Home | History | Annotate | Download | only in protocol
      1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "remoting/protocol/v2_authenticator.h"
      6 
      7 #include "base/bind.h"
      8 #include "net/base/net_errors.h"
      9 #include "remoting/base/rsa_key_pair.h"
     10 #include "remoting/protocol/authenticator_test_base.h"
     11 #include "remoting/protocol/channel_authenticator.h"
     12 #include "remoting/protocol/connection_tester.h"
     13 #include "testing/gmock/include/gmock/gmock.h"
     14 #include "testing/gtest/include/gtest/gtest.h"
     15 #include "third_party/webrtc/libjingle/xmllite/xmlelement.h"
     16 
     17 using testing::_;
     18 using testing::DeleteArg;
     19 using testing::SaveArg;
     20 
     21 namespace remoting {
     22 namespace protocol {
     23 
     24 namespace {
     25 
     26 const int kMessageSize = 100;
     27 const int kMessages = 1;
     28 
     29 const char kTestSharedSecret[] = "1234-1234-5678";
     30 const char kTestSharedSecretBad[] = "0000-0000-0001";
     31 
     32 }  // namespace
     33 
     34 class V2AuthenticatorTest : public AuthenticatorTestBase {
     35  public:
     36   V2AuthenticatorTest() {
     37   }
     38   virtual ~V2AuthenticatorTest() {
     39   }
     40 
     41  protected:
     42   void InitAuthenticators(const std::string& client_secret,
     43                           const std::string& host_secret) {
     44     host_ = V2Authenticator::CreateForHost(
     45         host_cert_, key_pair_, host_secret,
     46         Authenticator::WAITING_MESSAGE);
     47     client_ = V2Authenticator::CreateForClient(
     48         client_secret, Authenticator::MESSAGE_READY);
     49   }
     50 
     51   DISALLOW_COPY_AND_ASSIGN(V2AuthenticatorTest);
     52 };
     53 
     54 TEST_F(V2AuthenticatorTest, SuccessfulAuth) {
     55   ASSERT_NO_FATAL_FAILURE(
     56       InitAuthenticators(kTestSharedSecret, kTestSharedSecret));
     57   ASSERT_NO_FATAL_FAILURE(RunAuthExchange());
     58 
     59   ASSERT_EQ(Authenticator::ACCEPTED, host_->state());
     60   ASSERT_EQ(Authenticator::ACCEPTED, client_->state());
     61 
     62   client_auth_ = client_->CreateChannelAuthenticator();
     63   host_auth_ = host_->CreateChannelAuthenticator();
     64   RunChannelAuth(false);
     65 
     66   StreamConnectionTester tester(host_socket_.get(), client_socket_.get(),
     67                                 kMessageSize, kMessages);
     68 
     69   tester.Start();
     70   message_loop_.Run();
     71   tester.CheckResults();
     72 }
     73 
     74 // Verify that connection is rejected when secrets don't match.
     75 TEST_F(V2AuthenticatorTest, InvalidSecret) {
     76   ASSERT_NO_FATAL_FAILURE(
     77       InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret));
     78   ASSERT_NO_FATAL_FAILURE(RunAuthExchange());
     79 
     80   ASSERT_EQ(Authenticator::REJECTED, client_->state());
     81 
     82   // Change |client_| so that we can get the last message.
     83   reinterpret_cast<V2Authenticator*>(client_.get())->state_ =
     84       Authenticator::MESSAGE_READY;
     85 
     86   scoped_ptr<buzz::XmlElement> message(client_->GetNextMessage());
     87   ASSERT_TRUE(message.get());
     88 
     89   ASSERT_EQ(Authenticator::WAITING_MESSAGE, client_->state());
     90   host_->ProcessMessage(message.get(), base::Bind(&base::DoNothing));
     91   // This assumes that V2Authenticator::ProcessMessage runs synchronously.
     92   ASSERT_EQ(Authenticator::REJECTED, host_->state());
     93 }
     94 
     95 }  // namespace protocol
     96 }  // namespace remoting
     97