Index: net/http/http_auth_gssapi_posix_unittest.cc |
diff --git a/net/http/http_auth_gssapi_posix_unittest.cc b/net/http/http_auth_gssapi_posix_unittest.cc |
deleted file mode 100644 |
index 6f933349d7e5b4f6d48a70c04ccd656bf4571e6f..0000000000000000000000000000000000000000 |
--- a/net/http/http_auth_gssapi_posix_unittest.cc |
+++ /dev/null |
@@ -1,275 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/http/http_auth_gssapi_posix.h" |
- |
-#include "base/basictypes.h" |
-#include "base/logging.h" |
-#include "base/memory/scoped_ptr.h" |
-#include "base/native_library.h" |
-#include "net/base/net_errors.h" |
-#include "net/http/http_auth_challenge_tokenizer.h" |
-#include "net/http/mock_gssapi_library_posix.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-namespace net { |
- |
-namespace { |
- |
-// gss_buffer_t helpers. |
-void ClearBuffer(gss_buffer_t dest) { |
- if (!dest) |
- return; |
- dest->length = 0; |
- delete [] reinterpret_cast<char*>(dest->value); |
- dest->value = NULL; |
-} |
- |
-void SetBuffer(gss_buffer_t dest, const void* src, size_t length) { |
- if (!dest) |
- return; |
- ClearBuffer(dest); |
- if (!src) |
- return; |
- dest->length = length; |
- if (length) { |
- dest->value = new char[length]; |
- memcpy(dest->value, src, length); |
- } |
-} |
- |
-void CopyBuffer(gss_buffer_t dest, const gss_buffer_t src) { |
- if (!dest) |
- return; |
- ClearBuffer(dest); |
- if (!src) |
- return; |
- SetBuffer(dest, src->value, src->length); |
-} |
- |
-const char kInitialAuthResponse[] = "Mary had a little lamb"; |
- |
-void EstablishInitialContext(test::MockGSSAPILibrary* library) { |
- test::GssContextMockImpl context_info( |
- "localhost", // Source name |
- "example.com", // Target name |
- 23, // Lifetime |
- *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism |
- 0, // Context flags |
- 1, // Locally initiated |
- 0); // Open |
- gss_buffer_desc in_buffer = {0, NULL}; |
- gss_buffer_desc out_buffer = {arraysize(kInitialAuthResponse), |
- const_cast<char*>(kInitialAuthResponse)}; |
- library->ExpectSecurityContext( |
- "Negotiate", |
- GSS_S_CONTINUE_NEEDED, |
- 0, |
- context_info, |
- in_buffer, |
- out_buffer); |
-} |
- |
-} // namespace |
- |
-TEST(HttpAuthGSSAPIPOSIXTest, GSSAPIStartup) { |
- // TODO(ahendrickson): Manipulate the libraries and paths to test each of the |
- // libraries we expect, and also whether or not they have the interface |
- // functions we want. |
- scoped_ptr<GSSAPILibrary> gssapi(new GSSAPISharedLibrary(std::string())); |
- DCHECK(gssapi.get()); |
- EXPECT_TRUE(gssapi.get()->Init()); |
-} |
- |
-#if defined(DLOPEN_KERBEROS) |
-TEST(HttpAuthGSSAPIPOSIXTest, GSSAPILoadCustomLibrary) { |
- scoped_ptr<GSSAPILibrary> gssapi( |
- new GSSAPISharedLibrary("/this/library/does/not/exist")); |
- EXPECT_FALSE(gssapi.get()->Init()); |
-} |
-#endif // defined(DLOPEN_KERBEROS) |
- |
-TEST(HttpAuthGSSAPIPOSIXTest, GSSAPICycle) { |
- scoped_ptr<test::MockGSSAPILibrary> mock_library(new test::MockGSSAPILibrary); |
- DCHECK(mock_library.get()); |
- mock_library->Init(); |
- const char kAuthResponse[] = "Mary had a little lamb"; |
- test::GssContextMockImpl context1( |
- "localhost", // Source name |
- "example.com", // Target name |
- 23, // Lifetime |
- *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism |
- 0, // Context flags |
- 1, // Locally initiated |
- 0); // Open |
- test::GssContextMockImpl context2( |
- "localhost", // Source name |
- "example.com", // Target name |
- 23, // Lifetime |
- *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism |
- 0, // Context flags |
- 1, // Locally initiated |
- 1); // Open |
- test::MockGSSAPILibrary::SecurityContextQuery queries[] = { |
- test::MockGSSAPILibrary::SecurityContextQuery( |
- "Negotiate", // Package name |
- GSS_S_CONTINUE_NEEDED, // Major response code |
- 0, // Minor response code |
- context1, // Context |
- NULL, // Expected input token |
- kAuthResponse), // Output token |
- test::MockGSSAPILibrary::SecurityContextQuery( |
- "Negotiate", // Package name |
- GSS_S_COMPLETE, // Major response code |
- 0, // Minor response code |
- context2, // Context |
- kAuthResponse, // Expected input token |
- kAuthResponse) // Output token |
- }; |
- |
- for (size_t i = 0; i < arraysize(queries); ++i) { |
- mock_library->ExpectSecurityContext(queries[i].expected_package, |
- queries[i].response_code, |
- queries[i].minor_response_code, |
- queries[i].context_info, |
- queries[i].expected_input_token, |
- queries[i].output_token); |
- } |
- |
- OM_uint32 major_status = 0; |
- OM_uint32 minor_status = 0; |
- gss_cred_id_t initiator_cred_handle = NULL; |
- gss_ctx_id_t context_handle = NULL; |
- gss_name_t target_name = NULL; |
- gss_OID mech_type = NULL; |
- OM_uint32 req_flags = 0; |
- OM_uint32 time_req = 25; |
- gss_channel_bindings_t input_chan_bindings = NULL; |
- gss_buffer_desc input_token = { 0, NULL }; |
- gss_OID actual_mech_type= NULL; |
- gss_buffer_desc output_token = { 0, NULL }; |
- OM_uint32 ret_flags = 0; |
- OM_uint32 time_rec = 0; |
- for (size_t i = 0; i < arraysize(queries); ++i) { |
- major_status = mock_library->init_sec_context(&minor_status, |
- initiator_cred_handle, |
- &context_handle, |
- target_name, |
- mech_type, |
- req_flags, |
- time_req, |
- input_chan_bindings, |
- &input_token, |
- &actual_mech_type, |
- &output_token, |
- &ret_flags, |
- &time_rec); |
- EXPECT_EQ(queries[i].response_code, major_status); |
- CopyBuffer(&input_token, &output_token); |
- ClearBuffer(&output_token); |
- } |
- ClearBuffer(&input_token); |
- major_status = mock_library->delete_sec_context(&minor_status, |
- &context_handle, |
- GSS_C_NO_BUFFER); |
- EXPECT_EQ(static_cast<OM_uint32>(GSS_S_COMPLETE), major_status); |
-} |
- |
-TEST(HttpAuthGSSAPITest, ParseChallenge_FirstRound) { |
- // The first round should just consist of an unadorned "Negotiate" header. |
- test::MockGSSAPILibrary mock_library; |
- HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", |
- CHROME_GSS_SPNEGO_MECH_OID_DESC); |
- std::string challenge_text = "Negotiate"; |
- HttpAuthChallengeTokenizer challenge(challenge_text.begin(), |
- challenge_text.end()); |
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, |
- auth_gssapi.ParseChallenge(&challenge)); |
-} |
- |
-TEST(HttpAuthGSSAPITest, ParseChallenge_TwoRounds) { |
- // The first round should just have "Negotiate", and the second round should |
- // have a valid base64 token associated with it. |
- test::MockGSSAPILibrary mock_library; |
- HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", |
- CHROME_GSS_SPNEGO_MECH_OID_DESC); |
- std::string first_challenge_text = "Negotiate"; |
- HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), |
- first_challenge_text.end()); |
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, |
- auth_gssapi.ParseChallenge(&first_challenge)); |
- |
- // Generate an auth token and create another thing. |
- EstablishInitialContext(&mock_library); |
- std::string auth_token; |
- EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com", |
- &auth_token)); |
- |
- std::string second_challenge_text = "Negotiate Zm9vYmFy"; |
- HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), |
- second_challenge_text.end()); |
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, |
- auth_gssapi.ParseChallenge(&second_challenge)); |
-} |
- |
-TEST(HttpAuthGSSAPITest, ParseChallenge_UnexpectedTokenFirstRound) { |
- // If the first round challenge has an additional authentication token, it |
- // should be treated as an invalid challenge from the server. |
- test::MockGSSAPILibrary mock_library; |
- HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", |
- CHROME_GSS_SPNEGO_MECH_OID_DESC); |
- std::string challenge_text = "Negotiate Zm9vYmFy"; |
- HttpAuthChallengeTokenizer challenge(challenge_text.begin(), |
- challenge_text.end()); |
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID, |
- auth_gssapi.ParseChallenge(&challenge)); |
-} |
- |
-TEST(HttpAuthGSSAPITest, ParseChallenge_MissingTokenSecondRound) { |
- // If a later-round challenge is simply "Negotiate", it should be treated as |
- // an authentication challenge rejection from the server or proxy. |
- test::MockGSSAPILibrary mock_library; |
- HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", |
- CHROME_GSS_SPNEGO_MECH_OID_DESC); |
- std::string first_challenge_text = "Negotiate"; |
- HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), |
- first_challenge_text.end()); |
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, |
- auth_gssapi.ParseChallenge(&first_challenge)); |
- |
- EstablishInitialContext(&mock_library); |
- std::string auth_token; |
- EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com", |
- &auth_token)); |
- std::string second_challenge_text = "Negotiate"; |
- HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), |
- second_challenge_text.end()); |
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_REJECT, |
- auth_gssapi.ParseChallenge(&second_challenge)); |
-} |
- |
-TEST(HttpAuthGSSAPITest, ParseChallenge_NonBase64EncodedToken) { |
- // If a later-round challenge has an invalid base64 encoded token, it should |
- // be treated as an invalid challenge. |
- test::MockGSSAPILibrary mock_library; |
- HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", |
- CHROME_GSS_SPNEGO_MECH_OID_DESC); |
- std::string first_challenge_text = "Negotiate"; |
- HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), |
- first_challenge_text.end()); |
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, |
- auth_gssapi.ParseChallenge(&first_challenge)); |
- |
- EstablishInitialContext(&mock_library); |
- std::string auth_token; |
- EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com", |
- &auth_token)); |
- std::string second_challenge_text = "Negotiate =happyjoy="; |
- HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), |
- second_challenge_text.end()); |
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID, |
- auth_gssapi.ParseChallenge(&second_challenge)); |
-} |
- |
-} // namespace net |