(Invoke( | |
| 195 this, &ProximityAuthCryptAuthEnrollerTest::OnFinishEnrollment)); | |
| 196 | |
| 197 ON_CALL(*client, GetAccessTokenUsed()) | |
| 198 .WillByDefault(Return(kAccessTokenUsed)); | |
| 199 } | |
| 200 | |
| 201 void OnKeyPairGenerated(const std::string& public_key, | |
| 202 const std::string& private_key) { | |
| 203 user_public_key_ = public_key; | |
| 204 user_private_key_ = private_key; | |
| 205 } | |
| 206 | |
| 207 void OnEnrollerCompleted(bool success) { | |
| 208 EXPECT_FALSE(enroller_result_.get()); | |
| 209 enroller_result_.reset(new bool(success)); | |
| 210 } | |
| 211 | |
| 212 void OnSetupEnrollment( | |
| 213 const cryptauth::SetupEnrollmentRequest& request, | |
| 214 const CryptAuthClient::SetupEnrollmentCallback& callback, | |
| 215 const CryptAuthClient::ErrorCallback& error_callback) { | |
| 216 // Check that SetupEnrollment is called before FinishEnrollment. | |
| 217 EXPECT_FALSE(setup_request_.get()); | |
| 218 EXPECT_FALSE(finish_request_.get()); | |
| 219 EXPECT_TRUE(setup_callback_.is_null()); | |
| 220 EXPECT_TRUE(error_callback_.is_null()); | |
| 221 | |
| 222 setup_request_.reset(new cryptauth::SetupEnrollmentRequest(request)); | |
| 223 setup_callback_ = callback; | |
| 224 error_callback_ = error_callback; | |
| 225 } | |
| 226 | |
| 227 void OnFinishEnrollment( | |
| 228 const cryptauth::FinishEnrollmentRequest& request, | |
| 229 const CryptAuthClient::FinishEnrollmentCallback& callback, | |
| 230 const CryptAuthClient::ErrorCallback& error_callback) { | |
| 231 // Check that FinishEnrollment is called after SetupEnrollment. | |
| 232 EXPECT_TRUE(setup_request_.get()); | |
| 233 EXPECT_FALSE(finish_request_.get()); | |
| 234 EXPECT_TRUE(finish_callback_.is_null()); | |
| 235 | |
| 236 finish_request_.reset(new cryptauth::FinishEnrollmentRequest(request)); | |
| 237 finish_callback_ = callback; | |
| 238 error_callback_ = error_callback; | |
| 239 } | |
| 240 | |
| 241 // The persistent user key-pair. | |
| 242 std::string user_public_key_; | |
| 243 std::string user_private_key_; | |
| 244 | |
| 245 // Owned by |enroller_|. | |
| 246 MockCryptAuthClientFactory* client_factory_; | |
| 247 // Owned by |enroller_|. | |
| 248 FakeSecureMessageDelegate* secure_message_delegate_; | |
| 249 // The CryptAuthEnroller under test. | |
| 250 CryptAuthEnrollerImpl enroller_; | |
| 251 | |
| 252 // Stores the result of running |enroller_|. | |
| 253 std::unique_ptr<bool> enroller_result_; | |
| 254 | |
| 255 // Stored callbacks and requests for SetupEnrollment and FinishEnrollment. | |
| 256 std::unique_ptr<cryptauth::SetupEnrollmentRequest> setup_request_; | |
| 257 std::unique_ptr<cryptauth::FinishEnrollmentRequest> finish_request_; | |
| 258 CryptAuthClient::SetupEnrollmentCallback setup_callback_; | |
| 259 CryptAuthClient::FinishEnrollmentCallback finish_callback_; | |
| 260 CryptAuthClient::ErrorCallback error_callback_; | |
| 261 | |
| 262 DISALLOW_COPY_AND_ASSIGN(ProximityAuthCryptAuthEnrollerTest); | |
| 263 }; | |
| 264 | |
| 265 TEST_F(ProximityAuthCryptAuthEnrollerTest, EnrollmentSucceeds) { | |
| 266 StartEnroller(GetDeviceInfo()); | |
| 267 | |
| 268 // Handle SetupEnrollment request. | |
| 269 EXPECT_TRUE(setup_request_.get()); | |
| 270 EXPECT_EQ(kInvocationReason, setup_request_->invocation_reason()); | |
| 271 ASSERT_EQ(1, setup_request_->types_size()); | |
| 272 EXPECT_EQ(kSupportedEnrollmentTypeGcmV1, setup_request_->types(0)); | |
| 273 ASSERT_FALSE(setup_callback_.is_null()); | |
| 274 setup_callback_.Run(GetSetupEnrollmentResponse(true)); | |
| 275 | |
| 276 // Handle FinishEnrollment request. | |
| 277 EXPECT_TRUE(finish_request_.get()); | |
| 278 EXPECT_EQ(kEnrollmentSessionId, finish_request_->enrollment_session_id()); | |
| 279 EXPECT_EQ(kClientSessionPublicKey, finish_request_->device_ephemeral_key()); | |
| 280 ValidateEnrollmentMessage(finish_request_->enrollment_message()); | |
| 281 EXPECT_EQ(kInvocationReason, finish_request_->invocation_reason()); | |
| 282 | |
| 283 ASSERT_FALSE(finish_callback_.is_null()); | |
| 284 finish_callback_.Run(GetFinishEnrollmentResponse(true)); | |
| 285 | |
| 286 ASSERT_TRUE(enroller_result_.get()); | |
| 287 EXPECT_TRUE(*enroller_result_); | |
| 288 } | |
| 289 | |
| 290 TEST_F(ProximityAuthCryptAuthEnrollerTest, SetupEnrollmentApiCallError) { | |
| 291 StartEnroller(GetDeviceInfo()); | |
| 292 | |
| 293 EXPECT_TRUE(setup_request_.get()); | |
| 294 ASSERT_FALSE(error_callback_.is_null()); | |
| 295 error_callback_.Run("Setup enrollment failed network"); | |
| 296 | |
| 297 EXPECT_TRUE(finish_callback_.is_null()); | |
| 298 ASSERT_TRUE(enroller_result_.get()); | |
| 299 EXPECT_FALSE(*enroller_result_); | |
| 300 } | |
| 301 | |
| 302 TEST_F(ProximityAuthCryptAuthEnrollerTest, SetupEnrollmentBadStatus) { | |
| 303 StartEnroller(GetDeviceInfo()); | |
| 304 | |
| 305 EXPECT_TRUE(setup_request_.get()); | |
| 306 setup_callback_.Run(GetSetupEnrollmentResponse(false)); | |
| 307 | |
| 308 EXPECT_TRUE(finish_callback_.is_null()); | |
| 309 ASSERT_TRUE(enroller_result_.get()); | |
| 310 EXPECT_FALSE(*enroller_result_); | |
| 311 } | |
| 312 | |
| 313 TEST_F(ProximityAuthCryptAuthEnrollerTest, SetupEnrollmentNoInfosReturned) { | |
| 314 StartEnroller(GetDeviceInfo()); | |
| 315 EXPECT_TRUE(setup_request_.get()); | |
| 316 cryptauth::SetupEnrollmentResponse response; | |
| 317 response.set_status(kResponseStatusOk); | |
| 318 setup_callback_.Run(response); | |
| 319 | |
| 320 EXPECT_TRUE(finish_callback_.is_null()); | |
| 321 ASSERT_TRUE(enroller_result_.get()); | |
| 322 EXPECT_FALSE(*enroller_result_); | |
| 323 } | |
| 324 | |
| 325 TEST_F(ProximityAuthCryptAuthEnrollerTest, FinishEnrollmentApiCallError) { | |
| 326 StartEnroller(GetDeviceInfo()); | |
| 327 setup_callback_.Run(GetSetupEnrollmentResponse(true)); | |
| 328 ASSERT_FALSE(error_callback_.is_null()); | |
| 329 error_callback_.Run("finish enrollment oauth error"); | |
| 330 ASSERT_TRUE(enroller_result_.get()); | |
| 331 EXPECT_FALSE(*enroller_result_); | |
| 332 } | |
| 333 | |
| 334 TEST_F(ProximityAuthCryptAuthEnrollerTest, FinishEnrollmentBadStatus) { | |
| 335 StartEnroller(GetDeviceInfo()); | |
| 336 setup_callback_.Run(GetSetupEnrollmentResponse(true)); | |
| 337 ASSERT_FALSE(finish_callback_.is_null()); | |
| 338 finish_callback_.Run(GetFinishEnrollmentResponse(false)); | |
| 339 ASSERT_TRUE(enroller_result_.get()); | |
| 340 EXPECT_FALSE(*enroller_result_); | |
| 341 } | |
| 342 | |
| 343 TEST_F(ProximityAuthCryptAuthEnrollerTest, ReuseEnroller) { | |
| 344 StartEnroller(GetDeviceInfo()); | |
| 345 setup_callback_.Run(GetSetupEnrollmentResponse(true)); | |
| 346 finish_callback_.Run(GetFinishEnrollmentResponse(true)); | |
| 347 EXPECT_TRUE(*enroller_result_); | |
| 348 | |
| 349 StartEnroller(GetDeviceInfo()); | |
| 350 EXPECT_FALSE(*enroller_result_); | |
| 351 } | |
| 352 | |
| 353 TEST_F(ProximityAuthCryptAuthEnrollerTest, IncompleteDeviceInfo) { | |
| 354 StartEnroller(cryptauth::GcmDeviceInfo()); | |
| 355 ASSERT_TRUE(enroller_result_.get()); | |
| 356 EXPECT_FALSE(*enroller_result_); | |
| 357 } | |
| 358 | |
| 359 } // namespace proximity_auth | |
| OLD | NEW |