summaryrefslogtreecommitdiffstats
path: root/remoting/protocol/v1_authenticator_unittest.cc
blob: 0ba9e512d3763482049c1353ef5587dd234a6c9f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "base/file_path.h"
#include "base/file_util.h"
#include "base/path_service.h"
#include "crypto/rsa_private_key.h"
#include "remoting/protocol/v1_authenticator.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "third_party/libjingle/source/talk/xmllite/xmlelement.h"

namespace remoting {
namespace protocol {

namespace {
const char kHostJid[] = "host1@gmail.com/123";
const char kClientJid[] = "host2@gmail.com/321";

const char kTestSharedSecret[] = "1234-1234-5678";
const char kTestSharedSecretBad[] = "0000-0000-0001";
}  // namespace

class V1AuthenticatorTest : public testing::Test {
 public:
  V1AuthenticatorTest() {
  }
  virtual ~V1AuthenticatorTest() {
  }

 protected:
  void InitAuthenticators(const std::string& client_secret,
                          const std::string& host_secret) {
    FilePath certs_dir;
    PathService::Get(base::DIR_SOURCE_ROOT, &certs_dir);
    certs_dir = certs_dir.AppendASCII("net");
    certs_dir = certs_dir.AppendASCII("data");
    certs_dir = certs_dir.AppendASCII("ssl");
    certs_dir = certs_dir.AppendASCII("certificates");

    FilePath cert_path = certs_dir.AppendASCII("unittest.selfsigned.der");
    std::string cert_der;
    ASSERT_TRUE(file_util::ReadFileToString(cert_path, &cert_der));

    FilePath key_path = certs_dir.AppendASCII("unittest.key.bin");
    std::string key_string;
    ASSERT_TRUE(file_util::ReadFileToString(key_path, &key_string));
    std::vector<uint8> key_vector(
        reinterpret_cast<const uint8*>(key_string.data()),
        reinterpret_cast<const uint8*>(key_string.data() +
                                       key_string.length()));
    private_key_.reset(
        crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_vector));

    host_.reset(new V1HostAuthenticator(
        cert_der, private_key_.get(), host_secret, kClientJid));
    client_.reset(new V1ClientAuthenticator(kClientJid, client_secret));
  }

  void RunAuthExchange() {
    do {
      scoped_ptr<buzz::XmlElement> message;

      // Pass message from client to host.
      ASSERT_EQ(Authenticator::MESSAGE_READY, client_->state());
      message.reset(client_->GetNextMessage());
      ASSERT_TRUE(message.get());
      ASSERT_NE(Authenticator::MESSAGE_READY, client_->state());

      ASSERT_EQ(Authenticator::WAITING_MESSAGE, host_->state());
      host_->ProcessMessage(message.get());
      ASSERT_NE(Authenticator::WAITING_MESSAGE, host_->state());

      // Are we done yet?
      if (host_->state() == Authenticator::ACCEPTED ||
          host_->state() == Authenticator::REJECTED) {
        break;
      }

      // Pass message from host to client.
      ASSERT_EQ(Authenticator::MESSAGE_READY, host_->state());
      message.reset(host_->GetNextMessage());
      ASSERT_TRUE(message.get());
      ASSERT_NE(Authenticator::MESSAGE_READY, host_->state());

      ASSERT_EQ(Authenticator::WAITING_MESSAGE, client_->state());
      client_->ProcessMessage(message.get());
      ASSERT_NE(Authenticator::WAITING_MESSAGE, client_->state());
    } while (host_->state() != Authenticator::ACCEPTED &&
             host_->state() != Authenticator::REJECTED);
  }

  scoped_ptr<crypto::RSAPrivateKey> private_key_;
  scoped_ptr<V1HostAuthenticator> host_;
  scoped_ptr<V1ClientAuthenticator> client_;

  DISALLOW_COPY_AND_ASSIGN(V1AuthenticatorTest);
};

TEST_F(V1AuthenticatorTest, SuccessfulAuth) {
  {
    SCOPED_TRACE("RunAuthExchange");
    InitAuthenticators(kTestSharedSecret, kTestSharedSecret);
    RunAuthExchange();
  }
  ASSERT_EQ(Authenticator::ACCEPTED, host_->state());
  ASSERT_EQ(Authenticator::ACCEPTED, client_->state());
}

TEST_F(V1AuthenticatorTest, InvalidSecret) {
  {
    SCOPED_TRACE("RunAuthExchange");
    InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret);
    RunAuthExchange();
  }
  ASSERT_EQ(Authenticator::REJECTED, host_->state());
}

}  // namespace protocol
}  // namespace remoting