1 /*
2 * Copyright (c) 2022-2025 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include <cinttypes>
17 #include <gtest/gtest.h>
18 #include <securec.h>
19 #include <sys/time.h>
20
21 #include "auth_common.h"
22 #include "auth_common_mock.h"
23 #include "auth_hichain.h"
24 #include "auth_interface.h"
25 #include "auth_log.h"
26 #include "auth_manager.h"
27 #include "auth_net_ledger_mock.h"
28 #include "auth_request.h"
29 #include "auth_session_message.h"
30 #include "bus_center_adapter.h"
31 #include "lnn_hichain_mock.h"
32 #include "lnn_socket_mock.h"
33 #include "message_handler.h"
34 #include "softbus_access_token_test.h"
35 #include "softbus_adapter_bt_common.h"
36 #include "softbus_adapter_mem.h"
37 #include "softbus_error_code.h"
38 #include "softbus_feature_config.h"
39
40 namespace OHOS {
41 using namespace testing;
42 using namespace testing::ext;
43 #define TEST_UDID "123456ABCDEF"
44 #define TEST_UUID "6984321642"
45 #define DEV_NAME "DEVTEST"
46 #define TEST_MAC "11:22:33:44:55:66"
47 #define TEST_NETWORKID "ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00"
48 #define VERSION_TYPE_LITE "LITE"
49 static const uint32_t REQUEST_ID = 88;
50 static const bool TEST_IS_P2P = false;
51 static const int64_t SEQ_SERVER = 3;
52 static const int32_t TEST_P2P_ROLE = 1;
53 static const uint32_t TEST_NET_CAPACITY = 3;
54 static const uint16_t TEST_DATA_CHANGE_FLAG = 1;
55 static const uint64_t TEST_SUP_PROTOCOLS = 453213535465;
56 static const ConnModule MODULE_ID = MODULE_DEVICE_AUTH;
57 static const uint8_t DEVICE_INFO[5] = { 0x10, 0x2, 0x14, 0x08, 0x06 };
58 uint8_t g_sessionKey[SESSION_KEY_LENGTH];
59 static const int32_t TEST_DATA_LEN = 600;
60 static const int32_t OPER_CODE = 0;
61 static const int32_t DELAY_TIME = 15;
62 static const char *g_retData = nullptr;
63 static uint64_t g_connId = 8590065691;
64 const AuthConnInfo g_connInfo = {
65 .type = AUTH_LINK_TYPE_BR,
66 .info.brInfo.brMac = TEST_MAC,
67 .peerUid = "002",
68 };
69 const AuthVerifyCallback callBack = {
70 .onVerifyPassed = AuthCommonInterfaceMock::OnVerifyPassed,
71 .onVerifyFailed = AuthCommonInterfaceMock::OnVerifyFailed,
72 };
73 const AuthSessionInfo info = {
74 .isServer = true,
75 .connInfo = g_connInfo,
76 };
77 const AuthSessionInfo info2 = {
78 .isServer = false,
79 .connId = g_connId,
80 .connInfo = g_connInfo,
81 };
82 struct MockInterfaces {
83 AuthCommonInterfaceMock *connMock;
84 LnnHichainInterfaceMock *hichainMock;
85 AuthNetLedgertInterfaceMock *ledgerMock;
86 LnnSocketInterfaceMock *socketMock;
87 AuthCommonInterfaceMock *authMock;
88 };
89 AuthDataHead devIdHead = {
90 .dataType = DATA_TYPE_DEVICE_ID,
91 .module = MODULE_DEVICE_AUTH,
92 .seq = SEQ_SERVER,
93 .flag = SERVER_SIDE_FLAG,
94 };
95 AuthDataHead devAuthHead = {
96 .dataType = DATA_TYPE_AUTH,
97 .module = MODULE_DEVICE_AUTH,
98 .seq = SEQ_SERVER,
99 .flag = SERVER_SIDE_FLAG,
100 };
101 AuthDataHead devInfoAuthHead = {
102 .dataType = DATA_TYPE_DEVICE_INFO,
103 .module = MODULE_DEVICE_AUTH,
104 .seq = SEQ_SERVER,
105 .flag = SERVER_SIDE_FLAG,
106 };
107 AuthDataHead closeAckHead = {
108 .dataType = DATA_TYPE_CLOSE_ACK,
109 .module = MODULE_DEVICE_AUTH,
110 .seq = SEQ_SERVER,
111 .flag = SERVER_SIDE_FLAG,
112 };
113 AuthVerifyListener g_listener = {
114 .onDeviceVerifyPass = &AuthNetLedgertInterfaceMock::OnDeviceVerifyPass,
115 .onDeviceNotTrusted = &AuthNetLedgertInterfaceMock::OnDeviceNotTrusted,
116 .onDeviceDisconnect = &AuthNetLedgertInterfaceMock::OnDeviceDisconnect,
117 };
118 NodeInfo g_localInfo = {
119 .versionType = VERSION_TYPE_LITE,
120 .uuid = TEST_UUID,
121 .networkId = TEST_NETWORKID,
122 .netCapacity = TEST_NET_CAPACITY,
123 .isBleP2p = TEST_IS_P2P,
124 .p2pInfo.p2pMac = TEST_MAC,
125 .supportedProtocols = TEST_SUP_PROTOCOLS,
126 .dataChangeFlag = TEST_DATA_CHANGE_FLAG,
127 };
SendSignal()128 void SendSignal()
129 {
130 AUTH_LOGI(AUTH_TEST, "SendSignal");
131 if (SoftBusMutexLock(&LnnHichainInterfaceMock::mutex) != SOFTBUS_OK) {
132 AUTH_LOGE(AUTH_TEST, "SendSignal Lock failed");
133 return;
134 }
135 AuthNetLedgertInterfaceMock::isRuned = true;
136 (void)SoftBusCondSignal(&LnnHichainInterfaceMock::cond);
137 (void)SoftBusMutexUnlock(&LnnHichainInterfaceMock::mutex);
138 AUTH_LOGI(AUTH_TEST, "SendSignal end");
139 }
140
SetAuthVerifyParam(AuthVerifyParam * authVerifyParam)141 static void SetAuthVerifyParam(AuthVerifyParam *authVerifyParam)
142 {
143 (void)memset_s(authVerifyParam, sizeof(*authVerifyParam), 0, sizeof(*authVerifyParam));
144 authVerifyParam->isFastAuth = true;
145 authVerifyParam->module = AUTH_MODULE_LNN;
146 authVerifyParam->requestId = REQUEST_ID;
147 authVerifyParam->deviceKeyId.hasDeviceKeyId = false;
148 authVerifyParam->deviceKeyId.localDeviceKeyId = AUTH_INVALID_DEVICEKEY_ID;
149 authVerifyParam->deviceKeyId.remoteDeviceKeyId = AUTH_INVALID_DEVICEKEY_ID;
150 }
151
SetDeviceKeyIdParam(DeviceKeyId * deviceKeyId)152 static void SetDeviceKeyIdParam(DeviceKeyId *deviceKeyId)
153 {
154 (void)memset_s(deviceKeyId, sizeof(*deviceKeyId), 0, sizeof(*deviceKeyId));
155 deviceKeyId->hasDeviceKeyId = false;
156 deviceKeyId->localDeviceKeyId = AUTH_INVALID_DEVICEKEY_ID;
157 deviceKeyId->remoteDeviceKeyId = AUTH_INVALID_DEVICEKEY_ID;
158 }
159
ClientFSMCreate(MockInterfaces * mockInterface,GroupAuthManager & authManager,DeviceGroupManager & groupManager)160 void ClientFSMCreate(MockInterfaces *mockInterface, GroupAuthManager &authManager, DeviceGroupManager &groupManager)
161 {
162 bool isServer = false;
163 memset_s(g_localInfo.offlineCode, OFFLINE_CODE_BYTE_SIZE, 0, OFFLINE_CODE_BYTE_SIZE);
164 ON_CALL(*mockInterface->connMock, ConnConnectDevice(_, _, _)).WillByDefault(Return(SOFTBUS_OK));
165 groupManager.regDataChangeListener = LnnHichainInterfaceMock::InvokeDataChangeListener;
166 groupManager.unRegDataChangeListener = LnnHichainInterfaceMock::ActionofunRegDataChangeListener;
167 authManager.authDevice = LnnHichainInterfaceMock::InvokeAuthDevice;
168 ON_CALL(*mockInterface->connMock, ConnSetConnectCallback(_, _))
169 .WillByDefault(AuthCommonInterfaceMock::ActionofConnSetConnectCallback);
170 ON_CALL(*mockInterface->connMock, ConnGetHeadSize()).WillByDefault(Return(sizeof(ConnPktHead)));
171 ON_CALL(*mockInterface->hichainMock, InitDeviceAuthService()).WillByDefault(Return(0));
172 ON_CALL(*mockInterface->hichainMock, GetGaInstance()).WillByDefault(Return(&authManager));
173 ON_CALL(*mockInterface->hichainMock, GetGmInstance()).WillByDefault(Return(&groupManager));
174 ON_CALL(*mockInterface->ledgerMock, LnnGetLocalStrInfo).WillByDefault(Return(SOFTBUS_OK));
175 ON_CALL(*mockInterface->authMock, LnnAsyncCallbackDelayHelper(_, _, _, _)).WillByDefault(Return(SOFTBUS_OK));
176 int32_t ret = AuthInit();
177 EXPECT_TRUE(ret == SOFTBUS_OK);
178 ON_CALL(*mockInterface->connMock, ConnPostBytes).WillByDefault(Return(SOFTBUS_OK));
179 ON_CALL(*mockInterface->socketMock, ConnOpenClientSocket(_, _, _)).WillByDefault(Return(SOFTBUS_OK));
180 ON_CALL(*mockInterface->connMock, ConnGetConnectionInfo)
181 .WillByDefault(AuthCommonInterfaceMock::ActionofConnGetConnectionInfo);
182 ON_CALL(*mockInterface->ledgerMock, LnnGetDeviceName).WillByDefault(Return(DEV_NAME));
183 ON_CALL(*mockInterface->ledgerMock, LnnConvertIdToDeviceType).WillByDefault(Return(const_cast<char *>(TYPE_PAD)));
184 ON_CALL(*mockInterface->ledgerMock, LnnGetDeviceUdid).WillByDefault(Return(TEST_UDID));
185 ON_CALL(*mockInterface->ledgerMock, LnnGetP2pRole).WillByDefault(Return(TEST_P2P_ROLE));
186 ON_CALL(*mockInterface->ledgerMock, LnnGetP2pMac).WillByDefault(Return(TEST_MAC));
187 ON_CALL(*mockInterface->ledgerMock, LnnGetSupportedProtocols).WillByDefault(Return(TEST_SUP_PROTOCOLS));
188 ON_CALL(*mockInterface->ledgerMock, LnnGetLocalNodeInfo).WillByDefault(Return(&g_localInfo));
189 ON_CALL(*mockInterface->ledgerMock, LnnGetBtMac).WillByDefault(Return(TEST_MAC));
190 ON_CALL(*mockInterface->ledgerMock, LnnGetLocalByteInfo).WillByDefault(Return(SOFTBUS_OK));
191 ON_CALL(*mockInterface->authMock, SoftBusGetBtState).WillByDefault(Return(BLE_ENABLE));
192 ON_CALL(*mockInterface->authMock, SoftBusGenerateStrHash).WillByDefault(Return(SOFTBUS_OK));
193 const unsigned char val = 0x01;
194 SoftbusSetConfig(SOFTBUS_INT_AUTH_ABILITY_COLLECTION, &val, sizeof(val));
195 AuthVerifyParam authVerifyParam;
196 SetAuthVerifyParam(&authVerifyParam);
197 ret = AuthStartVerify(&g_connInfo, &authVerifyParam, &callBack);
198 EXPECT_TRUE(ret == SOFTBUS_OK);
199 AuthParam authInfo = {
200 .authSeq = SEQ_SERVER,
201 .requestId = REQUEST_ID,
202 .connId = g_connId,
203 .isServer = isServer,
204 .isFastAuth = false,
205 };
206 DeviceKeyId deviceKeyId;
207 SetDeviceKeyIdParam(&deviceKeyId);
208 AuthSessionStartAuth(&authInfo, &g_connInfo, &deviceKeyId);
209 SoftBusSleepMs(DELAY_TIME);
210 }
211
WaitForSignal()212 bool WaitForSignal()
213 {
214 #define USECTONSEC 1000LL
215 SoftBusSysTime now;
216 if (SoftBusGetTime(&now) != SOFTBUS_OK) {
217 AUTH_LOGE(AUTH_TEST, "BrSoftBusCondWait SoftBusGetTime failed");
218 return false;
219 }
220 int64_t time = now.sec * USECTONSEC * USECTONSEC + now.usec + DELAY_TIME * USECTONSEC;
221 SoftBusSysTime tv;
222 tv.sec = time / USECTONSEC / USECTONSEC;
223 tv.usec = time % (USECTONSEC * USECTONSEC);
224 if (SoftBusMutexLock(&LnnHichainInterfaceMock::mutex) != SOFTBUS_OK) {
225 AUTH_LOGE(AUTH_TEST, "Wait signal Lock failed");
226 return false;
227 }
228 if (!AuthNetLedgertInterfaceMock::isRuned) {
229 int32_t ret = SoftBusCondWait(&LnnHichainInterfaceMock::cond, &LnnHichainInterfaceMock::mutex, &tv);
230 (void)SoftBusMutexUnlock(&LnnHichainInterfaceMock::mutex);
231 return (ret == SOFTBUS_OK);
232 } else {
233 (void)SoftBusMutexUnlock(&LnnHichainInterfaceMock::mutex);
234 SoftBusSleepMs(DELAY_TIME);
235 AuthNetLedgertInterfaceMock::isRuned = false;
236 }
237 return true;
238 }
239
CreateInfo(NodeInfo & nodeInfo)240 NodeInfo CreateInfo(NodeInfo &nodeInfo)
241 {
242 return nodeInfo;
243 }
244
245 class AuthTestCallBackTest : public testing::Test {
246 public:
247 static void SetUpTestCase();
248 static void TearDownTestCase();
249 void SetUp();
250 void TearDown();
251 };
252
SetUpTestCase()253 void AuthTestCallBackTest::SetUpTestCase()
254 {
255 AuthNetLedgertInterfaceMock::isRuned = false;
256 RegAuthVerifyListener(&g_listener);
257 (void)SoftBusMutexInit(&LnnHichainInterfaceMock::mutex, nullptr);
258 SoftBusCondInit(&LnnHichainInterfaceMock::cond);
259 }
260
TearDownTestCase()261 void AuthTestCallBackTest::TearDownTestCase()
262 {
263 AuthNetLedgertInterfaceMock::isRuned = false;
264 SoftBusCondDestroy(&LnnHichainInterfaceMock::cond);
265 SoftBusMutexDestroy(&LnnHichainInterfaceMock::mutex);
266 }
267
SetUp()268 void AuthTestCallBackTest::SetUp()
269 {
270 LooperInit();
271 AUTH_LOGI(AUTH_TEST, "AuthTestCallBackTest start.");
272 }
273
TearDown()274 void AuthTestCallBackTest::TearDown()
275 {
276 LooperDeinit();
277 }
278
AuthInitMock(AuthCommonInterfaceMock & connMock,LnnHichainInterfaceMock & hichainMock,GroupAuthManager authManager,DeviceGroupManager groupManager)279 void AuthInitMock(AuthCommonInterfaceMock &connMock, LnnHichainInterfaceMock &hichainMock, GroupAuthManager authManager,
280 DeviceGroupManager groupManager)
281 {
282 groupManager.regDataChangeListener = LnnHichainInterfaceMock::InvokeDataChangeListener;
283 authManager.authDevice = LnnHichainInterfaceMock::InvokeAuthDevice;
284 groupManager.unRegDataChangeListener = LnnHichainInterfaceMock::ActionofunRegDataChangeListener;
285 ON_CALL(connMock, ConnSetConnectCallback(_, _)).WillByDefault(Return(SOFTBUS_OK));
286 ON_CALL(hichainMock, InitDeviceAuthService()).WillByDefault(Return(0));
287 ON_CALL(hichainMock, GetGaInstance()).WillByDefault(Return(&authManager));
288 ON_CALL(hichainMock, GetGmInstance()).WillByDefault(Return(&groupManager));
289 }
290
291 /*
292 * @tc.name: AUTH_CALLBACK_TEST_001
293 * @tc.desc: auth callback test
294 * @tc.type: FUNC
295 * @tc.require:
296 */
297
298 HWTEST_F(AuthTestCallBackTest, AUTH_CALLBACK_TEST_001, TestSize.Level1)
299 {
300 GroupAuthManager authManager;
301 DeviceGroupManager groupManager;
302 NiceMock<AuthCommonInterfaceMock> connMock;
303 NiceMock<LnnHichainInterfaceMock> hichainMock;
304 NiceMock<AuthNetLedgertInterfaceMock> ledgerMock;
305 NiceMock<LnnSocketInterfaceMock> socketMock;
306 NiceMock<AuthCommonInterfaceMock> authMock;
307 MockInterfaces mockInterface = {
308 .connMock = &connMock,
309 .hichainMock = &hichainMock,
310 .ledgerMock = &ledgerMock,
311 .socketMock = &socketMock,
312 .authMock = &authMock,
313 };
314 AuthInitMock(connMock, hichainMock, authManager, groupManager);
315 ClientFSMCreate(&mockInterface, authManager, groupManager);
316 WaitForSignal();
317 char *data = AuthNetLedgertInterfaceMock::Pack(SEQ_SERVER, &info, devIdHead);
318 if (AuthCommonInterfaceMock::g_conncallback.OnDataReceived != NULL) {
319 AuthCommonInterfaceMock::g_conncallback.OnDataReceived(g_connId, MODULE_ID, SEQ_SERVER, data, TEST_DATA_LEN);
320 }
321 authManager.processData = LnnHichainInterfaceMock::ActionOfProcessData;
322 HichainProcessData(SEQ_SERVER, DEVICE_INFO, TEST_DATA_LEN, HICHAIN_AUTH_DEVICE);
323 EXPECT_CALL(connMock, ConnPostBytes).WillRepeatedly(DoAll(SendSignal, Return(SOFTBUS_OK)));
324 LnnHichainInterfaceMock::g_devAuthCb.onTransmit(SEQ_SERVER, DEVICE_INFO, TEST_DATA_LEN);
325 EXPECT_TRUE(AuthNetLedgertInterfaceMock::isRuned == false);
326 WaitForSignal();
327 SoftBusFree(data);
328 char *data2 = AuthNetLedgertInterfaceMock::Pack(SEQ_SERVER, &info, devAuthHead);
329 if (AuthCommonInterfaceMock::g_conncallback.OnDataReceived != NULL) {
330 AuthCommonInterfaceMock::g_conncallback.OnDataReceived(g_connId, MODULE_ID, SEQ_SERVER, data2, TEST_DATA_LEN);
331 }
332 WaitForSignal();
333 SoftBusFree(data2);
334 EXPECT_CALL(authMock, LnnGetNetworkIdByUuid).WillRepeatedly(Return(SOFTBUS_OK));
335 LnnHichainInterfaceMock::g_devAuthCb.onSessionKeyReturned(SEQ_SERVER, g_sessionKey, SESSION_KEY_LENGTH);
336 WaitForSignal();
337 EXPECT_CALL(connMock, ConnPostBytes).WillRepeatedly(DoAll(SendSignal, Return(SOFTBUS_OK)));
338 LnnHichainInterfaceMock::g_devAuthCb.onFinish(SEQ_SERVER, OPER_CODE, g_retData);
339 WaitForSignal();
340 EXPECT_CALL(connMock, ConnPostBytes)
341 .WillRepeatedly(DoAll(SendSignal, AuthCommonInterfaceMock::ActionOfConnPostBytes));
342 PostDeviceInfoMessage(SEQ_SERVER, &info2);
343 WaitForSignal();
344 }
345
346 /*
347 * @tc.name: AUTH_CALLBACK_TEST_002
348 * @tc.desc: auth callback test
349 * @tc.type: FUNC
350 * @tc.require:
351 */
352
353 HWTEST_F(AuthTestCallBackTest, AUTH_CALLBACK_TEST_002, TestSize.Level1)
354 {
355 GroupAuthManager authManager;
356 DeviceGroupManager groupManager;
357 NiceMock<AuthCommonInterfaceMock> connMock;
358 NiceMock<LnnHichainInterfaceMock> hichainMock;
359 NiceMock<AuthNetLedgertInterfaceMock> ledgerMock;
360 NiceMock<LnnSocketInterfaceMock> socketMock;
361 NiceMock<AuthCommonInterfaceMock> authMock;
362 MockInterfaces mockInterface = {
363 .connMock = &connMock,
364 .hichainMock = &hichainMock,
365 .ledgerMock = &ledgerMock,
366 .socketMock = &socketMock,
367 .authMock = &authMock,
368 };
369 AuthInitMock(connMock, hichainMock, authManager, groupManager);
370 ClientFSMCreate(&mockInterface, authManager, groupManager);
371 WaitForSignal();
372 if (AuthCommonInterfaceMock::g_conncallback.OnDataReceived != NULL) {
373 AuthCommonInterfaceMock::g_conncallback.OnDataReceived(
374 g_connId, MODULE_ID, SEQ_SERVER, AuthCommonInterfaceMock::g_encryptData, TEST_DATA_LEN);
375 }
376 WaitForSignal();
377 char *data4 = AuthNetLedgertInterfaceMock::Pack(SEQ_SERVER, &info, closeAckHead);
378 if (AuthCommonInterfaceMock::g_conncallback.OnDataReceived != NULL) {
379 AuthCommonInterfaceMock::g_conncallback.OnDataReceived(g_connId, MODULE_ID, SEQ_SERVER, data4, TEST_DATA_LEN);
380 }
381 WaitForSignal();
382 SoftBusFree(data4);
383 }
384 } // namespace OHOS