• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2022-2025 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include <cinttypes>
17 #include <gtest/gtest.h>
18 #include <securec.h>
19 #include <sys/time.h>
20 
21 #include "auth_common.h"
22 #include "auth_common_mock.h"
23 #include "auth_hichain.h"
24 #include "auth_interface.h"
25 #include "auth_log.h"
26 #include "auth_manager.h"
27 #include "auth_net_ledger_mock.h"
28 #include "auth_request.h"
29 #include "auth_session_message.h"
30 #include "bus_center_adapter.h"
31 #include "lnn_hichain_mock.h"
32 #include "lnn_socket_mock.h"
33 #include "message_handler.h"
34 #include "softbus_access_token_test.h"
35 #include "softbus_adapter_bt_common.h"
36 #include "softbus_adapter_mem.h"
37 #include "softbus_error_code.h"
38 #include "softbus_feature_config.h"
39 
40 namespace OHOS {
41 using namespace testing;
42 using namespace testing::ext;
43 #define TEST_UDID         "123456ABCDEF"
44 #define TEST_UUID         "6984321642"
45 #define DEV_NAME          "DEVTEST"
46 #define TEST_MAC          "11:22:33:44:55:66"
47 #define TEST_NETWORKID    "ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00ABCDEF00"
48 #define VERSION_TYPE_LITE "LITE"
49 static const uint32_t REQUEST_ID = 88;
50 static const bool TEST_IS_P2P = false;
51 static const int64_t SEQ_SERVER = 3;
52 static const int32_t TEST_P2P_ROLE = 1;
53 static const uint32_t TEST_NET_CAPACITY = 3;
54 static const uint16_t TEST_DATA_CHANGE_FLAG = 1;
55 static const uint64_t TEST_SUP_PROTOCOLS = 453213535465;
56 static const ConnModule MODULE_ID = MODULE_DEVICE_AUTH;
57 static const uint8_t DEVICE_INFO[5] = { 0x10, 0x2, 0x14, 0x08, 0x06 };
58 uint8_t g_sessionKey[SESSION_KEY_LENGTH];
59 static const int32_t TEST_DATA_LEN = 600;
60 static const int32_t OPER_CODE = 0;
61 static const int32_t DELAY_TIME = 15;
62 static const char *g_retData = nullptr;
63 static uint64_t g_connId = 8590065691;
64 const AuthConnInfo g_connInfo = {
65     .type = AUTH_LINK_TYPE_BR,
66     .info.brInfo.brMac = TEST_MAC,
67     .peerUid = "002",
68 };
69 const AuthVerifyCallback callBack = {
70     .onVerifyPassed = AuthCommonInterfaceMock::OnVerifyPassed,
71     .onVerifyFailed = AuthCommonInterfaceMock::OnVerifyFailed,
72 };
73 const AuthSessionInfo info = {
74     .isServer = true,
75     .connInfo = g_connInfo,
76 };
77 const AuthSessionInfo info2 = {
78     .isServer = false,
79     .connId = g_connId,
80     .connInfo = g_connInfo,
81 };
82 struct MockInterfaces {
83     AuthCommonInterfaceMock *connMock;
84     LnnHichainInterfaceMock *hichainMock;
85     AuthNetLedgertInterfaceMock *ledgerMock;
86     LnnSocketInterfaceMock *socketMock;
87     AuthCommonInterfaceMock *authMock;
88 };
89 AuthDataHead devIdHead = {
90     .dataType = DATA_TYPE_DEVICE_ID,
91     .module = MODULE_DEVICE_AUTH,
92     .seq = SEQ_SERVER,
93     .flag = SERVER_SIDE_FLAG,
94 };
95 AuthDataHead devAuthHead = {
96     .dataType = DATA_TYPE_AUTH,
97     .module = MODULE_DEVICE_AUTH,
98     .seq = SEQ_SERVER,
99     .flag = SERVER_SIDE_FLAG,
100 };
101 AuthDataHead devInfoAuthHead = {
102     .dataType = DATA_TYPE_DEVICE_INFO,
103     .module = MODULE_DEVICE_AUTH,
104     .seq = SEQ_SERVER,
105     .flag = SERVER_SIDE_FLAG,
106 };
107 AuthDataHead closeAckHead = {
108     .dataType = DATA_TYPE_CLOSE_ACK,
109     .module = MODULE_DEVICE_AUTH,
110     .seq = SEQ_SERVER,
111     .flag = SERVER_SIDE_FLAG,
112 };
113 AuthVerifyListener g_listener = {
114     .onDeviceVerifyPass = &AuthNetLedgertInterfaceMock::OnDeviceVerifyPass,
115     .onDeviceNotTrusted = &AuthNetLedgertInterfaceMock::OnDeviceNotTrusted,
116     .onDeviceDisconnect = &AuthNetLedgertInterfaceMock::OnDeviceDisconnect,
117 };
118 NodeInfo g_localInfo = {
119     .versionType = VERSION_TYPE_LITE,
120     .uuid = TEST_UUID,
121     .networkId = TEST_NETWORKID,
122     .netCapacity = TEST_NET_CAPACITY,
123     .isBleP2p = TEST_IS_P2P,
124     .p2pInfo.p2pMac = TEST_MAC,
125     .supportedProtocols = TEST_SUP_PROTOCOLS,
126     .dataChangeFlag = TEST_DATA_CHANGE_FLAG,
127 };
SendSignal()128 void SendSignal()
129 {
130     AUTH_LOGI(AUTH_TEST, "SendSignal");
131     if (SoftBusMutexLock(&LnnHichainInterfaceMock::mutex) != SOFTBUS_OK) {
132         AUTH_LOGE(AUTH_TEST, "SendSignal Lock failed");
133         return;
134     }
135     AuthNetLedgertInterfaceMock::isRuned = true;
136     (void)SoftBusCondSignal(&LnnHichainInterfaceMock::cond);
137     (void)SoftBusMutexUnlock(&LnnHichainInterfaceMock::mutex);
138     AUTH_LOGI(AUTH_TEST, "SendSignal end");
139 }
140 
SetAuthVerifyParam(AuthVerifyParam * authVerifyParam)141 static void SetAuthVerifyParam(AuthVerifyParam *authVerifyParam)
142 {
143     (void)memset_s(authVerifyParam, sizeof(*authVerifyParam), 0, sizeof(*authVerifyParam));
144     authVerifyParam->isFastAuth = true;
145     authVerifyParam->module = AUTH_MODULE_LNN;
146     authVerifyParam->requestId = REQUEST_ID;
147     authVerifyParam->deviceKeyId.hasDeviceKeyId = false;
148     authVerifyParam->deviceKeyId.localDeviceKeyId = AUTH_INVALID_DEVICEKEY_ID;
149     authVerifyParam->deviceKeyId.remoteDeviceKeyId = AUTH_INVALID_DEVICEKEY_ID;
150 }
151 
SetDeviceKeyIdParam(DeviceKeyId * deviceKeyId)152 static void SetDeviceKeyIdParam(DeviceKeyId *deviceKeyId)
153 {
154     (void)memset_s(deviceKeyId, sizeof(*deviceKeyId), 0, sizeof(*deviceKeyId));
155     deviceKeyId->hasDeviceKeyId = false;
156     deviceKeyId->localDeviceKeyId = AUTH_INVALID_DEVICEKEY_ID;
157     deviceKeyId->remoteDeviceKeyId = AUTH_INVALID_DEVICEKEY_ID;
158 }
159 
ClientFSMCreate(MockInterfaces * mockInterface,GroupAuthManager & authManager,DeviceGroupManager & groupManager)160 void ClientFSMCreate(MockInterfaces *mockInterface, GroupAuthManager &authManager, DeviceGroupManager &groupManager)
161 {
162     bool isServer = false;
163     memset_s(g_localInfo.offlineCode, OFFLINE_CODE_BYTE_SIZE, 0, OFFLINE_CODE_BYTE_SIZE);
164     ON_CALL(*mockInterface->connMock, ConnConnectDevice(_, _, _)).WillByDefault(Return(SOFTBUS_OK));
165     groupManager.regDataChangeListener = LnnHichainInterfaceMock::InvokeDataChangeListener;
166     groupManager.unRegDataChangeListener = LnnHichainInterfaceMock::ActionofunRegDataChangeListener;
167     authManager.authDevice = LnnHichainInterfaceMock::InvokeAuthDevice;
168     ON_CALL(*mockInterface->connMock, ConnSetConnectCallback(_, _))
169         .WillByDefault(AuthCommonInterfaceMock::ActionofConnSetConnectCallback);
170     ON_CALL(*mockInterface->connMock, ConnGetHeadSize()).WillByDefault(Return(sizeof(ConnPktHead)));
171     ON_CALL(*mockInterface->hichainMock, InitDeviceAuthService()).WillByDefault(Return(0));
172     ON_CALL(*mockInterface->hichainMock, GetGaInstance()).WillByDefault(Return(&authManager));
173     ON_CALL(*mockInterface->hichainMock, GetGmInstance()).WillByDefault(Return(&groupManager));
174     ON_CALL(*mockInterface->ledgerMock, LnnGetLocalStrInfo).WillByDefault(Return(SOFTBUS_OK));
175     ON_CALL(*mockInterface->authMock, LnnAsyncCallbackDelayHelper(_, _, _, _)).WillByDefault(Return(SOFTBUS_OK));
176     int32_t ret = AuthInit();
177     EXPECT_TRUE(ret == SOFTBUS_OK);
178     ON_CALL(*mockInterface->connMock, ConnPostBytes).WillByDefault(Return(SOFTBUS_OK));
179     ON_CALL(*mockInterface->socketMock, ConnOpenClientSocket(_, _, _)).WillByDefault(Return(SOFTBUS_OK));
180     ON_CALL(*mockInterface->connMock, ConnGetConnectionInfo)
181         .WillByDefault(AuthCommonInterfaceMock::ActionofConnGetConnectionInfo);
182     ON_CALL(*mockInterface->ledgerMock, LnnGetDeviceName).WillByDefault(Return(DEV_NAME));
183     ON_CALL(*mockInterface->ledgerMock, LnnConvertIdToDeviceType).WillByDefault(Return(const_cast<char *>(TYPE_PAD)));
184     ON_CALL(*mockInterface->ledgerMock, LnnGetDeviceUdid).WillByDefault(Return(TEST_UDID));
185     ON_CALL(*mockInterface->ledgerMock, LnnGetP2pRole).WillByDefault(Return(TEST_P2P_ROLE));
186     ON_CALL(*mockInterface->ledgerMock, LnnGetP2pMac).WillByDefault(Return(TEST_MAC));
187     ON_CALL(*mockInterface->ledgerMock, LnnGetSupportedProtocols).WillByDefault(Return(TEST_SUP_PROTOCOLS));
188     ON_CALL(*mockInterface->ledgerMock, LnnGetLocalNodeInfo).WillByDefault(Return(&g_localInfo));
189     ON_CALL(*mockInterface->ledgerMock, LnnGetBtMac).WillByDefault(Return(TEST_MAC));
190     ON_CALL(*mockInterface->ledgerMock, LnnGetLocalByteInfo).WillByDefault(Return(SOFTBUS_OK));
191     ON_CALL(*mockInterface->authMock, SoftBusGetBtState).WillByDefault(Return(BLE_ENABLE));
192     ON_CALL(*mockInterface->authMock, SoftBusGenerateStrHash).WillByDefault(Return(SOFTBUS_OK));
193     const unsigned char val = 0x01;
194     SoftbusSetConfig(SOFTBUS_INT_AUTH_ABILITY_COLLECTION, &val, sizeof(val));
195     AuthVerifyParam authVerifyParam;
196     SetAuthVerifyParam(&authVerifyParam);
197     ret = AuthStartVerify(&g_connInfo, &authVerifyParam, &callBack);
198     EXPECT_TRUE(ret == SOFTBUS_OK);
199     AuthParam authInfo = {
200         .authSeq = SEQ_SERVER,
201         .requestId = REQUEST_ID,
202         .connId = g_connId,
203         .isServer = isServer,
204         .isFastAuth = false,
205     };
206     DeviceKeyId deviceKeyId;
207     SetDeviceKeyIdParam(&deviceKeyId);
208     AuthSessionStartAuth(&authInfo, &g_connInfo, &deviceKeyId);
209     SoftBusSleepMs(DELAY_TIME);
210 }
211 
WaitForSignal()212 bool WaitForSignal()
213 {
214 #define USECTONSEC 1000LL
215     SoftBusSysTime now;
216     if (SoftBusGetTime(&now) != SOFTBUS_OK) {
217         AUTH_LOGE(AUTH_TEST, "BrSoftBusCondWait SoftBusGetTime failed");
218         return false;
219     }
220     int64_t time = now.sec * USECTONSEC * USECTONSEC + now.usec + DELAY_TIME * USECTONSEC;
221     SoftBusSysTime tv;
222     tv.sec = time / USECTONSEC / USECTONSEC;
223     tv.usec = time % (USECTONSEC * USECTONSEC);
224     if (SoftBusMutexLock(&LnnHichainInterfaceMock::mutex) != SOFTBUS_OK) {
225         AUTH_LOGE(AUTH_TEST, "Wait signal Lock failed");
226         return false;
227     }
228     if (!AuthNetLedgertInterfaceMock::isRuned) {
229         int32_t ret = SoftBusCondWait(&LnnHichainInterfaceMock::cond, &LnnHichainInterfaceMock::mutex, &tv);
230         (void)SoftBusMutexUnlock(&LnnHichainInterfaceMock::mutex);
231         return (ret == SOFTBUS_OK);
232     } else {
233         (void)SoftBusMutexUnlock(&LnnHichainInterfaceMock::mutex);
234         SoftBusSleepMs(DELAY_TIME);
235         AuthNetLedgertInterfaceMock::isRuned = false;
236     }
237     return true;
238 }
239 
CreateInfo(NodeInfo & nodeInfo)240 NodeInfo CreateInfo(NodeInfo &nodeInfo)
241 {
242     return nodeInfo;
243 }
244 
245 class AuthTestCallBackTest : public testing::Test {
246 public:
247     static void SetUpTestCase();
248     static void TearDownTestCase();
249     void SetUp();
250     void TearDown();
251 };
252 
SetUpTestCase()253 void AuthTestCallBackTest::SetUpTestCase()
254 {
255     AuthNetLedgertInterfaceMock::isRuned = false;
256     RegAuthVerifyListener(&g_listener);
257     (void)SoftBusMutexInit(&LnnHichainInterfaceMock::mutex, nullptr);
258     SoftBusCondInit(&LnnHichainInterfaceMock::cond);
259 }
260 
TearDownTestCase()261 void AuthTestCallBackTest::TearDownTestCase()
262 {
263     AuthNetLedgertInterfaceMock::isRuned = false;
264     SoftBusCondDestroy(&LnnHichainInterfaceMock::cond);
265     SoftBusMutexDestroy(&LnnHichainInterfaceMock::mutex);
266 }
267 
SetUp()268 void AuthTestCallBackTest::SetUp()
269 {
270     LooperInit();
271     AUTH_LOGI(AUTH_TEST, "AuthTestCallBackTest start.");
272 }
273 
TearDown()274 void AuthTestCallBackTest::TearDown()
275 {
276     LooperDeinit();
277 }
278 
AuthInitMock(AuthCommonInterfaceMock & connMock,LnnHichainInterfaceMock & hichainMock,GroupAuthManager authManager,DeviceGroupManager groupManager)279 void AuthInitMock(AuthCommonInterfaceMock &connMock, LnnHichainInterfaceMock &hichainMock, GroupAuthManager authManager,
280     DeviceGroupManager groupManager)
281 {
282     groupManager.regDataChangeListener = LnnHichainInterfaceMock::InvokeDataChangeListener;
283     authManager.authDevice = LnnHichainInterfaceMock::InvokeAuthDevice;
284     groupManager.unRegDataChangeListener = LnnHichainInterfaceMock::ActionofunRegDataChangeListener;
285     ON_CALL(connMock, ConnSetConnectCallback(_, _)).WillByDefault(Return(SOFTBUS_OK));
286     ON_CALL(hichainMock, InitDeviceAuthService()).WillByDefault(Return(0));
287     ON_CALL(hichainMock, GetGaInstance()).WillByDefault(Return(&authManager));
288     ON_CALL(hichainMock, GetGmInstance()).WillByDefault(Return(&groupManager));
289 }
290 
291 /*
292  * @tc.name: AUTH_CALLBACK_TEST_001
293  * @tc.desc: auth callback test
294  * @tc.type: FUNC
295  * @tc.require:
296  */
297 
298 HWTEST_F(AuthTestCallBackTest, AUTH_CALLBACK_TEST_001, TestSize.Level1)
299 {
300     GroupAuthManager authManager;
301     DeviceGroupManager groupManager;
302     NiceMock<AuthCommonInterfaceMock> connMock;
303     NiceMock<LnnHichainInterfaceMock> hichainMock;
304     NiceMock<AuthNetLedgertInterfaceMock> ledgerMock;
305     NiceMock<LnnSocketInterfaceMock> socketMock;
306     NiceMock<AuthCommonInterfaceMock> authMock;
307     MockInterfaces mockInterface = {
308         .connMock = &connMock,
309         .hichainMock = &hichainMock,
310         .ledgerMock = &ledgerMock,
311         .socketMock = &socketMock,
312         .authMock = &authMock,
313     };
314     AuthInitMock(connMock, hichainMock, authManager, groupManager);
315     ClientFSMCreate(&mockInterface, authManager, groupManager);
316     WaitForSignal();
317     char *data = AuthNetLedgertInterfaceMock::Pack(SEQ_SERVER, &info, devIdHead);
318     if (AuthCommonInterfaceMock::g_conncallback.OnDataReceived != NULL) {
319         AuthCommonInterfaceMock::g_conncallback.OnDataReceived(g_connId, MODULE_ID, SEQ_SERVER, data, TEST_DATA_LEN);
320     }
321     authManager.processData = LnnHichainInterfaceMock::ActionOfProcessData;
322     HichainProcessData(SEQ_SERVER, DEVICE_INFO, TEST_DATA_LEN, HICHAIN_AUTH_DEVICE);
323     EXPECT_CALL(connMock, ConnPostBytes).WillRepeatedly(DoAll(SendSignal, Return(SOFTBUS_OK)));
324     LnnHichainInterfaceMock::g_devAuthCb.onTransmit(SEQ_SERVER, DEVICE_INFO, TEST_DATA_LEN);
325     EXPECT_TRUE(AuthNetLedgertInterfaceMock::isRuned == false);
326     WaitForSignal();
327     SoftBusFree(data);
328     char *data2 = AuthNetLedgertInterfaceMock::Pack(SEQ_SERVER, &info, devAuthHead);
329     if (AuthCommonInterfaceMock::g_conncallback.OnDataReceived != NULL) {
330         AuthCommonInterfaceMock::g_conncallback.OnDataReceived(g_connId, MODULE_ID, SEQ_SERVER, data2, TEST_DATA_LEN);
331     }
332     WaitForSignal();
333     SoftBusFree(data2);
334     EXPECT_CALL(authMock, LnnGetNetworkIdByUuid).WillRepeatedly(Return(SOFTBUS_OK));
335     LnnHichainInterfaceMock::g_devAuthCb.onSessionKeyReturned(SEQ_SERVER, g_sessionKey, SESSION_KEY_LENGTH);
336     WaitForSignal();
337     EXPECT_CALL(connMock, ConnPostBytes).WillRepeatedly(DoAll(SendSignal, Return(SOFTBUS_OK)));
338     LnnHichainInterfaceMock::g_devAuthCb.onFinish(SEQ_SERVER, OPER_CODE, g_retData);
339     WaitForSignal();
340     EXPECT_CALL(connMock, ConnPostBytes)
341         .WillRepeatedly(DoAll(SendSignal, AuthCommonInterfaceMock::ActionOfConnPostBytes));
342     PostDeviceInfoMessage(SEQ_SERVER, &info2);
343     WaitForSignal();
344 }
345 
346 /*
347  * @tc.name: AUTH_CALLBACK_TEST_002
348  * @tc.desc: auth callback test
349  * @tc.type: FUNC
350  * @tc.require:
351  */
352 
353 HWTEST_F(AuthTestCallBackTest, AUTH_CALLBACK_TEST_002, TestSize.Level1)
354 {
355     GroupAuthManager authManager;
356     DeviceGroupManager groupManager;
357     NiceMock<AuthCommonInterfaceMock> connMock;
358     NiceMock<LnnHichainInterfaceMock> hichainMock;
359     NiceMock<AuthNetLedgertInterfaceMock> ledgerMock;
360     NiceMock<LnnSocketInterfaceMock> socketMock;
361     NiceMock<AuthCommonInterfaceMock> authMock;
362     MockInterfaces mockInterface = {
363         .connMock = &connMock,
364         .hichainMock = &hichainMock,
365         .ledgerMock = &ledgerMock,
366         .socketMock = &socketMock,
367         .authMock = &authMock,
368     };
369     AuthInitMock(connMock, hichainMock, authManager, groupManager);
370     ClientFSMCreate(&mockInterface, authManager, groupManager);
371     WaitForSignal();
372     if (AuthCommonInterfaceMock::g_conncallback.OnDataReceived != NULL) {
373         AuthCommonInterfaceMock::g_conncallback.OnDataReceived(
374             g_connId, MODULE_ID, SEQ_SERVER, AuthCommonInterfaceMock::g_encryptData, TEST_DATA_LEN);
375     }
376     WaitForSignal();
377     char *data4 = AuthNetLedgertInterfaceMock::Pack(SEQ_SERVER, &info, closeAckHead);
378     if (AuthCommonInterfaceMock::g_conncallback.OnDataReceived != NULL) {
379         AuthCommonInterfaceMock::g_conncallback.OnDataReceived(g_connId, MODULE_ID, SEQ_SERVER, data4, TEST_DATA_LEN);
380     }
381     WaitForSignal();
382     SoftBusFree(data4);
383 }
384 } // namespace OHOS