// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "remoting/protocol/authenticator_test_base.h" #include "base/base64.h" #include "base/files/file_path.h" #include "base/files/file_util.h" #include "base/test/test_timeouts.h" #include "base/timer/timer.h" #include "net/base/net_errors.h" #include "net/base/test_data_directory.h" #include "remoting/base/rsa_key_pair.h" #include "remoting/protocol/authenticator.h" #include "remoting/protocol/channel_authenticator.h" #include "remoting/protocol/fake_stream_socket.h" #include "remoting/protocol/p2p_stream_socket.h" #include "testing/gtest/include/gtest/gtest.h" #include "third_party/webrtc/libjingle/xmllite/xmlelement.h" using testing::_; using testing::SaveArg; namespace remoting { namespace protocol { namespace { ACTION_P(QuitThreadOnCounter, counter) { --(*counter); EXPECT_GE(*counter, 0); if (*counter == 0) base::MessageLoop::current()->QuitWhenIdle(); } } // namespace AuthenticatorTestBase::MockChannelDoneCallback::MockChannelDoneCallback() {} AuthenticatorTestBase::MockChannelDoneCallback::~MockChannelDoneCallback() {} AuthenticatorTestBase::AuthenticatorTestBase() {} AuthenticatorTestBase::~AuthenticatorTestBase() {} void AuthenticatorTestBase::SetUp() { base::FilePath certs_dir(net::GetTestCertsDirectory()); base::FilePath cert_path = certs_dir.AppendASCII("unittest.selfsigned.der"); ASSERT_TRUE(base::ReadFileToString(cert_path, &host_cert_)); base::FilePath key_path = certs_dir.AppendASCII("unittest.key.bin"); std::string key_string; ASSERT_TRUE(base::ReadFileToString(key_path, &key_string)); std::string key_base64; base::Base64Encode(key_string, &key_base64); key_pair_ = RsaKeyPair::FromString(key_base64); ASSERT_TRUE(key_pair_.get()); host_public_key_ = key_pair_->GetPublicKey(); } void AuthenticatorTestBase::RunAuthExchange() { ContinueAuthExchangeWith(client_.get(), host_.get(), client_->started(), host_->started()); } void AuthenticatorTestBase::RunHostInitiatedAuthExchange() { ContinueAuthExchangeWith(host_.get(), client_.get(), host_->started(), client_->started()); } // static // This function sends a message from the sender and receiver and recursively // calls itself to the send the next message from the receiver to the sender // untils the authentication completes. void AuthenticatorTestBase::ContinueAuthExchangeWith(Authenticator* sender, Authenticator* receiver, bool sender_started, bool receiver_started) { scoped_ptr message; ASSERT_NE(Authenticator::WAITING_MESSAGE, sender->state()); if (sender->state() == Authenticator::ACCEPTED || sender->state() == Authenticator::REJECTED) return; // Verify that once the started flag for either party is set to true, // it should always stay true. if (receiver_started) { ASSERT_TRUE(receiver->started()); } if (sender_started) { ASSERT_TRUE(sender->started()); } ASSERT_EQ(Authenticator::MESSAGE_READY, sender->state()); message = sender->GetNextMessage(); ASSERT_TRUE(message.get()); ASSERT_NE(Authenticator::MESSAGE_READY, sender->state()); ASSERT_EQ(Authenticator::WAITING_MESSAGE, receiver->state()); receiver->ProcessMessage(message.get(), base::Bind( &AuthenticatorTestBase::ContinueAuthExchangeWith, base::Unretained(receiver), base::Unretained(sender), receiver->started(), sender->started())); } void AuthenticatorTestBase::RunChannelAuth(bool expected_fail) { client_fake_socket_.reset(new FakeStreamSocket()); host_fake_socket_.reset(new FakeStreamSocket()); client_fake_socket_->PairWith(host_fake_socket_.get()); client_auth_->SecureAndAuthenticate( client_fake_socket_.Pass(), base::Bind(&AuthenticatorTestBase::OnClientConnected, base::Unretained(this))); host_auth_->SecureAndAuthenticate( host_fake_socket_.Pass(), base::Bind(&AuthenticatorTestBase::OnHostConnected, base::Unretained(this))); // Expect two callbacks to be called - the client callback and the host // callback. int callback_counter = 2; EXPECT_CALL(client_callback_, OnDone(net::OK)) .WillOnce(QuitThreadOnCounter(&callback_counter)); if (expected_fail) { EXPECT_CALL(host_callback_, OnDone(net::ERR_FAILED)) .WillOnce(QuitThreadOnCounter(&callback_counter)); } else { EXPECT_CALL(host_callback_, OnDone(net::OK)) .WillOnce(QuitThreadOnCounter(&callback_counter)); } // Ensure that .Run() does not run unbounded if the callbacks are never // called. base::Timer shutdown_timer(false, false); shutdown_timer.Start(FROM_HERE, TestTimeouts::action_timeout(), base::MessageLoop::QuitWhenIdleClosure()); message_loop_.Run(); shutdown_timer.Stop(); testing::Mock::VerifyAndClearExpectations(&client_callback_); testing::Mock::VerifyAndClearExpectations(&host_callback_); if (!expected_fail) { ASSERT_TRUE(client_socket_.get() != nullptr); ASSERT_TRUE(host_socket_.get() != nullptr); } } void AuthenticatorTestBase::OnHostConnected( int error, scoped_ptr socket) { host_callback_.OnDone(error); host_socket_ = socket.Pass(); } void AuthenticatorTestBase::OnClientConnected( int error, scoped_ptr socket) { client_callback_.OnDone(error); client_socket_ = socket.Pass(); } } // namespace protocol } // namespace remoting