1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "remoting/protocol/ssl_hmac_channel_authenticator.h"
7 #include "base/base64.h"
9 #include "base/files/file_path.h"
10 #include "base/files/file_util.h"
11 #include "base/message_loop/message_loop.h"
12 #include "base/test/test_timeouts.h"
13 #include "base/timer/timer.h"
14 #include "crypto/rsa_private_key.h"
15 #include "net/base/net_errors.h"
16 #include "net/base/test_data_directory.h"
17 #include "net/test/cert_test_util.h"
18 #include "remoting/base/rsa_key_pair.h"
19 #include "remoting/protocol/connection_tester.h"
20 #include "remoting/protocol/fake_session.h"
21 #include "remoting/protocol/p2p_stream_socket.h"
22 #include "testing/gmock/include/gmock/gmock.h"
23 #include "testing/gtest/include/gtest/gtest.h"
24 #include "third_party/webrtc/libjingle/xmllite/xmlelement.h"
27 using testing::NotNull
;
28 using testing::SaveArg
;
35 const char kTestSharedSecret
[] = "1234-1234-5678";
36 const char kTestSharedSecretBad
[] = "0000-0000-0001";
38 class MockChannelDoneCallback
{
40 MOCK_METHOD2(OnDone
, void(int error
, P2PStreamSocket
* socket
));
43 ACTION_P(QuitThreadOnCounter
, counter
) {
45 EXPECT_GE(*counter
, 0);
47 base::MessageLoop::current()->Quit();
52 class SslHmacChannelAuthenticatorTest
: public testing::Test
{
54 SslHmacChannelAuthenticatorTest() {}
55 ~SslHmacChannelAuthenticatorTest() override
{}
58 void SetUp() override
{
59 base::FilePath
certs_dir(net::GetTestCertsDirectory());
61 base::FilePath cert_path
= certs_dir
.AppendASCII("unittest.selfsigned.der");
62 ASSERT_TRUE(base::ReadFileToString(cert_path
, &host_cert_
));
64 base::FilePath key_path
= certs_dir
.AppendASCII("unittest.key.bin");
65 std::string key_string
;
66 ASSERT_TRUE(base::ReadFileToString(key_path
, &key_string
));
67 std::string key_base64
;
68 base::Base64Encode(key_string
, &key_base64
);
69 key_pair_
= RsaKeyPair::FromString(key_base64
);
70 ASSERT_TRUE(key_pair_
.get());
73 void RunChannelAuth(int expected_client_error
, int expected_host_error
) {
74 client_fake_socket_
.reset(new FakeStreamSocket());
75 host_fake_socket_
.reset(new FakeStreamSocket());
76 client_fake_socket_
->PairWith(host_fake_socket_
.get());
78 client_auth_
->SecureAndAuthenticate(
79 client_fake_socket_
.Pass(),
80 base::Bind(&SslHmacChannelAuthenticatorTest::OnClientConnected
,
81 base::Unretained(this)));
83 host_auth_
->SecureAndAuthenticate(
84 host_fake_socket_
.Pass(),
85 base::Bind(&SslHmacChannelAuthenticatorTest::OnHostConnected
,
86 base::Unretained(this), std::string("ref argument value")));
88 // Expect two callbacks to be called - the client callback and the host
90 int callback_counter
= 2;
92 if (expected_client_error
!= net::OK
) {
93 EXPECT_CALL(client_callback_
, OnDone(expected_client_error
, nullptr))
94 .WillOnce(QuitThreadOnCounter(&callback_counter
));
96 EXPECT_CALL(client_callback_
, OnDone(net::OK
, NotNull()))
97 .WillOnce(QuitThreadOnCounter(&callback_counter
));
100 if (expected_host_error
!= net::OK
) {
101 EXPECT_CALL(host_callback_
, OnDone(expected_host_error
, nullptr))
102 .WillOnce(QuitThreadOnCounter(&callback_counter
));
104 EXPECT_CALL(host_callback_
, OnDone(net::OK
, NotNull()))
105 .WillOnce(QuitThreadOnCounter(&callback_counter
));
108 // Ensure that .Run() does not run unbounded if the callbacks are never
110 base::Timer
shutdown_timer(false, false);
111 shutdown_timer
.Start(FROM_HERE
,
112 TestTimeouts::action_timeout(),
113 base::MessageLoop::QuitClosure());
117 void OnHostConnected(const std::string
& ref_argument
,
119 scoped_ptr
<P2PStreamSocket
> socket
) {
120 // Try deleting the authenticator and verify that this doesn't destroy
121 // reference parameters.
123 DCHECK_EQ(ref_argument
, "ref argument value");
125 host_callback_
.OnDone(error
, socket
.get());
126 host_socket_
= socket
.Pass();
129 void OnClientConnected(int error
, scoped_ptr
<P2PStreamSocket
> socket
) {
130 client_auth_
.reset();
131 client_callback_
.OnDone(error
, socket
.get());
132 client_socket_
= socket
.Pass();
135 base::MessageLoop message_loop_
;
137 scoped_refptr
<RsaKeyPair
> key_pair_
;
138 std::string host_cert_
;
139 scoped_ptr
<FakeStreamSocket
> client_fake_socket_
;
140 scoped_ptr
<FakeStreamSocket
> host_fake_socket_
;
141 scoped_ptr
<ChannelAuthenticator
> client_auth_
;
142 scoped_ptr
<ChannelAuthenticator
> host_auth_
;
143 MockChannelDoneCallback client_callback_
;
144 MockChannelDoneCallback host_callback_
;
145 scoped_ptr
<P2PStreamSocket
> client_socket_
;
146 scoped_ptr
<P2PStreamSocket
> host_socket_
;
148 DISALLOW_COPY_AND_ASSIGN(SslHmacChannelAuthenticatorTest
);
151 // Verify that a channel can be connected using a valid shared secret.
152 TEST_F(SslHmacChannelAuthenticatorTest
, SuccessfulAuth
) {
153 client_auth_
= SslHmacChannelAuthenticator::CreateForClient(
154 host_cert_
, kTestSharedSecret
);
155 host_auth_
= SslHmacChannelAuthenticator::CreateForHost(
156 host_cert_
, key_pair_
, kTestSharedSecret
);
158 RunChannelAuth(net::OK
, net::OK
);
160 ASSERT_TRUE(client_socket_
.get() != nullptr);
161 ASSERT_TRUE(host_socket_
.get() != nullptr);
163 StreamConnectionTester
tester(host_socket_
.get(), client_socket_
.get(),
168 tester
.CheckResults();
171 // Verify that channels cannot be using invalid shared secret.
172 TEST_F(SslHmacChannelAuthenticatorTest
, InvalidChannelSecret
) {
173 client_auth_
= SslHmacChannelAuthenticator::CreateForClient(
174 host_cert_
, kTestSharedSecretBad
);
175 host_auth_
= SslHmacChannelAuthenticator::CreateForHost(
176 host_cert_
, key_pair_
, kTestSharedSecret
);
178 RunChannelAuth(net::ERR_FAILED
, net::ERR_FAILED
);
180 ASSERT_TRUE(host_socket_
.get() == nullptr);
183 // Verify that channels cannot be using invalid certificate.
184 TEST_F(SslHmacChannelAuthenticatorTest
, InvalidCertificate
) {
185 // Import a second certificate for the client to expect.
186 scoped_refptr
<net::X509Certificate
> host_cert2(
187 net::ImportCertFromFile(net::GetTestCertsDirectory(), "ok_cert.pem"));
188 std::string host_cert2_der
;
189 ASSERT_TRUE(net::X509Certificate::GetDEREncoded(host_cert2
->os_cert_handle(),
192 client_auth_
= SslHmacChannelAuthenticator::CreateForClient(
193 host_cert2_der
, kTestSharedSecret
);
194 host_auth_
= SslHmacChannelAuthenticator::CreateForHost(
195 host_cert_
, key_pair_
, kTestSharedSecret
);
197 RunChannelAuth(net::ERR_CERT_INVALID
, net::ERR_CONNECTION_CLOSED
);
199 ASSERT_TRUE(host_socket_
.get() == nullptr);
202 } // namespace protocol
203 } // namespace remoting