OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/bind.h" | 5 #include "base/bind.h" |
6 #include "net/base/net_errors.h" | 6 #include "net/base/net_errors.h" |
7 #include "remoting/base/rsa_key_pair.h" | 7 #include "remoting/base/rsa_key_pair.h" |
8 #include "remoting/protocol/authenticator_test_base.h" | 8 #include "remoting/protocol/authenticator_test_base.h" |
9 #include "remoting/protocol/channel_authenticator.h" | 9 #include "remoting/protocol/channel_authenticator.h" |
10 #include "remoting/protocol/connection_tester.h" | 10 #include "remoting/protocol/connection_tester.h" |
(...skipping 103 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
114 client_.reset(new ThirdPartyClientAuthenticator(token_fetcher.Pass())); | 114 client_.reset(new ThirdPartyClientAuthenticator(token_fetcher.Pass())); |
115 } | 115 } |
116 | 116 |
117 FakeTokenFetcher* token_fetcher_; | 117 FakeTokenFetcher* token_fetcher_; |
118 FakeTokenValidator* token_validator_; | 118 FakeTokenValidator* token_validator_; |
119 | 119 |
120 private: | 120 private: |
121 DISALLOW_COPY_AND_ASSIGN(ThirdPartyAuthenticatorTest); | 121 DISALLOW_COPY_AND_ASSIGN(ThirdPartyAuthenticatorTest); |
122 }; | 122 }; |
123 | 123 |
124 // These tests use net::SSLServerSocket which is not implemented for OpenSSL. | 124 TEST_F(ThirdPartyAuthenticatorTest, SuccessfulAuth) { |
125 #if defined(USE_OPENSSL) | |
126 #define MAYBE(x) DISABLED_##x | |
127 #else | |
128 #define MAYBE(x) x | |
129 #endif | |
130 | |
131 TEST_F(ThirdPartyAuthenticatorTest, MAYBE(SuccessfulAuth)) { | |
132 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); | 125 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
133 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); | 126 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
134 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); | 127 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
135 ASSERT_NO_FATAL_FAILURE(token_fetcher_->OnTokenFetched( | 128 ASSERT_NO_FATAL_FAILURE(token_fetcher_->OnTokenFetched( |
136 kToken, kSharedSecret)); | 129 kToken, kSharedSecret)); |
137 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, host_->state()); | 130 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, host_->state()); |
138 ASSERT_NO_FATAL_FAILURE( | 131 ASSERT_NO_FATAL_FAILURE( |
139 token_validator_->OnTokenValidated(kSharedSecret)); | 132 token_validator_->OnTokenValidated(kSharedSecret)); |
140 | 133 |
141 // Both sides have finished. | 134 // Both sides have finished. |
142 ASSERT_EQ(Authenticator::ACCEPTED, host_->state()); | 135 ASSERT_EQ(Authenticator::ACCEPTED, host_->state()); |
143 ASSERT_EQ(Authenticator::ACCEPTED, client_->state()); | 136 ASSERT_EQ(Authenticator::ACCEPTED, client_->state()); |
144 | 137 |
145 // An authenticated channel can be created after the authentication. | 138 // An authenticated channel can be created after the authentication. |
146 client_auth_ = client_->CreateChannelAuthenticator(); | 139 client_auth_ = client_->CreateChannelAuthenticator(); |
147 host_auth_ = host_->CreateChannelAuthenticator(); | 140 host_auth_ = host_->CreateChannelAuthenticator(); |
148 RunChannelAuth(false); | 141 RunChannelAuth(false); |
149 | 142 |
150 StreamConnectionTester tester(host_socket_.get(), client_socket_.get(), | 143 StreamConnectionTester tester(host_socket_.get(), client_socket_.get(), |
151 kMessageSize, kMessages); | 144 kMessageSize, kMessages); |
152 | 145 |
153 tester.Start(); | 146 tester.Start(); |
154 message_loop_.Run(); | 147 message_loop_.Run(); |
155 tester.CheckResults(); | 148 tester.CheckResults(); |
156 } | 149 } |
157 | 150 |
158 TEST_F(ThirdPartyAuthenticatorTest, MAYBE(ClientNoSecret)) { | 151 TEST_F(ThirdPartyAuthenticatorTest, ClientNoSecret) { |
159 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); | 152 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
160 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); | 153 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
161 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); | 154 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
162 ASSERT_NO_FATAL_FAILURE( | 155 ASSERT_NO_FATAL_FAILURE( |
163 token_fetcher_->OnTokenFetched(kToken, std::string())); | 156 token_fetcher_->OnTokenFetched(kToken, std::string())); |
164 | 157 |
165 // The end result is that the client rejected the connection, since it | 158 // The end result is that the client rejected the connection, since it |
166 // couldn't fetch the secret. | 159 // couldn't fetch the secret. |
167 ASSERT_EQ(Authenticator::REJECTED, client_->state()); | 160 ASSERT_EQ(Authenticator::REJECTED, client_->state()); |
168 } | 161 } |
169 | 162 |
170 TEST_F(ThirdPartyAuthenticatorTest, MAYBE(InvalidToken)) { | 163 TEST_F(ThirdPartyAuthenticatorTest, InvalidToken) { |
171 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); | 164 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
172 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); | 165 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
173 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); | 166 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
174 ASSERT_NO_FATAL_FAILURE(token_fetcher_->OnTokenFetched( | 167 ASSERT_NO_FATAL_FAILURE(token_fetcher_->OnTokenFetched( |
175 kToken, kSharedSecret)); | 168 kToken, kSharedSecret)); |
176 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, host_->state()); | 169 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, host_->state()); |
177 ASSERT_NO_FATAL_FAILURE(token_validator_->OnTokenValidated(std::string())); | 170 ASSERT_NO_FATAL_FAILURE(token_validator_->OnTokenValidated(std::string())); |
178 | 171 |
179 // The end result is that the host rejected the token. | 172 // The end result is that the host rejected the token. |
180 ASSERT_EQ(Authenticator::REJECTED, host_->state()); | 173 ASSERT_EQ(Authenticator::REJECTED, host_->state()); |
181 } | 174 } |
182 | 175 |
183 TEST_F(ThirdPartyAuthenticatorTest, MAYBE(CannotFetchToken)) { | 176 TEST_F(ThirdPartyAuthenticatorTest, CannotFetchToken) { |
184 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); | 177 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
185 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); | 178 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
186 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); | 179 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
187 ASSERT_NO_FATAL_FAILURE( | 180 ASSERT_NO_FATAL_FAILURE( |
188 token_fetcher_->OnTokenFetched(std::string(), std::string())); | 181 token_fetcher_->OnTokenFetched(std::string(), std::string())); |
189 | 182 |
190 // The end result is that the client rejected the connection, since it | 183 // The end result is that the client rejected the connection, since it |
191 // couldn't fetch the token. | 184 // couldn't fetch the token. |
192 ASSERT_EQ(Authenticator::REJECTED, client_->state()); | 185 ASSERT_EQ(Authenticator::REJECTED, client_->state()); |
193 } | 186 } |
194 | 187 |
195 // Test that negotiation stops when the fake authentication is rejected. | 188 // Test that negotiation stops when the fake authentication is rejected. |
196 TEST_F(ThirdPartyAuthenticatorTest, MAYBE(HostBadSecret)) { | 189 TEST_F(ThirdPartyAuthenticatorTest, HostBadSecret) { |
197 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); | 190 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
198 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); | 191 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
199 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); | 192 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
200 ASSERT_NO_FATAL_FAILURE(token_fetcher_->OnTokenFetched( | 193 ASSERT_NO_FATAL_FAILURE(token_fetcher_->OnTokenFetched( |
201 kToken, kSharedSecret)); | 194 kToken, kSharedSecret)); |
202 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, host_->state()); | 195 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, host_->state()); |
203 ASSERT_NO_FATAL_FAILURE( | 196 ASSERT_NO_FATAL_FAILURE( |
204 token_validator_->OnTokenValidated(kSharedSecretBad)); | 197 token_validator_->OnTokenValidated(kSharedSecretBad)); |
205 | 198 |
206 // The end result is that the host rejected the fake authentication. | 199 // The end result is that the host rejected the fake authentication. |
207 ASSERT_EQ(Authenticator::REJECTED, client_->state()); | 200 ASSERT_EQ(Authenticator::REJECTED, client_->state()); |
208 } | 201 } |
209 | 202 |
210 TEST_F(ThirdPartyAuthenticatorTest, MAYBE(ClientBadSecret)) { | 203 TEST_F(ThirdPartyAuthenticatorTest, ClientBadSecret) { |
211 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); | 204 ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
212 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); | 205 ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
213 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); | 206 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
214 ASSERT_NO_FATAL_FAILURE( | 207 ASSERT_NO_FATAL_FAILURE( |
215 token_fetcher_->OnTokenFetched(kToken, kSharedSecretBad)); | 208 token_fetcher_->OnTokenFetched(kToken, kSharedSecretBad)); |
216 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, host_->state()); | 209 ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, host_->state()); |
217 ASSERT_NO_FATAL_FAILURE( | 210 ASSERT_NO_FATAL_FAILURE( |
218 token_validator_->OnTokenValidated(kSharedSecret)); | 211 token_validator_->OnTokenValidated(kSharedSecret)); |
219 | 212 |
220 // The end result is that the host rejected the fake authentication. | 213 // The end result is that the host rejected the fake authentication. |
221 ASSERT_EQ(Authenticator::REJECTED, client_->state()); | 214 ASSERT_EQ(Authenticator::REJECTED, client_->state()); |
222 } | 215 } |
223 | 216 |
224 } // namespace protocol | 217 } // namespace protocol |
225 } // namespace remoting | 218 } // namespace remoting |
OLD | NEW |