• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "remoting/protocol/v2_authenticator.h"
6 
7 #include "base/bind.h"
8 #include "net/base/net_errors.h"
9 #include "remoting/base/rsa_key_pair.h"
10 #include "remoting/protocol/authenticator_test_base.h"
11 #include "remoting/protocol/channel_authenticator.h"
12 #include "remoting/protocol/connection_tester.h"
13 #include "testing/gmock/include/gmock/gmock.h"
14 #include "testing/gtest/include/gtest/gtest.h"
15 #include "third_party/webrtc/libjingle/xmllite/xmlelement.h"
16 
17 using testing::_;
18 using testing::DeleteArg;
19 using testing::SaveArg;
20 
21 namespace remoting {
22 namespace protocol {
23 
24 namespace {
25 
26 const int kMessageSize = 100;
27 const int kMessages = 1;
28 
29 const char kTestSharedSecret[] = "1234-1234-5678";
30 const char kTestSharedSecretBad[] = "0000-0000-0001";
31 
32 }  // namespace
33 
34 class V2AuthenticatorTest : public AuthenticatorTestBase {
35  public:
V2AuthenticatorTest()36   V2AuthenticatorTest() {
37   }
~V2AuthenticatorTest()38   virtual ~V2AuthenticatorTest() {
39   }
40 
41  protected:
InitAuthenticators(const std::string & client_secret,const std::string & host_secret)42   void InitAuthenticators(const std::string& client_secret,
43                           const std::string& host_secret) {
44     host_ = V2Authenticator::CreateForHost(
45         host_cert_, key_pair_, host_secret,
46         Authenticator::WAITING_MESSAGE);
47     client_ = V2Authenticator::CreateForClient(
48         client_secret, Authenticator::MESSAGE_READY);
49   }
50 
51   DISALLOW_COPY_AND_ASSIGN(V2AuthenticatorTest);
52 };
53 
TEST_F(V2AuthenticatorTest,SuccessfulAuth)54 TEST_F(V2AuthenticatorTest, SuccessfulAuth) {
55   ASSERT_NO_FATAL_FAILURE(
56       InitAuthenticators(kTestSharedSecret, kTestSharedSecret));
57   ASSERT_NO_FATAL_FAILURE(RunAuthExchange());
58 
59   ASSERT_EQ(Authenticator::ACCEPTED, host_->state());
60   ASSERT_EQ(Authenticator::ACCEPTED, client_->state());
61 
62   client_auth_ = client_->CreateChannelAuthenticator();
63   host_auth_ = host_->CreateChannelAuthenticator();
64   RunChannelAuth(false);
65 
66   StreamConnectionTester tester(host_socket_.get(), client_socket_.get(),
67                                 kMessageSize, kMessages);
68 
69   tester.Start();
70   message_loop_.Run();
71   tester.CheckResults();
72 }
73 
74 // Verify that connection is rejected when secrets don't match.
TEST_F(V2AuthenticatorTest,InvalidSecret)75 TEST_F(V2AuthenticatorTest, InvalidSecret) {
76   ASSERT_NO_FATAL_FAILURE(
77       InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret));
78   ASSERT_NO_FATAL_FAILURE(RunAuthExchange());
79 
80   ASSERT_EQ(Authenticator::REJECTED, client_->state());
81 
82   // Change |client_| so that we can get the last message.
83   reinterpret_cast<V2Authenticator*>(client_.get())->state_ =
84       Authenticator::MESSAGE_READY;
85 
86   scoped_ptr<buzz::XmlElement> message(client_->GetNextMessage());
87   ASSERT_TRUE(message.get());
88 
89   ASSERT_EQ(Authenticator::WAITING_MESSAGE, client_->state());
90   host_->ProcessMessage(message.get(), base::Bind(&base::DoNothing));
91   // This assumes that V2Authenticator::ProcessMessage runs synchronously.
92   ASSERT_EQ(Authenticator::REJECTED, host_->state());
93 }
94 
95 }  // namespace protocol
96 }  // namespace remoting
97