15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved. 25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be 35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file. 45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 55821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "remoting/protocol/v2_authenticator.h" 65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/bind.h" 85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/net_errors.h" 92a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "remoting/base/rsa_key_pair.h" 105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "remoting/protocol/authenticator_test_base.h" 115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "remoting/protocol/channel_authenticator.h" 125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "remoting/protocol/connection_tester.h" 135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "testing/gmock/include/gmock/gmock.h" 145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "testing/gtest/include/gtest/gtest.h" 151320f92c476a1ad9d19dba2a48c72b75566198e9Primiano Tucci#include "third_party/webrtc/libjingle/xmllite/xmlelement.h" 165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using testing::_; 185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using testing::DeleteArg; 195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using testing::SaveArg; 205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace remoting { 225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace protocol { 235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace { 255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const int kMessageSize = 100; 275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const int kMessages = 1; 285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const char kTestSharedSecret[] = "1234-1234-5678"; 305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const char kTestSharedSecretBad[] = "0000-0000-0001"; 315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace 335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class V2AuthenticatorTest : public AuthenticatorTestBase { 355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) V2AuthenticatorTest() { 375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual ~V2AuthenticatorTest() { 395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) protected: 425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) void InitAuthenticators(const std::string& client_secret, 435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const std::string& host_secret) { 445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) host_ = V2Authenticator::CreateForHost( 452a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) host_cert_, key_pair_, host_secret, 462a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) Authenticator::WAITING_MESSAGE); 475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) client_ = V2Authenticator::CreateForClient( 485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) client_secret, Authenticator::MESSAGE_READY); 495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(V2AuthenticatorTest); 525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5403b57e008b61dfcb1fbad3aea950ae0e001748b0Torne (Richard Coles)TEST_F(V2AuthenticatorTest, SuccessfulAuth) { 555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_NO_FATAL_FAILURE( 565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) InitAuthenticators(kTestSharedSecret, kTestSharedSecret)); 575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); 585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_EQ(Authenticator::ACCEPTED, host_->state()); 605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_EQ(Authenticator::ACCEPTED, client_->state()); 615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) client_auth_ = client_->CreateChannelAuthenticator(); 635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) host_auth_ = host_->CreateChannelAuthenticator(); 645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RunChannelAuth(false); 655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) StreamConnectionTester tester(host_socket_.get(), client_socket_.get(), 675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) kMessageSize, kMessages); 685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) tester.Start(); 705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) message_loop_.Run(); 715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) tester.CheckResults(); 725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Verify that connection is rejected when secrets don't match. 7503b57e008b61dfcb1fbad3aea950ae0e001748b0Torne (Richard Coles)TEST_F(V2AuthenticatorTest, InvalidSecret) { 765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_NO_FATAL_FAILURE( 775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret)); 785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); 795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_EQ(Authenticator::REJECTED, client_->state()); 815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Change |client_| so that we can get the last message. 835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) reinterpret_cast<V2Authenticator*>(client_.get())->state_ = 845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Authenticator::MESSAGE_READY; 855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) scoped_ptr<buzz::XmlElement> message(client_->GetNextMessage()); 875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_TRUE(message.get()); 885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_EQ(Authenticator::WAITING_MESSAGE, client_->state()); 902a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) host_->ProcessMessage(message.get(), base::Bind(&base::DoNothing)); 912a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) // This assumes that V2Authenticator::ProcessMessage runs synchronously. 925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_EQ(Authenticator::REJECTED, host_->state()); 935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace protocol 965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace remoting 97