OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/http/http_auth_gssapi_posix.h" | 5 #include "net/http/http_auth_gssapi_posix.h" |
6 | 6 |
7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
8 #include "base/logging.h" | 8 #include "base/logging.h" |
9 #include "base/memory/scoped_ptr.h" | 9 #include "base/memory/scoped_ptr.h" |
10 #include "base/native_library.h" | 10 #include "base/native_library.h" |
11 #include "net/base/net_errors.h" | 11 #include "net/base/net_errors.h" |
12 #include "net/http/http_auth_challenge_tokenizer.h" | 12 #include "net/http/http_auth_challenge_tokenizer.h" |
13 #include "net/http/mock_gssapi_library_posix.h" | 13 #include "net/http/mock_gssapi_library_posix.h" |
14 #include "testing/gtest/include/gtest/gtest.h" | 14 #include "testing/gtest/include/gtest/gtest.h" |
15 | 15 |
16 namespace net { | 16 namespace net { |
17 | 17 |
18 namespace { | 18 namespace { |
19 | 19 |
20 // gss_buffer_t helpers. | 20 // gss_buffer_t helpers. |
21 void ClearBuffer(gss_buffer_t dest) { | 21 void ClearBuffer(gss_buffer_t dest) { |
22 if (!dest) | 22 if (!dest) |
23 return; | 23 return; |
24 dest->length = 0; | 24 dest->length = 0; |
25 delete [] reinterpret_cast<char*>(dest->value); | 25 delete[] reinterpret_cast<char*>(dest->value); |
26 dest->value = NULL; | 26 dest->value = NULL; |
27 } | 27 } |
28 | 28 |
29 void SetBuffer(gss_buffer_t dest, const void* src, size_t length) { | 29 void SetBuffer(gss_buffer_t dest, const void* src, size_t length) { |
30 if (!dest) | 30 if (!dest) |
31 return; | 31 return; |
32 ClearBuffer(dest); | 32 ClearBuffer(dest); |
33 if (!src) | 33 if (!src) |
34 return; | 34 return; |
35 dest->length = length; | 35 dest->length = length; |
36 if (length) { | 36 if (length) { |
37 dest->value = new char[length]; | 37 dest->value = new char[length]; |
38 memcpy(dest->value, src, length); | 38 memcpy(dest->value, src, length); |
39 } | 39 } |
40 } | 40 } |
41 | 41 |
42 void CopyBuffer(gss_buffer_t dest, const gss_buffer_t src) { | 42 void CopyBuffer(gss_buffer_t dest, const gss_buffer_t src) { |
43 if (!dest) | 43 if (!dest) |
44 return; | 44 return; |
45 ClearBuffer(dest); | 45 ClearBuffer(dest); |
46 if (!src) | 46 if (!src) |
47 return; | 47 return; |
48 SetBuffer(dest, src->value, src->length); | 48 SetBuffer(dest, src->value, src->length); |
49 } | 49 } |
50 | 50 |
51 const char kInitialAuthResponse[] = "Mary had a little lamb"; | 51 const char kInitialAuthResponse[] = "Mary had a little lamb"; |
52 | 52 |
53 void EstablishInitialContext(test::MockGSSAPILibrary* library) { | 53 void EstablishInitialContext(test::MockGSSAPILibrary* library) { |
54 test::GssContextMockImpl context_info( | 54 test::GssContextMockImpl context_info( |
55 "localhost", // Source name | 55 "localhost", // Source name |
56 "example.com", // Target name | 56 "example.com", // Target name |
57 23, // Lifetime | 57 23, // Lifetime |
58 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism | 58 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism |
59 0, // Context flags | 59 0, // Context flags |
60 1, // Locally initiated | 60 1, // Locally initiated |
61 0); // Open | 61 0); // Open |
62 gss_buffer_desc in_buffer = {0, NULL}; | 62 gss_buffer_desc in_buffer = {0, NULL}; |
63 gss_buffer_desc out_buffer = {arraysize(kInitialAuthResponse), | 63 gss_buffer_desc out_buffer = {arraysize(kInitialAuthResponse), |
64 const_cast<char*>(kInitialAuthResponse)}; | 64 const_cast<char*>(kInitialAuthResponse)}; |
65 library->ExpectSecurityContext( | 65 library->ExpectSecurityContext("Negotiate", |
66 "Negotiate", | 66 GSS_S_CONTINUE_NEEDED, |
67 GSS_S_CONTINUE_NEEDED, | 67 0, |
68 0, | 68 context_info, |
69 context_info, | 69 in_buffer, |
70 in_buffer, | 70 out_buffer); |
71 out_buffer); | |
72 } | 71 } |
73 | 72 |
74 } // namespace | 73 } // namespace |
75 | 74 |
76 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPIStartup) { | 75 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPIStartup) { |
77 // TODO(ahendrickson): Manipulate the libraries and paths to test each of the | 76 // TODO(ahendrickson): Manipulate the libraries and paths to test each of the |
78 // libraries we expect, and also whether or not they have the interface | 77 // libraries we expect, and also whether or not they have the interface |
79 // functions we want. | 78 // functions we want. |
80 scoped_ptr<GSSAPILibrary> gssapi(new GSSAPISharedLibrary(std::string())); | 79 scoped_ptr<GSSAPILibrary> gssapi(new GSSAPISharedLibrary(std::string())); |
81 DCHECK(gssapi.get()); | 80 DCHECK(gssapi.get()); |
82 EXPECT_TRUE(gssapi.get()->Init()); | 81 EXPECT_TRUE(gssapi.get()->Init()); |
83 } | 82 } |
84 | 83 |
85 #if defined(DLOPEN_KERBEROS) | 84 #if defined(DLOPEN_KERBEROS) |
86 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPILoadCustomLibrary) { | 85 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPILoadCustomLibrary) { |
87 scoped_ptr<GSSAPILibrary> gssapi( | 86 scoped_ptr<GSSAPILibrary> gssapi( |
88 new GSSAPISharedLibrary("/this/library/does/not/exist")); | 87 new GSSAPISharedLibrary("/this/library/does/not/exist")); |
89 EXPECT_FALSE(gssapi.get()->Init()); | 88 EXPECT_FALSE(gssapi.get()->Init()); |
90 } | 89 } |
91 #endif // defined(DLOPEN_KERBEROS) | 90 #endif // defined(DLOPEN_KERBEROS) |
92 | 91 |
93 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPICycle) { | 92 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPICycle) { |
94 scoped_ptr<test::MockGSSAPILibrary> mock_library(new test::MockGSSAPILibrary); | 93 scoped_ptr<test::MockGSSAPILibrary> mock_library(new test::MockGSSAPILibrary); |
95 DCHECK(mock_library.get()); | 94 DCHECK(mock_library.get()); |
96 mock_library->Init(); | 95 mock_library->Init(); |
97 const char kAuthResponse[] = "Mary had a little lamb"; | 96 const char kAuthResponse[] = "Mary had a little lamb"; |
98 test::GssContextMockImpl context1( | 97 test::GssContextMockImpl context1( |
99 "localhost", // Source name | 98 "localhost", // Source name |
100 "example.com", // Target name | 99 "example.com", // Target name |
101 23, // Lifetime | 100 23, // Lifetime |
102 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism | 101 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism |
103 0, // Context flags | 102 0, // Context flags |
104 1, // Locally initiated | 103 1, // Locally initiated |
105 0); // Open | 104 0); // Open |
106 test::GssContextMockImpl context2( | 105 test::GssContextMockImpl context2( |
107 "localhost", // Source name | 106 "localhost", // Source name |
108 "example.com", // Target name | 107 "example.com", // Target name |
109 23, // Lifetime | 108 23, // Lifetime |
110 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism | 109 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism |
111 0, // Context flags | 110 0, // Context flags |
112 1, // Locally initiated | 111 1, // Locally initiated |
113 1); // Open | 112 1); // Open |
114 test::MockGSSAPILibrary::SecurityContextQuery queries[] = { | 113 test::MockGSSAPILibrary::SecurityContextQuery queries[] = { |
115 test::MockGSSAPILibrary::SecurityContextQuery( | 114 test::MockGSSAPILibrary::SecurityContextQuery( |
116 "Negotiate", // Package name | 115 "Negotiate", // Package name |
117 GSS_S_CONTINUE_NEEDED, // Major response code | 116 GSS_S_CONTINUE_NEEDED, // Major response code |
118 0, // Minor response code | 117 0, // Minor response code |
119 context1, // Context | 118 context1, // Context |
120 NULL, // Expected input token | 119 NULL, // Expected input token |
121 kAuthResponse), // Output token | 120 kAuthResponse), // Output token |
122 test::MockGSSAPILibrary::SecurityContextQuery( | 121 test::MockGSSAPILibrary::SecurityContextQuery( |
123 "Negotiate", // Package name | 122 "Negotiate", // Package name |
124 GSS_S_COMPLETE, // Major response code | 123 GSS_S_COMPLETE, // Major response code |
125 0, // Minor response code | 124 0, // Minor response code |
126 context2, // Context | 125 context2, // Context |
127 kAuthResponse, // Expected input token | 126 kAuthResponse, // Expected input token |
128 kAuthResponse) // Output token | 127 kAuthResponse) // Output token |
129 }; | 128 }; |
130 | 129 |
131 for (size_t i = 0; i < arraysize(queries); ++i) { | 130 for (size_t i = 0; i < arraysize(queries); ++i) { |
132 mock_library->ExpectSecurityContext(queries[i].expected_package, | 131 mock_library->ExpectSecurityContext(queries[i].expected_package, |
133 queries[i].response_code, | 132 queries[i].response_code, |
134 queries[i].minor_response_code, | 133 queries[i].minor_response_code, |
135 queries[i].context_info, | 134 queries[i].context_info, |
136 queries[i].expected_input_token, | 135 queries[i].expected_input_token, |
137 queries[i].output_token); | 136 queries[i].output_token); |
138 } | 137 } |
139 | 138 |
140 OM_uint32 major_status = 0; | 139 OM_uint32 major_status = 0; |
141 OM_uint32 minor_status = 0; | 140 OM_uint32 minor_status = 0; |
142 gss_cred_id_t initiator_cred_handle = NULL; | 141 gss_cred_id_t initiator_cred_handle = NULL; |
143 gss_ctx_id_t context_handle = NULL; | 142 gss_ctx_id_t context_handle = NULL; |
144 gss_name_t target_name = NULL; | 143 gss_name_t target_name = NULL; |
145 gss_OID mech_type = NULL; | 144 gss_OID mech_type = NULL; |
146 OM_uint32 req_flags = 0; | 145 OM_uint32 req_flags = 0; |
147 OM_uint32 time_req = 25; | 146 OM_uint32 time_req = 25; |
148 gss_channel_bindings_t input_chan_bindings = NULL; | 147 gss_channel_bindings_t input_chan_bindings = NULL; |
149 gss_buffer_desc input_token = { 0, NULL }; | 148 gss_buffer_desc input_token = {0, NULL}; |
150 gss_OID actual_mech_type= NULL; | 149 gss_OID actual_mech_type = NULL; |
151 gss_buffer_desc output_token = { 0, NULL }; | 150 gss_buffer_desc output_token = {0, NULL}; |
152 OM_uint32 ret_flags = 0; | 151 OM_uint32 ret_flags = 0; |
153 OM_uint32 time_rec = 0; | 152 OM_uint32 time_rec = 0; |
154 for (size_t i = 0; i < arraysize(queries); ++i) { | 153 for (size_t i = 0; i < arraysize(queries); ++i) { |
155 major_status = mock_library->init_sec_context(&minor_status, | 154 major_status = mock_library->init_sec_context(&minor_status, |
156 initiator_cred_handle, | 155 initiator_cred_handle, |
157 &context_handle, | 156 &context_handle, |
158 target_name, | 157 target_name, |
159 mech_type, | 158 mech_type, |
160 req_flags, | 159 req_flags, |
161 time_req, | 160 time_req, |
162 input_chan_bindings, | 161 input_chan_bindings, |
163 &input_token, | 162 &input_token, |
164 &actual_mech_type, | 163 &actual_mech_type, |
165 &output_token, | 164 &output_token, |
166 &ret_flags, | 165 &ret_flags, |
167 &time_rec); | 166 &time_rec); |
168 EXPECT_EQ(queries[i].response_code, major_status); | 167 EXPECT_EQ(queries[i].response_code, major_status); |
169 CopyBuffer(&input_token, &output_token); | 168 CopyBuffer(&input_token, &output_token); |
170 ClearBuffer(&output_token); | 169 ClearBuffer(&output_token); |
171 } | 170 } |
172 ClearBuffer(&input_token); | 171 ClearBuffer(&input_token); |
173 major_status = mock_library->delete_sec_context(&minor_status, | 172 major_status = mock_library->delete_sec_context( |
174 &context_handle, | 173 &minor_status, &context_handle, GSS_C_NO_BUFFER); |
175 GSS_C_NO_BUFFER); | |
176 EXPECT_EQ(static_cast<OM_uint32>(GSS_S_COMPLETE), major_status); | 174 EXPECT_EQ(static_cast<OM_uint32>(GSS_S_COMPLETE), major_status); |
177 } | 175 } |
178 | 176 |
179 TEST(HttpAuthGSSAPITest, ParseChallenge_FirstRound) { | 177 TEST(HttpAuthGSSAPITest, ParseChallenge_FirstRound) { |
180 // The first round should just consist of an unadorned "Negotiate" header. | 178 // The first round should just consist of an unadorned "Negotiate" header. |
181 test::MockGSSAPILibrary mock_library; | 179 test::MockGSSAPILibrary mock_library; |
182 HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", | 180 HttpAuthGSSAPI auth_gssapi( |
183 CHROME_GSS_SPNEGO_MECH_OID_DESC); | 181 &mock_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC); |
184 std::string challenge_text = "Negotiate"; | 182 std::string challenge_text = "Negotiate"; |
185 HttpAuthChallengeTokenizer challenge(challenge_text.begin(), | 183 HttpAuthChallengeTokenizer challenge(challenge_text.begin(), |
186 challenge_text.end()); | 184 challenge_text.end()); |
187 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, | 185 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, |
188 auth_gssapi.ParseChallenge(&challenge)); | 186 auth_gssapi.ParseChallenge(&challenge)); |
189 } | 187 } |
190 | 188 |
191 TEST(HttpAuthGSSAPITest, ParseChallenge_TwoRounds) { | 189 TEST(HttpAuthGSSAPITest, ParseChallenge_TwoRounds) { |
192 // The first round should just have "Negotiate", and the second round should | 190 // The first round should just have "Negotiate", and the second round should |
193 // have a valid base64 token associated with it. | 191 // have a valid base64 token associated with it. |
194 test::MockGSSAPILibrary mock_library; | 192 test::MockGSSAPILibrary mock_library; |
195 HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", | 193 HttpAuthGSSAPI auth_gssapi( |
196 CHROME_GSS_SPNEGO_MECH_OID_DESC); | 194 &mock_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC); |
197 std::string first_challenge_text = "Negotiate"; | 195 std::string first_challenge_text = "Negotiate"; |
198 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), | 196 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), |
199 first_challenge_text.end()); | 197 first_challenge_text.end()); |
200 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, | 198 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, |
201 auth_gssapi.ParseChallenge(&first_challenge)); | 199 auth_gssapi.ParseChallenge(&first_challenge)); |
202 | 200 |
203 // Generate an auth token and create another thing. | 201 // Generate an auth token and create another thing. |
204 EstablishInitialContext(&mock_library); | 202 EstablishInitialContext(&mock_library); |
205 std::string auth_token; | 203 std::string auth_token; |
206 EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com", | 204 EXPECT_EQ(OK, |
207 &auth_token)); | 205 auth_gssapi.GenerateAuthToken( |
| 206 NULL, "HTTP/intranet.google.com", &auth_token)); |
208 | 207 |
209 std::string second_challenge_text = "Negotiate Zm9vYmFy"; | 208 std::string second_challenge_text = "Negotiate Zm9vYmFy"; |
210 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), | 209 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), |
211 second_challenge_text.end()); | 210 second_challenge_text.end()); |
212 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, | 211 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, |
213 auth_gssapi.ParseChallenge(&second_challenge)); | 212 auth_gssapi.ParseChallenge(&second_challenge)); |
214 } | 213 } |
215 | 214 |
216 TEST(HttpAuthGSSAPITest, ParseChallenge_UnexpectedTokenFirstRound) { | 215 TEST(HttpAuthGSSAPITest, ParseChallenge_UnexpectedTokenFirstRound) { |
217 // If the first round challenge has an additional authentication token, it | 216 // If the first round challenge has an additional authentication token, it |
218 // should be treated as an invalid challenge from the server. | 217 // should be treated as an invalid challenge from the server. |
219 test::MockGSSAPILibrary mock_library; | 218 test::MockGSSAPILibrary mock_library; |
220 HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", | 219 HttpAuthGSSAPI auth_gssapi( |
221 CHROME_GSS_SPNEGO_MECH_OID_DESC); | 220 &mock_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC); |
222 std::string challenge_text = "Negotiate Zm9vYmFy"; | 221 std::string challenge_text = "Negotiate Zm9vYmFy"; |
223 HttpAuthChallengeTokenizer challenge(challenge_text.begin(), | 222 HttpAuthChallengeTokenizer challenge(challenge_text.begin(), |
224 challenge_text.end()); | 223 challenge_text.end()); |
225 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID, | 224 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID, |
226 auth_gssapi.ParseChallenge(&challenge)); | 225 auth_gssapi.ParseChallenge(&challenge)); |
227 } | 226 } |
228 | 227 |
229 TEST(HttpAuthGSSAPITest, ParseChallenge_MissingTokenSecondRound) { | 228 TEST(HttpAuthGSSAPITest, ParseChallenge_MissingTokenSecondRound) { |
230 // If a later-round challenge is simply "Negotiate", it should be treated as | 229 // If a later-round challenge is simply "Negotiate", it should be treated as |
231 // an authentication challenge rejection from the server or proxy. | 230 // an authentication challenge rejection from the server or proxy. |
232 test::MockGSSAPILibrary mock_library; | 231 test::MockGSSAPILibrary mock_library; |
233 HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", | 232 HttpAuthGSSAPI auth_gssapi( |
234 CHROME_GSS_SPNEGO_MECH_OID_DESC); | 233 &mock_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC); |
235 std::string first_challenge_text = "Negotiate"; | 234 std::string first_challenge_text = "Negotiate"; |
236 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), | 235 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), |
237 first_challenge_text.end()); | 236 first_challenge_text.end()); |
238 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, | 237 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, |
239 auth_gssapi.ParseChallenge(&first_challenge)); | 238 auth_gssapi.ParseChallenge(&first_challenge)); |
240 | 239 |
241 EstablishInitialContext(&mock_library); | 240 EstablishInitialContext(&mock_library); |
242 std::string auth_token; | 241 std::string auth_token; |
243 EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com", | 242 EXPECT_EQ(OK, |
244 &auth_token)); | 243 auth_gssapi.GenerateAuthToken( |
| 244 NULL, "HTTP/intranet.google.com", &auth_token)); |
245 std::string second_challenge_text = "Negotiate"; | 245 std::string second_challenge_text = "Negotiate"; |
246 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), | 246 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), |
247 second_challenge_text.end()); | 247 second_challenge_text.end()); |
248 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_REJECT, | 248 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_REJECT, |
249 auth_gssapi.ParseChallenge(&second_challenge)); | 249 auth_gssapi.ParseChallenge(&second_challenge)); |
250 } | 250 } |
251 | 251 |
252 TEST(HttpAuthGSSAPITest, ParseChallenge_NonBase64EncodedToken) { | 252 TEST(HttpAuthGSSAPITest, ParseChallenge_NonBase64EncodedToken) { |
253 // If a later-round challenge has an invalid base64 encoded token, it should | 253 // If a later-round challenge has an invalid base64 encoded token, it should |
254 // be treated as an invalid challenge. | 254 // be treated as an invalid challenge. |
255 test::MockGSSAPILibrary mock_library; | 255 test::MockGSSAPILibrary mock_library; |
256 HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", | 256 HttpAuthGSSAPI auth_gssapi( |
257 CHROME_GSS_SPNEGO_MECH_OID_DESC); | 257 &mock_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC); |
258 std::string first_challenge_text = "Negotiate"; | 258 std::string first_challenge_text = "Negotiate"; |
259 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), | 259 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), |
260 first_challenge_text.end()); | 260 first_challenge_text.end()); |
261 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, | 261 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, |
262 auth_gssapi.ParseChallenge(&first_challenge)); | 262 auth_gssapi.ParseChallenge(&first_challenge)); |
263 | 263 |
264 EstablishInitialContext(&mock_library); | 264 EstablishInitialContext(&mock_library); |
265 std::string auth_token; | 265 std::string auth_token; |
266 EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com", | 266 EXPECT_EQ(OK, |
267 &auth_token)); | 267 auth_gssapi.GenerateAuthToken( |
| 268 NULL, "HTTP/intranet.google.com", &auth_token)); |
268 std::string second_challenge_text = "Negotiate =happyjoy="; | 269 std::string second_challenge_text = "Negotiate =happyjoy="; |
269 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), | 270 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), |
270 second_challenge_text.end()); | 271 second_challenge_text.end()); |
271 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID, | 272 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID, |
272 auth_gssapi.ParseChallenge(&second_challenge)); | 273 auth_gssapi.ParseChallenge(&second_challenge)); |
273 } | 274 } |
274 | 275 |
275 } // namespace net | 276 } // namespace net |
OLD | NEW |