1 /*
2 * Copyright (c) 2022-2025 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include <cinttypes>
17 #include <gtest/gtest.h>
18 #include <securec.h>
19 #include <sys/time.h>
20
21 #include "auth_common.h"
22 #include "auth_common_mock.h"
23 #include "auth_hichain.h"
24 #include "auth_interface.h"
25 #include "auth_log.h"
26 #include "auth_manager.h"
27 #include "auth_net_ledger_mock.h"
28 #include "auth_request.h"
29 #include "auth_session_message.h"
30 #include "bus_center_adapter.h"
31 #include "lnn_hichain_mock.h"
32 #include "lnn_socket_mock.h"
33 #include "message_handler.h"
34 #include "softbus_access_token_test.h"
35 #include "softbus_adapter_bt_common.h"
36 #include "softbus_adapter_mem.h"
37 #include "softbus_error_code.h"
38 #include "softbus_feature_config.h"
39
40 namespace OHOS {
41 using namespace testing;
42 using namespace testing::ext;
43 #define TEST_UDID "123456ABCDEF"
44 #define TEST_UUID "6984321642"
45 #define DEV_NAME "DEVTEST"
46 #define TEST_MAC "11:22:33:44:55:66"
47 #define TEST_NETWORKID "ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00"
48 #define VERSION_TYPE_LITE "LITE"
49 static const uint32_t REQUEST_ID = 88;
50 static const bool TEST_IS_P2P = false;
51 static const int64_t SEQ_SERVER = 3;
52 static const int32_t TEST_P2P_ROLE = 1;
53 static const uint32_t TEST_NET_CAPACITY = 3;
54 static const uint16_t TEST_DATA_CHANGE_FLAG = 1;
55 static const uint64_t TEST_SUP_PROTOCOLS = 453213535465;
56 static const ConnModule MODULE_ID = MODULE_DEVICE_AUTH;
57 static const uint8_t DEVICE_INFO[5] = { 0x10, 0x2, 0x14, 0x08, 0x06 };
58 uint8_t g_sessionKey[SESSION_KEY_LENGTH];
59 static const int32_t TEST_DATA_LEN = 600;
60 static const int32_t OPER_CODE = 0;
61 static const int32_t DELAY_TIME = 15;
62 static const char *g_retData = nullptr;
63 static uint64_t g_connId = 8590065691;
64 const AuthConnInfo g_connInfo = {
65 .type = AUTH_LINK_TYPE_BR,
66 .info.brInfo.brMac = TEST_MAC,
67 .peerUid = "002",
68 };
69 const AuthVerifyCallback callBack = {
70 .onVerifyPassed = AuthCommonInterfaceMock::OnVerifyPassed,
71 .onVerifyFailed = AuthCommonInterfaceMock::OnVerifyFailed,
72 };
73 const AuthSessionInfo info = {
74 .isServer = true,
75 .connInfo = g_connInfo,
76 };
77 const AuthSessionInfo info2 = {
78 .isServer = false,
79 .connId = g_connId,
80 .connInfo = g_connInfo,
81 };
82 struct MockInterfaces {
83 AuthCommonInterfaceMock *commMock;
84 LnnHichainInterfaceMock *hichainMock;
85 AuthNetLedgertInterfaceMock *ledgerMock;
86 LnnSocketInterfaceMock *socketMock;
87 };
88 AuthDataHead devIdHead = {
89 .dataType = DATA_TYPE_DEVICE_ID,
90 .module = MODULE_DEVICE_AUTH,
91 .seq = SEQ_SERVER,
92 .flag = SERVER_SIDE_FLAG,
93 };
94 AuthDataHead devAuthHead = {
95 .dataType = DATA_TYPE_AUTH,
96 .module = MODULE_DEVICE_AUTH,
97 .seq = SEQ_SERVER,
98 .flag = SERVER_SIDE_FLAG,
99 };
100 AuthDataHead devInfoAuthHead = {
101 .dataType = DATA_TYPE_DEVICE_INFO,
102 .module = MODULE_DEVICE_AUTH,
103 .seq = SEQ_SERVER,
104 .flag = SERVER_SIDE_FLAG,
105 };
106 AuthDataHead closeAckHead = {
107 .dataType = DATA_TYPE_CLOSE_ACK,
108 .module = MODULE_DEVICE_AUTH,
109 .seq = SEQ_SERVER,
110 .flag = SERVER_SIDE_FLAG,
111 };
112 AuthVerifyListener g_listener = {
113 .onDeviceVerifyPass = &AuthNetLedgertInterfaceMock::OnDeviceVerifyPass,
114 .onDeviceNotTrusted = &AuthNetLedgertInterfaceMock::OnDeviceNotTrusted,
115 .onDeviceDisconnect = &AuthNetLedgertInterfaceMock::OnDeviceDisconnect,
116 };
117 NodeInfo g_localInfo = {
118 .versionType = VERSION_TYPE_LITE,
119 .uuid = TEST_UUID,
120 .networkId = TEST_NETWORKID,
121 .netCapacity = TEST_NET_CAPACITY,
122 .isBleP2p = TEST_IS_P2P,
123 .p2pInfo.p2pMac = TEST_MAC,
124 .supportedProtocols = TEST_SUP_PROTOCOLS,
125 .dataChangeFlag = TEST_DATA_CHANGE_FLAG,
126 };
SendSignal()127 void SendSignal()
128 {
129 AUTH_LOGI(AUTH_TEST, "SendSignal");
130 if (SoftBusMutexLock(&LnnHichainInterfaceMock::mutex) != SOFTBUS_OK) {
131 AUTH_LOGE(AUTH_TEST, "SendSignal Lock failed");
132 return;
133 }
134 AuthNetLedgertInterfaceMock::isRuned = true;
135 (void)SoftBusCondSignal(&LnnHichainInterfaceMock::cond);
136 (void)SoftBusMutexUnlock(&LnnHichainInterfaceMock::mutex);
137 AUTH_LOGI(AUTH_TEST, "SendSignal end");
138 }
139
ClientFSMCreate(MockInterfaces * mockInterface,GroupAuthManager & authManager,DeviceGroupManager & groupManager)140 void ClientFSMCreate(MockInterfaces *mockInterface, GroupAuthManager &authManager, DeviceGroupManager &groupManager)
141 {
142 bool isServer = false;
143 memset_s(g_localInfo.offlineCode, OFFLINE_CODE_BYTE_SIZE, 0, OFFLINE_CODE_BYTE_SIZE);
144 ON_CALL(*mockInterface->commMock, ConnConnectDevice(_, _, _)).WillByDefault(Return(SOFTBUS_OK));
145 groupManager.regDataChangeListener = LnnHichainInterfaceMock::InvokeDataChangeListener;
146 groupManager.unRegDataChangeListener = LnnHichainInterfaceMock::ActionofunRegDataChangeListener;
147 authManager.authDevice = LnnHichainInterfaceMock::InvokeAuthDevice;
148 ON_CALL(*mockInterface->commMock, ConnSetConnectCallback(_, _))
149 .WillByDefault(AuthCommonInterfaceMock::ActionofConnSetConnectCallback);
150 ON_CALL(*mockInterface->commMock, ConnGetHeadSize()).WillByDefault(Return(sizeof(ConnPktHead)));
151 ON_CALL(*mockInterface->hichainMock, InitDeviceAuthService()).WillByDefault(Return(0));
152 ON_CALL(*mockInterface->hichainMock, GetGaInstance()).WillByDefault(Return(&authManager));
153 ON_CALL(*mockInterface->hichainMock, GetGmInstance()).WillByDefault(Return(&groupManager));
154 ON_CALL(*mockInterface->ledgerMock, LnnGetLocalStrInfo).WillByDefault(Return(SOFTBUS_OK));
155 ON_CALL(*mockInterface->commMock, LnnAsyncCallbackDelayHelper(_, _, _, _)).WillByDefault(Return(SOFTBUS_OK));
156 int32_t ret = AuthInit();
157 EXPECT_TRUE(ret == SOFTBUS_OK);
158 ON_CALL(*mockInterface->commMock, ConnPostBytes).WillByDefault(Return(SOFTBUS_OK));
159 ON_CALL(*mockInterface->socketMock, ConnOpenClientSocket(_, _, _)).WillByDefault(Return(SOFTBUS_OK));
160 ON_CALL(*mockInterface->commMock, ConnGetConnectionInfo)
161 .WillByDefault(AuthCommonInterfaceMock::ActionofConnGetConnectionInfo);
162 ON_CALL(*mockInterface->ledgerMock, LnnGetDeviceName).WillByDefault(Return(DEV_NAME));
163 ON_CALL(*mockInterface->ledgerMock, LnnConvertIdToDeviceType).WillByDefault(Return(const_cast<char *>(TYPE_PAD)));
164 ON_CALL(*mockInterface->ledgerMock, LnnGetDeviceUdid).WillByDefault(Return(TEST_UDID));
165 ON_CALL(*mockInterface->ledgerMock, LnnGetP2pRole).WillByDefault(Return(TEST_P2P_ROLE));
166 ON_CALL(*mockInterface->ledgerMock, LnnGetP2pMac).WillByDefault(Return(TEST_MAC));
167 ON_CALL(*mockInterface->ledgerMock, LnnGetSupportedProtocols).WillByDefault(Return(TEST_SUP_PROTOCOLS));
168 ON_CALL(*mockInterface->ledgerMock, LnnGetLocalNodeInfo).WillByDefault(Return(&g_localInfo));
169 ON_CALL(*mockInterface->ledgerMock, LnnGetBtMac).WillByDefault(Return(TEST_MAC));
170 ON_CALL(*mockInterface->commMock, SoftBusGetBtState).WillByDefault(Return(BLE_ENABLE));
171 const unsigned char val = 0x01;
172 SoftbusSetConfig(SOFTBUS_INT_AUTH_ABILITY_COLLECTION, &val, sizeof(val));
173 ret = AuthStartVerify(&g_connInfo, REQUEST_ID, &callBack, AUTH_MODULE_LNN, true);
174
175 EXPECT_TRUE(ret == SOFTBUS_OK);
176 AuthParam authInfo = {
177 .authSeq = SEQ_SERVER,
178 .requestId = REQUEST_ID,
179 .connId = g_connId,
180 .isServer = isServer,
181 .isFastAuth = false,
182 };
183 AuthSessionStartAuth(&authInfo, &g_connInfo);
184 SoftBusSleepMs(DELAY_TIME);
185 }
186
WaitForSignal()187 bool WaitForSignal()
188 {
189 #define USECTONSEC 1000LL
190 SoftBusSysTime now;
191 if (SoftBusGetTime(&now) != SOFTBUS_OK) {
192 AUTH_LOGE(AUTH_TEST, "BrSoftBusCondWait SoftBusGetTime failed");
193 return false;
194 }
195 int64_t time = now.sec * USECTONSEC * USECTONSEC + now.usec + DELAY_TIME * USECTONSEC;
196 SoftBusSysTime tv;
197 tv.sec = time / USECTONSEC / USECTONSEC;
198 tv.usec = time % (USECTONSEC * USECTONSEC);
199 if (SoftBusMutexLock(&LnnHichainInterfaceMock::mutex) != SOFTBUS_OK) {
200 AUTH_LOGE(AUTH_TEST, "Wait signal Lock failed");
201 return false;
202 }
203 if (!AuthNetLedgertInterfaceMock::isRuned) {
204 int32_t ret = SoftBusCondWait(&LnnHichainInterfaceMock::cond, &LnnHichainInterfaceMock::mutex, &tv);
205 (void)SoftBusMutexUnlock(&LnnHichainInterfaceMock::mutex);
206 return (ret == SOFTBUS_OK);
207 } else {
208 (void)SoftBusMutexUnlock(&LnnHichainInterfaceMock::mutex);
209 SoftBusSleepMs(DELAY_TIME);
210 AuthNetLedgertInterfaceMock::isRuned = false;
211 }
212 return true;
213 }
214
CreateInfo(NodeInfo & nodeInfo)215 NodeInfo CreateInfo(NodeInfo &nodeInfo)
216 {
217 return nodeInfo;
218 }
219
220 class AuthTestCallBackTest : public testing::Test {
221 public:
222 static void SetUpTestCase();
223 static void TearDownTestCase();
224 void SetUp();
225 void TearDown();
226 };
227
SetUpTestCase()228 void AuthTestCallBackTest::SetUpTestCase()
229 {
230 AuthNetLedgertInterfaceMock::isRuned = false;
231 RegAuthVerifyListener(&g_listener);
232 (void)SoftBusMutexInit(&LnnHichainInterfaceMock::mutex, nullptr);
233 SoftBusCondInit(&LnnHichainInterfaceMock::cond);
234 }
235
TearDownTestCase()236 void AuthTestCallBackTest::TearDownTestCase()
237 {
238 AuthNetLedgertInterfaceMock::isRuned = false;
239 SoftBusCondDestroy(&LnnHichainInterfaceMock::cond);
240 SoftBusMutexDestroy(&LnnHichainInterfaceMock::mutex);
241 }
242
SetUp()243 void AuthTestCallBackTest::SetUp()
244 {
245 LooperInit();
246 AUTH_LOGI(AUTH_TEST, "AuthTestCallBackTest start.");
247 }
248
TearDown()249 void AuthTestCallBackTest::TearDown()
250 {
251 LooperDeinit();
252 }
253
AuthInitMock(AuthCommonInterfaceMock & commMock,LnnHichainInterfaceMock & hichainMock,GroupAuthManager authManager,DeviceGroupManager groupManager)254 void AuthInitMock(AuthCommonInterfaceMock &commMock, LnnHichainInterfaceMock &hichainMock, GroupAuthManager authManager,
255 DeviceGroupManager groupManager)
256 {
257 groupManager.regDataChangeListener = LnnHichainInterfaceMock::InvokeDataChangeListener;
258 authManager.authDevice = LnnHichainInterfaceMock::InvokeAuthDevice;
259 groupManager.unRegDataChangeListener = LnnHichainInterfaceMock::ActionofunRegDataChangeListener;
260 ON_CALL(commMock, ConnSetConnectCallback(_, _)).WillByDefault(Return(SOFTBUS_OK));
261 ON_CALL(hichainMock, InitDeviceAuthService()).WillByDefault(Return(0));
262 ON_CALL(hichainMock, GetGaInstance()).WillByDefault(Return(&authManager));
263 ON_CALL(hichainMock, GetGmInstance()).WillByDefault(Return(&groupManager));
264 }
265
266 /*
267 * @tc.name: AUTH_CALLBACK_TEST_001
268 * @tc.desc: auth callback test
269 * @tc.type: FUNC
270 * @tc.require:
271 */
272
273 HWTEST_F(AuthTestCallBackTest, AUTH_CALLBACK_TEST_001, TestSize.Level1)
274 {
275 GroupAuthManager authManager;
276 DeviceGroupManager groupManager;
277 NiceMock<AuthCommonInterfaceMock> commMock;
278 NiceMock<LnnHichainInterfaceMock> hichainMock;
279 NiceMock<AuthNetLedgertInterfaceMock> ledgerMock;
280 NiceMock<LnnSocketInterfaceMock> socketMock;
281 MockInterfaces mockInterface = {
282 .commMock = &commMock,
283 .hichainMock = &hichainMock,
284 .ledgerMock = &ledgerMock,
285 .socketMock = &socketMock,
286 };
287 AuthInitMock(commMock, hichainMock, authManager, groupManager);
288 ClientFSMCreate(&mockInterface, authManager, groupManager);
289 WaitForSignal();
290 char *data = AuthNetLedgertInterfaceMock::Pack(SEQ_SERVER, &info, devIdHead);
291 AuthCommonInterfaceMock::g_conncallback.OnDataReceived(g_connId, MODULE_ID, SEQ_SERVER, data, TEST_DATA_LEN);
292 authManager.processData = LnnHichainInterfaceMock::ActionOfProcessData;
293 HichainProcessData(SEQ_SERVER, DEVICE_INFO, TEST_DATA_LEN);
294 EXPECT_CALL(commMock, ConnPostBytes).WillRepeatedly(DoAll(SendSignal, Return(SOFTBUS_OK)));
295 LnnHichainInterfaceMock::g_devAuthCb.onTransmit(SEQ_SERVER, DEVICE_INFO, TEST_DATA_LEN);
296 EXPECT_TRUE(AuthNetLedgertInterfaceMock::isRuned == true);
297 WaitForSignal();
298 SoftBusFree(data);
299 char *data2 = AuthNetLedgertInterfaceMock::Pack(SEQ_SERVER, &info, devAuthHead);
300 AuthCommonInterfaceMock::g_conncallback.OnDataReceived(g_connId, MODULE_ID, SEQ_SERVER, data2, TEST_DATA_LEN);
301 WaitForSignal();
302 SoftBusFree(data2);
303 EXPECT_CALL(commMock, LnnGetNetworkIdByUuid).WillRepeatedly(Return(SOFTBUS_OK));
304 LnnHichainInterfaceMock::g_devAuthCb.onSessionKeyReturned(SEQ_SERVER, g_sessionKey, SESSION_KEY_LENGTH);
305 WaitForSignal();
306 EXPECT_CALL(commMock, ConnPostBytes).WillRepeatedly(DoAll(SendSignal, Return(SOFTBUS_OK)));
307 LnnHichainInterfaceMock::g_devAuthCb.onFinish(SEQ_SERVER, OPER_CODE, g_retData);
308 WaitForSignal();
309 EXPECT_CALL(commMock, ConnPostBytes)
310 .WillRepeatedly(DoAll(SendSignal, AuthCommonInterfaceMock::ActionOfConnPostBytes));
311 PostDeviceInfoMessage(SEQ_SERVER, &info2);
312 WaitForSignal();
313 AuthCommonInterfaceMock::g_conncallback.OnDataReceived(
314 g_connId, MODULE_ID, SEQ_SERVER, AuthCommonInterfaceMock::g_encryptData, TEST_DATA_LEN);
315 WaitForSignal();
316 char *data4 = AuthNetLedgertInterfaceMock::Pack(SEQ_SERVER, &info, closeAckHead);
317 AuthCommonInterfaceMock::g_conncallback.OnDataReceived(g_connId, MODULE_ID, SEQ_SERVER, data4, TEST_DATA_LEN);
318 WaitForSignal();
319 SoftBusFree(data4);
320 }
321 } // namespace OHOS