blob: eafdc6f37573652b886cc7c28db8f3fe07a4e016 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/http/http_auth_gssapi_posix.h"
#include <memory>
#include "base/logging.h"
#include "base/native_library.h"
#include "net/base/net_errors.h"
#include "net/http/http_auth_challenge_tokenizer.h"
#include "net/http/mock_gssapi_library_posix.h"
#include "starboard/memory.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace net {
namespace {
// gss_buffer_t helpers.
void ClearBuffer(gss_buffer_t dest) {
if (!dest)
return;
dest->length = 0;
delete [] reinterpret_cast<char*>(dest->value);
dest->value = NULL;
}
void SetBuffer(gss_buffer_t dest, const void* src, size_t length) {
if (!dest)
return;
ClearBuffer(dest);
if (!src)
return;
dest->length = length;
if (length) {
dest->value = new char[length];
SbMemoryCopy(dest->value, src, length);
}
}
void CopyBuffer(gss_buffer_t dest, const gss_buffer_t src) {
if (!dest)
return;
ClearBuffer(dest);
if (!src)
return;
SetBuffer(dest, src->value, src->length);
}
const char kInitialAuthResponse[] = "Mary had a little lamb";
void EstablishInitialContext(test::MockGSSAPILibrary* library) {
test::GssContextMockImpl context_info(
"localhost", // Source name
"example.com", // Target name
23, // Lifetime
*CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism
0, // Context flags
1, // Locally initiated
0); // Open
gss_buffer_desc in_buffer = {0, NULL};
gss_buffer_desc out_buffer = {arraysize(kInitialAuthResponse),
const_cast<char*>(kInitialAuthResponse)};
library->ExpectSecurityContext(
"Negotiate",
GSS_S_CONTINUE_NEEDED,
0,
context_info,
in_buffer,
out_buffer);
}
void UnexpectedCallback(int result) {
// At present getting tokens from gssapi is fully synchronous, so the callback
// should never be called.
ADD_FAILURE();
}
} // namespace
TEST(HttpAuthGSSAPIPOSIXTest, GSSAPIStartup) {
// TODO(ahendrickson): Manipulate the libraries and paths to test each of the
// libraries we expect, and also whether or not they have the interface
// functions we want.
std::unique_ptr<GSSAPILibrary> gssapi(new GSSAPISharedLibrary(std::string()));
DCHECK(gssapi.get());
EXPECT_TRUE(gssapi.get()->Init());
}
#if defined(DLOPEN_KERBEROS)
TEST(HttpAuthGSSAPIPOSIXTest, GSSAPILoadCustomLibrary) {
std::unique_ptr<GSSAPILibrary> gssapi(
new GSSAPISharedLibrary("/this/library/does/not/exist"));
EXPECT_FALSE(gssapi.get()->Init());
}
#endif // defined(DLOPEN_KERBEROS)
TEST(HttpAuthGSSAPIPOSIXTest, GSSAPICycle) {
std::unique_ptr<test::MockGSSAPILibrary> mock_library(
new test::MockGSSAPILibrary);
DCHECK(mock_library.get());
mock_library->Init();
const char kAuthResponse[] = "Mary had a little lamb";
test::GssContextMockImpl context1(
"localhost", // Source name
"example.com", // Target name
23, // Lifetime
*CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism
0, // Context flags
1, // Locally initiated
0); // Open
test::GssContextMockImpl context2(
"localhost", // Source name
"example.com", // Target name
23, // Lifetime
*CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism
0, // Context flags
1, // Locally initiated
1); // Open
test::MockGSSAPILibrary::SecurityContextQuery queries[] = {
test::MockGSSAPILibrary::SecurityContextQuery(
"Negotiate", // Package name
GSS_S_CONTINUE_NEEDED, // Major response code
0, // Minor response code
context1, // Context
NULL, // Expected input token
kAuthResponse), // Output token
test::MockGSSAPILibrary::SecurityContextQuery(
"Negotiate", // Package name
GSS_S_COMPLETE, // Major response code
0, // Minor response code
context2, // Context
kAuthResponse, // Expected input token
kAuthResponse) // Output token
};
for (size_t i = 0; i < arraysize(queries); ++i) {
mock_library->ExpectSecurityContext(queries[i].expected_package,
queries[i].response_code,
queries[i].minor_response_code,
queries[i].context_info,
queries[i].expected_input_token,
queries[i].output_token);
}
OM_uint32 major_status = 0;
OM_uint32 minor_status = 0;
gss_cred_id_t initiator_cred_handle = NULL;
gss_ctx_id_t context_handle = NULL;
gss_name_t target_name = NULL;
gss_OID mech_type = NULL;
OM_uint32 req_flags = 0;
OM_uint32 time_req = 25;
gss_channel_bindings_t input_chan_bindings = NULL;
gss_buffer_desc input_token = { 0, NULL };
gss_OID actual_mech_type= NULL;
gss_buffer_desc output_token = { 0, NULL };
OM_uint32 ret_flags = 0;
OM_uint32 time_rec = 0;
for (size_t i = 0; i < arraysize(queries); ++i) {
major_status = mock_library->init_sec_context(&minor_status,
initiator_cred_handle,
&context_handle,
target_name,
mech_type,
req_flags,
time_req,
input_chan_bindings,
&input_token,
&actual_mech_type,
&output_token,
&ret_flags,
&time_rec);
EXPECT_EQ(queries[i].response_code, major_status);
CopyBuffer(&input_token, &output_token);
ClearBuffer(&output_token);
}
ClearBuffer(&input_token);
major_status = mock_library->delete_sec_context(&minor_status,
&context_handle,
GSS_C_NO_BUFFER);
EXPECT_EQ(static_cast<OM_uint32>(GSS_S_COMPLETE), major_status);
}
TEST(HttpAuthGSSAPITest, ParseChallenge_FirstRound) {
// The first round should just consist of an unadorned "Negotiate" header.
test::MockGSSAPILibrary mock_library;
HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate",
CHROME_GSS_SPNEGO_MECH_OID_DESC);
std::string challenge_text = "Negotiate";
HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
challenge_text.end());
EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
auth_gssapi.ParseChallenge(&challenge));
}
TEST(HttpAuthGSSAPITest, ParseChallenge_TwoRounds) {
// The first round should just have "Negotiate", and the second round should
// have a valid base64 token associated with it.
test::MockGSSAPILibrary mock_library;
HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate",
CHROME_GSS_SPNEGO_MECH_OID_DESC);
std::string first_challenge_text = "Negotiate";
HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(),
first_challenge_text.end());
EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
auth_gssapi.ParseChallenge(&first_challenge));
// Generate an auth token and create another thing.
EstablishInitialContext(&mock_library);
std::string auth_token;
EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(
NULL, "HTTP/intranet.google.com", std::string(),
&auth_token, base::BindOnce(&UnexpectedCallback)));
std::string second_challenge_text = "Negotiate Zm9vYmFy";
HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(),
second_challenge_text.end());
EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
auth_gssapi.ParseChallenge(&second_challenge));
}
TEST(HttpAuthGSSAPITest, ParseChallenge_UnexpectedTokenFirstRound) {
// If the first round challenge has an additional authentication token, it
// should be treated as an invalid challenge from the server.
test::MockGSSAPILibrary mock_library;
HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate",
CHROME_GSS_SPNEGO_MECH_OID_DESC);
std::string challenge_text = "Negotiate Zm9vYmFy";
HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
challenge_text.end());
EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID,
auth_gssapi.ParseChallenge(&challenge));
}
TEST(HttpAuthGSSAPITest, ParseChallenge_MissingTokenSecondRound) {
// If a later-round challenge is simply "Negotiate", it should be treated as
// an authentication challenge rejection from the server or proxy.
test::MockGSSAPILibrary mock_library;
HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate",
CHROME_GSS_SPNEGO_MECH_OID_DESC);
std::string first_challenge_text = "Negotiate";
HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(),
first_challenge_text.end());
EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
auth_gssapi.ParseChallenge(&first_challenge));
EstablishInitialContext(&mock_library);
std::string auth_token;
EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(
NULL, "HTTP/intranet.google.com", std::string(),
&auth_token, base::BindOnce(&UnexpectedCallback)));
std::string second_challenge_text = "Negotiate";
HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(),
second_challenge_text.end());
EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_REJECT,
auth_gssapi.ParseChallenge(&second_challenge));
}
TEST(HttpAuthGSSAPITest, ParseChallenge_NonBase64EncodedToken) {
// If a later-round challenge has an invalid base64 encoded token, it should
// be treated as an invalid challenge.
test::MockGSSAPILibrary mock_library;
HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate",
CHROME_GSS_SPNEGO_MECH_OID_DESC);
std::string first_challenge_text = "Negotiate";
HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(),
first_challenge_text.end());
EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
auth_gssapi.ParseChallenge(&first_challenge));
EstablishInitialContext(&mock_library);
std::string auth_token;
EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(
NULL, "HTTP/intranet.google.com", std::string(),
&auth_token, base::BindOnce(&UnexpectedCallback)));
std::string second_challenge_text = "Negotiate =happyjoy=";
HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(),
second_challenge_text.end());
EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID,
auth_gssapi.ParseChallenge(&second_challenge));
}
} // namespace net