15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved.
25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file.
45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
55821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "remoting/protocol/v2_authenticator.h"
65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/bind.h"
85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/net_errors.h"
92a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "remoting/base/rsa_key_pair.h"
105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "remoting/protocol/authenticator_test_base.h"
115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "remoting/protocol/channel_authenticator.h"
125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "remoting/protocol/connection_tester.h"
135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "testing/gmock/include/gmock/gmock.h"
145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "testing/gtest/include/gtest/gtest.h"
151320f92c476a1ad9d19dba2a48c72b75566198e9Primiano Tucci#include "third_party/webrtc/libjingle/xmllite/xmlelement.h"
165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using testing::_;
185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using testing::DeleteArg;
195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using testing::SaveArg;
205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace remoting {
225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace protocol {
235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace {
255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const int kMessageSize = 100;
275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const int kMessages = 1;
285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const char kTestSharedSecret[] = "1234-1234-5678";
305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const char kTestSharedSecretBad[] = "0000-0000-0001";
315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace
335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class V2AuthenticatorTest : public AuthenticatorTestBase {
355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public:
365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  V2AuthenticatorTest() {
375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  virtual ~V2AuthenticatorTest() {
395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) protected:
425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  void InitAuthenticators(const std::string& client_secret,
435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                          const std::string& host_secret) {
445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    host_ = V2Authenticator::CreateForHost(
452a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)        host_cert_, key_pair_, host_secret,
462a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)        Authenticator::WAITING_MESSAGE);
475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    client_ = V2Authenticator::CreateForClient(
485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        client_secret, Authenticator::MESSAGE_READY);
495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DISALLOW_COPY_AND_ASSIGN(V2AuthenticatorTest);
525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5403b57e008b61dfcb1fbad3aea950ae0e001748b0Torne (Richard Coles)TEST_F(V2AuthenticatorTest, SuccessfulAuth) {
555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_NO_FATAL_FAILURE(
565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      InitAuthenticators(kTestSharedSecret, kTestSharedSecret));
575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_NO_FATAL_FAILURE(RunAuthExchange());
585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_EQ(Authenticator::ACCEPTED, host_->state());
605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_EQ(Authenticator::ACCEPTED, client_->state());
615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  client_auth_ = client_->CreateChannelAuthenticator();
635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  host_auth_ = host_->CreateChannelAuthenticator();
645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RunChannelAuth(false);
655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  StreamConnectionTester tester(host_socket_.get(), client_socket_.get(),
675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                kMessageSize, kMessages);
685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  tester.Start();
705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  message_loop_.Run();
715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  tester.CheckResults();
725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Verify that connection is rejected when secrets don't match.
7503b57e008b61dfcb1fbad3aea950ae0e001748b0Torne (Richard Coles)TEST_F(V2AuthenticatorTest, InvalidSecret) {
765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_NO_FATAL_FAILURE(
775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret));
785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_NO_FATAL_FAILURE(RunAuthExchange());
795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_EQ(Authenticator::REJECTED, client_->state());
815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Change |client_| so that we can get the last message.
835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  reinterpret_cast<V2Authenticator*>(client_.get())->state_ =
845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      Authenticator::MESSAGE_READY;
855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_ptr<buzz::XmlElement> message(client_->GetNextMessage());
875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_TRUE(message.get());
885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_EQ(Authenticator::WAITING_MESSAGE, client_->state());
902a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  host_->ProcessMessage(message.get(), base::Bind(&base::DoNothing));
912a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  // This assumes that V2Authenticator::ProcessMessage runs synchronously.
925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_EQ(Authenticator::REJECTED, host_->state());
935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace protocol
965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace remoting
97