Update To 11.40.268.0
[platform/framework/web/crosswalk.git] / src / net / http / http_auth_gssapi_posix_unittest.cc
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/http/http_auth_gssapi_posix.h"
6
7 #include "base/basictypes.h"
8 #include "base/logging.h"
9 #include "base/memory/scoped_ptr.h"
10 #include "base/native_library.h"
11 #include "net/base/net_errors.h"
12 #include "net/http/http_auth_challenge_tokenizer.h"
13 #include "net/http/mock_gssapi_library_posix.h"
14 #include "testing/gtest/include/gtest/gtest.h"
15
16 namespace net {
17
18 namespace {
19
20 // gss_buffer_t helpers.
21 void ClearBuffer(gss_buffer_t dest) {
22   if (!dest)
23     return;
24   dest->length = 0;
25   delete [] reinterpret_cast<char*>(dest->value);
26   dest->value = NULL;
27 }
28
29 void SetBuffer(gss_buffer_t dest, const void* src, size_t length) {
30   if (!dest)
31     return;
32   ClearBuffer(dest);
33   if (!src)
34     return;
35   dest->length = length;
36   if (length) {
37     dest->value = new char[length];
38     memcpy(dest->value, src, length);
39   }
40 }
41
42 void CopyBuffer(gss_buffer_t dest, const gss_buffer_t src) {
43   if (!dest)
44     return;
45   ClearBuffer(dest);
46   if (!src)
47     return;
48   SetBuffer(dest, src->value, src->length);
49 }
50
51 const char kInitialAuthResponse[] = "Mary had a little lamb";
52
53 void EstablishInitialContext(test::MockGSSAPILibrary* library) {
54   test::GssContextMockImpl context_info(
55       "localhost",                         // Source name
56       "example.com",                       // Target name
57       23,                                  // Lifetime
58       *CHROME_GSS_SPNEGO_MECH_OID_DESC,    // Mechanism
59       0,                                   // Context flags
60       1,                                   // Locally initiated
61       0);                                  // Open
62   gss_buffer_desc in_buffer = {0, NULL};
63   gss_buffer_desc out_buffer = {arraysize(kInitialAuthResponse),
64                                 const_cast<char*>(kInitialAuthResponse)};
65   library->ExpectSecurityContext(
66       "Negotiate",
67       GSS_S_CONTINUE_NEEDED,
68       0,
69       context_info,
70       in_buffer,
71       out_buffer);
72 }
73
74 }  // namespace
75
76 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPIStartup) {
77   // TODO(ahendrickson): Manipulate the libraries and paths to test each of the
78   // libraries we expect, and also whether or not they have the interface
79   // functions we want.
80   scoped_ptr<GSSAPILibrary> gssapi(new GSSAPISharedLibrary(std::string()));
81   DCHECK(gssapi.get());
82   EXPECT_TRUE(gssapi.get()->Init());
83 }
84
85 #if defined(DLOPEN_KERBEROS)
86 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPILoadCustomLibrary) {
87   scoped_ptr<GSSAPILibrary> gssapi(
88       new GSSAPISharedLibrary("/this/library/does/not/exist"));
89   EXPECT_FALSE(gssapi.get()->Init());
90 }
91 #endif  // defined(DLOPEN_KERBEROS)
92
93 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPICycle) {
94   scoped_ptr<test::MockGSSAPILibrary> mock_library(new test::MockGSSAPILibrary);
95   DCHECK(mock_library.get());
96   mock_library->Init();
97   const char kAuthResponse[] = "Mary had a little lamb";
98   test::GssContextMockImpl context1(
99       "localhost",                         // Source name
100       "example.com",                       // Target name
101       23,                                  // Lifetime
102       *CHROME_GSS_SPNEGO_MECH_OID_DESC,    // Mechanism
103       0,                                   // Context flags
104       1,                                   // Locally initiated
105       0);                                  // Open
106   test::GssContextMockImpl context2(
107       "localhost",                         // Source name
108       "example.com",                       // Target name
109       23,                                  // Lifetime
110       *CHROME_GSS_SPNEGO_MECH_OID_DESC,    // Mechanism
111       0,                                   // Context flags
112       1,                                   // Locally initiated
113       1);                                  // Open
114   test::MockGSSAPILibrary::SecurityContextQuery queries[] = {
115     test::MockGSSAPILibrary::SecurityContextQuery(
116         "Negotiate",            // Package name
117         GSS_S_CONTINUE_NEEDED,  // Major response code
118         0,                      // Minor response code
119         context1,               // Context
120         NULL,                   // Expected input token
121         kAuthResponse),         // Output token
122     test::MockGSSAPILibrary::SecurityContextQuery(
123         "Negotiate",            // Package name
124         GSS_S_COMPLETE,         // Major response code
125         0,                      // Minor response code
126         context2,               // Context
127         kAuthResponse,          // Expected input token
128         kAuthResponse)          // Output token
129   };
130
131   for (size_t i = 0; i < arraysize(queries); ++i) {
132     mock_library->ExpectSecurityContext(queries[i].expected_package,
133                                         queries[i].response_code,
134                                         queries[i].minor_response_code,
135                                         queries[i].context_info,
136                                         queries[i].expected_input_token,
137                                         queries[i].output_token);
138   }
139
140   OM_uint32 major_status = 0;
141   OM_uint32 minor_status = 0;
142   gss_cred_id_t initiator_cred_handle = NULL;
143   gss_ctx_id_t context_handle = NULL;
144   gss_name_t target_name = NULL;
145   gss_OID mech_type = NULL;
146   OM_uint32 req_flags = 0;
147   OM_uint32 time_req = 25;
148   gss_channel_bindings_t input_chan_bindings = NULL;
149   gss_buffer_desc input_token = { 0, NULL };
150   gss_OID actual_mech_type= NULL;
151   gss_buffer_desc output_token = { 0, NULL };
152   OM_uint32 ret_flags = 0;
153   OM_uint32 time_rec = 0;
154   for (size_t i = 0; i < arraysize(queries); ++i) {
155     major_status = mock_library->init_sec_context(&minor_status,
156                                                   initiator_cred_handle,
157                                                   &context_handle,
158                                                   target_name,
159                                                   mech_type,
160                                                   req_flags,
161                                                   time_req,
162                                                   input_chan_bindings,
163                                                   &input_token,
164                                                   &actual_mech_type,
165                                                   &output_token,
166                                                   &ret_flags,
167                                                   &time_rec);
168     EXPECT_EQ(queries[i].response_code, major_status);
169     CopyBuffer(&input_token, &output_token);
170     ClearBuffer(&output_token);
171   }
172   ClearBuffer(&input_token);
173   major_status = mock_library->delete_sec_context(&minor_status,
174                                                   &context_handle,
175                                                   GSS_C_NO_BUFFER);
176   EXPECT_EQ(static_cast<OM_uint32>(GSS_S_COMPLETE), major_status);
177 }
178
179 TEST(HttpAuthGSSAPITest, ParseChallenge_FirstRound) {
180   // The first round should just consist of an unadorned "Negotiate" header.
181   test::MockGSSAPILibrary mock_library;
182   HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate",
183                              CHROME_GSS_SPNEGO_MECH_OID_DESC);
184   std::string challenge_text = "Negotiate";
185   HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
186                                        challenge_text.end());
187   EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
188             auth_gssapi.ParseChallenge(&challenge));
189 }
190
191 TEST(HttpAuthGSSAPITest, ParseChallenge_TwoRounds) {
192   // The first round should just have "Negotiate", and the second round should
193   // have a valid base64 token associated with it.
194   test::MockGSSAPILibrary mock_library;
195   HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate",
196                              CHROME_GSS_SPNEGO_MECH_OID_DESC);
197   std::string first_challenge_text = "Negotiate";
198   HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(),
199                                              first_challenge_text.end());
200   EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
201             auth_gssapi.ParseChallenge(&first_challenge));
202
203   // Generate an auth token and create another thing.
204   EstablishInitialContext(&mock_library);
205   std::string auth_token;
206   EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com",
207                                               &auth_token));
208
209   std::string second_challenge_text = "Negotiate Zm9vYmFy";
210   HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(),
211                                               second_challenge_text.end());
212   EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
213             auth_gssapi.ParseChallenge(&second_challenge));
214 }
215
216 TEST(HttpAuthGSSAPITest, ParseChallenge_UnexpectedTokenFirstRound) {
217   // If the first round challenge has an additional authentication token, it
218   // should be treated as an invalid challenge from the server.
219   test::MockGSSAPILibrary mock_library;
220   HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate",
221                              CHROME_GSS_SPNEGO_MECH_OID_DESC);
222   std::string challenge_text = "Negotiate Zm9vYmFy";
223   HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
224                                        challenge_text.end());
225   EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID,
226             auth_gssapi.ParseChallenge(&challenge));
227 }
228
229 TEST(HttpAuthGSSAPITest, ParseChallenge_MissingTokenSecondRound) {
230   // If a later-round challenge is simply "Negotiate", it should be treated as
231   // an authentication challenge rejection from the server or proxy.
232   test::MockGSSAPILibrary mock_library;
233   HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate",
234                              CHROME_GSS_SPNEGO_MECH_OID_DESC);
235   std::string first_challenge_text = "Negotiate";
236   HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(),
237                                              first_challenge_text.end());
238   EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
239             auth_gssapi.ParseChallenge(&first_challenge));
240
241   EstablishInitialContext(&mock_library);
242   std::string auth_token;
243   EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com",
244                                               &auth_token));
245   std::string second_challenge_text = "Negotiate";
246   HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(),
247                                               second_challenge_text.end());
248   EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_REJECT,
249             auth_gssapi.ParseChallenge(&second_challenge));
250 }
251
252 TEST(HttpAuthGSSAPITest, ParseChallenge_NonBase64EncodedToken) {
253   // If a later-round challenge has an invalid base64 encoded token, it should
254   // be treated as an invalid challenge.
255   test::MockGSSAPILibrary mock_library;
256   HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate",
257                              CHROME_GSS_SPNEGO_MECH_OID_DESC);
258   std::string first_challenge_text = "Negotiate";
259   HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(),
260                                              first_challenge_text.end());
261   EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
262             auth_gssapi.ParseChallenge(&first_challenge));
263
264   EstablishInitialContext(&mock_library);
265   std::string auth_token;
266   EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com",
267                                               &auth_token));
268   std::string second_challenge_text = "Negotiate =happyjoy=";
269   HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(),
270                                               second_challenge_text.end());
271   EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID,
272             auth_gssapi.ParseChallenge(&second_challenge));
273 }
274
275 }  // namespace net