- add sources.
[platform/framework/web/crosswalk.git] / src / net / http / mock_sspi_library_win.cc
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/http/mock_sspi_library_win.h"
6
7 #include "testing/gtest/include/gtest/gtest.h"
8
9 namespace net {
10
11 MockSSPILibrary::MockSSPILibrary() {
12 }
13
14 MockSSPILibrary::~MockSSPILibrary() {
15   EXPECT_TRUE(expected_package_queries_.empty());
16   EXPECT_TRUE(expected_freed_packages_.empty());
17 }
18
19 SECURITY_STATUS MockSSPILibrary::AcquireCredentialsHandle(
20     LPWSTR pszPrincipal,
21     LPWSTR pszPackage,
22     unsigned long fCredentialUse,
23     void* pvLogonId,
24     void* pvAuthData,
25     SEC_GET_KEY_FN pGetKeyFn,
26     void* pvGetKeyArgument,
27     PCredHandle phCredential,
28     PTimeStamp ptsExpiry) {
29   // Fill in phCredential with arbitrary value.
30   phCredential->dwLower = phCredential->dwUpper = ((ULONG_PTR) ((INT_PTR)0));
31   return SEC_E_OK;
32 }
33
34 SECURITY_STATUS MockSSPILibrary::InitializeSecurityContext(
35     PCredHandle phCredential,
36     PCtxtHandle phContext,
37     SEC_WCHAR* pszTargetName,
38     unsigned long fContextReq,
39     unsigned long Reserved1,
40     unsigned long TargetDataRep,
41     PSecBufferDesc pInput,
42     unsigned long Reserved2,
43     PCtxtHandle phNewContext,
44     PSecBufferDesc pOutput,
45     unsigned long* contextAttr,
46     PTimeStamp ptsExpiry) {
47   // Fill in the outbound buffer with garbage data.
48   PSecBuffer out_buffer = pOutput->pBuffers;
49   out_buffer->cbBuffer = 2;
50   uint8* buf = reinterpret_cast<uint8 *>(out_buffer->pvBuffer);
51   buf[0] = 0xAB;
52   buf[1] = 0xBA;
53
54   // Fill in phNewContext with arbitrary value if it's invalid.
55   if (phNewContext != phContext)
56     phNewContext->dwLower = phNewContext->dwUpper = ((ULONG_PTR) ((INT_PTR)0));
57   return SEC_E_OK;
58 }
59
60 SECURITY_STATUS MockSSPILibrary::QuerySecurityPackageInfo(
61     LPWSTR pszPackageName, PSecPkgInfoW *pkgInfo) {
62   EXPECT_TRUE(!expected_package_queries_.empty());
63   PackageQuery package_query = expected_package_queries_.front();
64   expected_package_queries_.pop_front();
65   std::wstring actual_package(pszPackageName);
66   EXPECT_EQ(package_query.expected_package, actual_package);
67   *pkgInfo = package_query.package_info;
68   if (package_query.response_code == SEC_E_OK)
69     expected_freed_packages_.insert(package_query.package_info);
70   return package_query.response_code;
71 }
72
73 SECURITY_STATUS MockSSPILibrary::FreeCredentialsHandle(
74     PCredHandle phCredential) {
75   EXPECT_TRUE(phCredential->dwLower == ((ULONG_PTR) ((INT_PTR) 0)));
76   EXPECT_TRUE(phCredential->dwLower == ((ULONG_PTR) ((INT_PTR) 0)));
77   SecInvalidateHandle(phCredential);
78   return SEC_E_OK;
79 }
80
81 SECURITY_STATUS MockSSPILibrary::DeleteSecurityContext(PCtxtHandle phContext) {
82   EXPECT_TRUE(phContext->dwLower == ((ULONG_PTR) ((INT_PTR) 0)));
83   EXPECT_TRUE(phContext->dwLower == ((ULONG_PTR) ((INT_PTR) 0)));
84   SecInvalidateHandle(phContext);
85   return SEC_E_OK;
86 }
87
88 SECURITY_STATUS MockSSPILibrary::FreeContextBuffer(PVOID pvContextBuffer) {
89   PSecPkgInfoW package_info = static_cast<PSecPkgInfoW>(pvContextBuffer);
90   std::set<PSecPkgInfoW>::iterator it = expected_freed_packages_.find(
91       package_info);
92   EXPECT_TRUE(it != expected_freed_packages_.end());
93   expected_freed_packages_.erase(it);
94   return SEC_E_OK;
95 }
96
97 void MockSSPILibrary::ExpectQuerySecurityPackageInfo(
98     const std::wstring& expected_package,
99     SECURITY_STATUS response_code,
100     PSecPkgInfoW package_info) {
101   PackageQuery package_query = {expected_package, response_code,
102                                 package_info};
103   expected_package_queries_.push_back(package_query);
104 }
105
106 }  // namespace net