blob: 211d457e70f5a15f8007a7960f21bd39d5733d4e [file]
// Copyright 2016 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "remoting/protocol/spake2_authenticator.h"
#include "base/functional/bind.h"
#include "base/functional/callback_helpers.h"
#include "base/run_loop.h"
#include "remoting/base/rsa_key_pair.h"
#include "remoting/protocol/authenticator_test_base.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
using testing::_;
using testing::DeleteArg;
using testing::SaveArg;
namespace remoting::protocol {
namespace {
const char kTestSharedSecret[] = "1234-1234-5678";
const char kTestSharedSecretBad[] = "0000-0000-0001";
} // namespace
class Spake2AuthenticatorTest : public AuthenticatorTestBase {
public:
Spake2AuthenticatorTest() = default;
Spake2AuthenticatorTest(const Spake2AuthenticatorTest&) = delete;
Spake2AuthenticatorTest& operator=(const Spake2AuthenticatorTest&) = delete;
~Spake2AuthenticatorTest() override = default;
protected:
void InitAuthenticators(const std::string& client_secret,
const std::string& host_secret) {
host_ = Spake2Authenticator::CreateForHost(kHostId, kClientId, host_cert_,
key_pair_, host_secret,
Authenticator::WAITING_MESSAGE);
client_ = Spake2Authenticator::CreateForClient(
kClientId, kHostId, client_secret, Authenticator::MESSAGE_READY);
}
};
TEST_F(Spake2AuthenticatorTest, SuccessfulAuth) {
ASSERT_NO_FATAL_FAILURE(
InitAuthenticators(kTestSharedSecret, kTestSharedSecret));
ASSERT_NO_FATAL_FAILURE(RunAuthExchange());
ASSERT_EQ(host_->state(), Authenticator::ACCEPTED);
ASSERT_EQ(client_->state(), Authenticator::ACCEPTED);
}
// Verify that connection is rejected when secrets don't match.
TEST_F(Spake2AuthenticatorTest, InvalidSecret) {
ASSERT_NO_FATAL_FAILURE(
InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret));
ASSERT_NO_FATAL_FAILURE(RunAuthExchange());
ASSERT_EQ(client_->state(), Authenticator::REJECTED);
ASSERT_EQ(client_->rejection_reason(),
Authenticator::RejectionReason::INVALID_CREDENTIALS);
// Change |client_| so that we can get the last message.
reinterpret_cast<Spake2Authenticator*>(client_.get())->state_ =
Authenticator::MESSAGE_READY;
JingleAuthentication message = client_->GetNextMessage();
ASSERT_FALSE(message.is_empty());
ASSERT_EQ(client_->state(), Authenticator::WAITING_MESSAGE);
host_->ProcessMessage(message, base::DoNothing());
// This assumes that Spake2Authenticator::ProcessMessage runs synchronously.
ASSERT_EQ(host_->state(), Authenticator::REJECTED);
}
} // namespace remoting::protocol