diff options
author | Lee Clagett <code@leeclagett.com> | 2017-02-05 17:48:03 -0500 |
---|---|---|
committer | Lee Clagett <code@leeclagett.com> | 2017-02-06 01:15:41 -0500 |
commit | ce7fcbb4aea884bb4bf433cf419ffa267f859c87 (patch) | |
tree | e8fb644b62006d78f801d739fbebad50f2c2409d /tests/unit_tests/http_auth.cpp | |
parent | Merge pull request #1669 (diff) | |
download | monero-ce7fcbb4aea884bb4bf433cf419ffa267f859c87.tar.xz |
Add server auth to monerod, and client auth to wallet-cli and wallet-rpc
Diffstat (limited to 'tests/unit_tests/http_auth.cpp')
-rw-r--r-- | tests/unit_tests/http_auth.cpp | 724 |
1 files changed, 0 insertions, 724 deletions
diff --git a/tests/unit_tests/http_auth.cpp b/tests/unit_tests/http_auth.cpp deleted file mode 100644 index 97954642f..000000000 --- a/tests/unit_tests/http_auth.cpp +++ /dev/null @@ -1,724 +0,0 @@ -// Copyright (c) 2014-2016, The Monero Project -// -// All rights reserved. -// -// Redistribution and use in source and binary forms, with or without modification, are -// permitted provided that the following conditions are met: -// -// 1. Redistributions of source code must retain the above copyright notice, this list of -// conditions and the following disclaimer. -// -// 2. Redistributions in binary form must reproduce the above copyright notice, this list -// of conditions and the following disclaimer in the documentation and/or other -// materials provided with the distribution. -// -// 3. Neither the name of the copyright holder nor the names of its contributors may be -// used to endorse or promote products derived from this software without specific -// prior written permission. -// -// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY -// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL -// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, -// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, -// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, -// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF -// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - -#include "gtest/gtest.h" -#include "net/http_auth.h" - -#include <boost/algorithm/string/predicate.hpp> -#include <boost/fusion/adapted/std_pair.hpp> -#include <boost/range/algorithm/find_if.hpp> -#include <boost/range/iterator_range_core.hpp> -#include <boost/spirit/include/karma_char.hpp> -#include <boost/spirit/include/karma_list.hpp> -#include <boost/spirit/include/karma_generate.hpp> -#include <boost/spirit/include/karma_right_alignment.hpp> -#include <boost/spirit/include/karma_sequence.hpp> -#include <boost/spirit/include/karma_string.hpp> -#include <boost/spirit/include/karma_uint.hpp> -#include <boost/spirit/include/qi_alternative.hpp> -#include <boost/spirit/include/qi_char.hpp> -#include <boost/spirit/include/qi_char_class.hpp> -#include <boost/spirit/include/qi_difference.hpp> -#include <boost/spirit/include/qi_eoi.hpp> -#include <boost/spirit/include/qi_list.hpp> -#include <boost/spirit/include/qi_parse.hpp> -#include <boost/spirit/include/qi_plus.hpp> -#include <boost/spirit/include/qi_sequence.hpp> -#include <boost/spirit/include/qi_string.hpp> -#include <cstdint> -#include <iterator> -#include <string> -#include <unordered_map> -#include <utility> -#include <vector> - -#include "md5_l.h" -#include "string_tools.h" - -namespace { -namespace http = epee::net_utils::http; -using fields = std::unordered_map<std::string, std::string>; -using auth_responses = std::vector<fields>; - -std::string quoted(std::string str) -{ - str.insert(str.begin(), '"'); - str.push_back('"'); - return str; -} - -void write_fields(std::string& out, const fields& args) -{ - namespace karma = boost::spirit::karma; - karma::generate( - std::back_inserter(out), - (karma::string << " = " << karma::string) % " , ", - args); -} - -std::string write_fields(const fields& args) -{ - std::string out{}; - write_fields(out, args); - return out; -} - -http::http_request_info make_request(const fields& args) -{ - std::string out{" DIGEST "}; - write_fields(out, args); - - http::http_request_info request{}; - request.m_http_method_str = "NOP"; - request.m_header_info.m_etc_fields.push_back( - std::make_pair(u8"authorization", std::move(out)) - ); - return request; -} - -http::http_response_info make_response(const auth_responses& choices) -{ - http::http_response_info response{}; - for (const auto& choice : choices) - { - std::string out{" DIGEST "}; - write_fields(out, choice); - - response.m_additional_fields.push_back( - std::make_pair(u8"WWW-authenticate", std::move(out)) - ); - } - return response; -} - -bool has_same_fields(const auth_responses& in) -{ - const std::vector<std::string> check{u8"nonce", u8"qop", u8"realm", u8"stale"}; - - auto current = in.begin(); - const auto end = in.end(); - if (current == end) - return true; - - ++current; - for ( ; current != end; ++current ) - { - for (const auto& field : check) - { - const std::string& expected = in[0].at(field); - const std::string& actual = current->at(field); - EXPECT_EQ(expected, actual); - if (expected != actual) - return false; - } - } - return true; -} - -bool is_unauthorized(const http::http_response_info& response) -{ - EXPECT_EQ(401, response.m_response_code); - EXPECT_STREQ(u8"Unauthorized", response.m_response_comment.c_str()); - EXPECT_STREQ(u8"text/html", response.m_mime_tipe.c_str()); - return response.m_response_code == 401 && - response.m_response_comment == u8"Unauthorized" && - response.m_mime_tipe == u8"text/html"; -} - -fields parse_fields(const std::string& value) -{ - namespace qi = boost::spirit::qi; - - fields out{}; - const bool rc = qi::parse( - value.begin(), value.end(), - qi::lit(u8"Digest ") >> (( - +qi::ascii::alpha >> - qi::lit('=') >> ( - (qi::lit('"') >> +(qi::ascii::char_ - '"') >> qi::lit('"')) | - +(qi::ascii::graph - qi::ascii::char_(u8"()<>@,;:\\\"/[]?={}")) - ) - ) % ',' - ) >> qi::eoi, - out - ); - if (!rc) - throw std::runtime_error{"Bad field given in HTTP header"}; - - return out; -} - -auth_responses parse_response(const http::http_response_info& response) -{ - auth_responses result{}; - - const auto end = response.m_additional_fields.end(); - for (auto current = response.m_additional_fields.begin();; ++current) - { - current = std::find_if(current, end, [] (const std::pair<std::string, std::string>& field) { - return boost::equals(u8"WWW-authenticate", field.first); - }); - - if (current == end) - return result; - - result.push_back(parse_fields(current->second)); - } - return result; -} - -std::string md5_hex(const std::string& in) -{ - md5::MD5_CTX ctx{}; - md5::MD5Init(std::addressof(ctx)); - md5::MD5Update( - std::addressof(ctx), - reinterpret_cast<const std::uint8_t*>(in.data()), - in.size() - ); - - std::array<std::uint8_t, 16> digest{{}}; - md5::MD5Final(digest.data(), std::addressof(ctx)); - return epee::string_tools::pod_to_hex(digest); -} - -std::string get_a1(const http::login& user, const fields& src) -{ - const std::string& realm = src.at(u8"realm"); - return boost::join( - std::vector<std::string>{user.username, realm, user.password}, u8":" - ); -} - -std::string get_a1(const http::login& user, const auth_responses& responses) -{ - return get_a1(user, responses.at(0)); -} - -std::string get_a1_sess(const http::login& user, const std::string& cnonce, const auth_responses& responses) -{ - const std::string& nonce = responses.at(0).at(u8"nonce"); - return boost::join( - std::vector<std::string>{md5_hex(get_a1(user, responses)), nonce, cnonce}, u8":" - ); -} - -std::string get_a2(const std::string& uri) -{ - return boost::join(std::vector<std::string>{"NOP", uri}, u8":"); -} - -std::string get_nc(std::uint32_t count) -{ - namespace karma = boost::spirit::karma; - std::string out; - karma::generate( - std::back_inserter(out), - karma::right_align(8, '0')[karma::uint_generator<std::uint32_t, 16>{}], - count - ); - - return out; -} -} - -TEST(HTTP_Server_Auth, NotRequired) -{ - http::http_server_auth auth{}; - EXPECT_FALSE(auth.get_response(http::http_request_info{})); -} - -TEST(HTTP_Server_Auth, MissingAuth) -{ - http::http_server_auth auth{{"foo", "bar"}}; - EXPECT_TRUE(bool(auth.get_response(http::http_request_info{}))); - { - http::http_request_info request{}; - request.m_header_info.m_etc_fields.push_back({"\xFF", "\xFF"}); - EXPECT_TRUE(bool(auth.get_response(request))); - } -} - -TEST(HTTP_Server_Auth, BadSyntax) -{ - http::http_server_auth auth{{"foo", "bar"}}; - EXPECT_TRUE(bool(auth.get_response(make_request({{u8"algorithm", "fo\xFF"}})))); - EXPECT_TRUE(bool(auth.get_response(make_request({{u8"cnonce", "\"000\xFF\""}})))); - EXPECT_TRUE(bool(auth.get_response(make_request({{u8"cnonce \xFF =", "\"000\xFF\""}})))); - EXPECT_TRUE(bool(auth.get_response(make_request({{u8" \xFF cnonce", "\"000\xFF\""}})))); -} - -TEST(HTTP_Server_Auth, MD5) -{ - http::login user{"foo", "bar"}; - http::http_server_auth auth{user}; - - const auto response = auth.get_response(make_request(fields{})); - ASSERT_TRUE(bool(response)); - EXPECT_TRUE(is_unauthorized(*response)); - - const auto fields = parse_response(*response); - ASSERT_LE(2u, fields.size()); - EXPECT_TRUE(has_same_fields(fields)); - - const std::string& nonce = fields[0].at(u8"nonce"); - EXPECT_EQ(24, nonce.size()); - - const std::string uri{"/some_foo_thing"}; - - const std::string a1 = get_a1(user, fields); - const std::string a2 = get_a2(uri); - - const std::string auth_code = md5_hex( - boost::join(std::vector<std::string>{md5_hex(a1), nonce, md5_hex(a2)}, u8":") - ); - - const auto request = make_request({ - {u8"nonce", quoted(nonce)}, - {u8"realm", quoted(fields[0].at(u8"realm"))}, - {u8"response", quoted(auth_code)}, - {u8"uri", quoted(uri)}, - {u8"username", quoted(user.username)} - }); - - EXPECT_FALSE(bool(auth.get_response(request))); - - const auto response2 = auth.get_response(request); - ASSERT_TRUE(bool(response2)); - EXPECT_TRUE(is_unauthorized(*response2)); - - const auto fields2 = parse_response(*response2); - ASSERT_LE(2u, fields2.size()); - EXPECT_TRUE(has_same_fields(fields2)); - - EXPECT_NE(nonce, fields2[0].at(u8"nonce")); - EXPECT_STREQ(u8"true", fields2[0].at(u8"stale").c_str()); -} - -TEST(HTTP_Server_Auth, MD5_sess) -{ - constexpr const char cnonce[] = "not a good cnonce"; - - http::login user{"foo", "bar"}; - http::http_server_auth auth{user}; - - const auto response = auth.get_response(make_request(fields{})); - ASSERT_TRUE(bool(response)); - EXPECT_TRUE(is_unauthorized(*response)); - - const auto fields = parse_response(*response); - ASSERT_LE(2u, fields.size()); - EXPECT_TRUE(has_same_fields(fields)); - - const std::string& nonce = fields[0].at(u8"nonce"); - EXPECT_EQ(24, nonce.size()); - - const std::string uri{"/some_foo_thing"}; - - const std::string a1 = get_a1_sess(user, cnonce, fields); - const std::string a2 = get_a2(uri); - - const std::string auth_code = md5_hex( - boost::join(std::vector<std::string>{md5_hex(a1), nonce, md5_hex(a2)}, u8":") - ); - - const auto request = make_request({ - {u8"algorithm", u8"md5-sess"}, - {u8"cnonce", quoted(cnonce)}, - {u8"nonce", quoted(nonce)}, - {u8"realm", quoted(fields[0].at(u8"realm"))}, - {u8"response", quoted(auth_code)}, - {u8"uri", quoted(uri)}, - {u8"username", quoted(user.username)} - }); - - EXPECT_FALSE(bool(auth.get_response(request))); - - const auto response2 = auth.get_response(request); - ASSERT_TRUE(bool(response2)); - EXPECT_TRUE(is_unauthorized(*response2)); - - const auto fields2 = parse_response(*response2); - ASSERT_LE(2u, fields2.size()); - EXPECT_TRUE(has_same_fields(fields2)); - - EXPECT_NE(nonce, fields2[0].at(u8"nonce")); - EXPECT_STREQ(u8"true", fields2[0].at(u8"stale").c_str()); -} - -TEST(HTTP_Server_Auth, MD5_auth) -{ - constexpr const char cnonce[] = "not a nonce"; - constexpr const char qop[] = "auth"; - - http::login user{"foo", "bar"}; - http::http_server_auth auth{user}; - - const auto response = auth.get_response(make_request(fields{})); - ASSERT_TRUE(bool(response)); - EXPECT_TRUE(is_unauthorized(*response)); - - const auto parsed = parse_response(*response); - ASSERT_LE(2u, parsed.size()); - EXPECT_TRUE(has_same_fields(parsed)); - - const std::string& nonce = parsed[0].at(u8"nonce"); - EXPECT_EQ(24, nonce.size()); - - const std::string uri{"/some_foo_thing"}; - - const std::string a1 = get_a1(user, parsed); - const std::string a2 = get_a2(uri); - std::string nc = get_nc(1); - - const auto generate_auth = [&] { - return md5_hex( - boost::join( - std::vector<std::string>{md5_hex(a1), nonce, nc, cnonce, qop, md5_hex(a2)}, u8":" - ) - ); - }; - - fields args{ - {u8"algorithm", quoted(u8"md5")}, - {u8"cnonce", quoted(cnonce)}, - {u8"nc", nc}, - {u8"nonce", quoted(nonce)}, - {u8"qop", quoted(qop)}, - {u8"realm", quoted(parsed[0].at(u8"realm"))}, - {u8"response", quoted(generate_auth())}, - {u8"uri", quoted(uri)}, - {u8"username", quoted(user.username)} - }; - - const auto request = make_request(args); - EXPECT_FALSE(bool(auth.get_response(request))); - - for (unsigned i = 2; i < 20; ++i) - { - nc = get_nc(i); - args.at(u8"nc") = nc; - args.at(u8"response") = quoted(generate_auth()); - EXPECT_FALSE(auth.get_response(make_request(args))); - } - - const auto replay = auth.get_response(request); - ASSERT_TRUE(bool(replay)); - EXPECT_TRUE(is_unauthorized(*replay)); - - const auto parsed_replay = parse_response(*replay); - ASSERT_LE(2u, parsed_replay.size()); - EXPECT_TRUE(has_same_fields(parsed_replay)); - - EXPECT_NE(nonce, parsed_replay[0].at(u8"nonce")); - EXPECT_STREQ(u8"true", parsed_replay[0].at(u8"stale").c_str()); -} - -TEST(HTTP_Server_Auth, MD5_sess_auth) -{ - constexpr const char cnonce[] = "not a nonce"; - constexpr const char qop[] = "auth"; - - http::login user{"foo", "bar"}; - http::http_server_auth auth{user}; - - const auto response = auth.get_response(make_request(fields{})); - ASSERT_TRUE(bool(response)); - EXPECT_TRUE(is_unauthorized(*response)); - - const auto parsed = parse_response(*response); - ASSERT_LE(2u, parsed.size()); - EXPECT_TRUE(has_same_fields(parsed)); - - const std::string& nonce = parsed[0].at(u8"nonce"); - EXPECT_EQ(24, nonce.size()); - - const std::string uri{"/some_foo_thing"}; - - const std::string a1 = get_a1_sess(user, cnonce, parsed); - const std::string a2 = get_a2(uri); - std::string nc = get_nc(1); - - const auto generate_auth = [&] { - return md5_hex( - boost::join( - std::vector<std::string>{md5_hex(a1), nonce, nc, cnonce, qop, md5_hex(a2)}, u8":" - ) - ); - }; - - fields args{ - {u8"algorithm", u8"md5-sess"}, - {u8"cnonce", quoted(cnonce)}, - {u8"nc", nc}, - {u8"nonce", quoted(nonce)}, - {u8"qop", qop}, - {u8"realm", quoted(parsed[0].at(u8"realm"))}, - {u8"response", quoted(generate_auth())}, - {u8"uri", quoted(uri)}, - {u8"username", quoted(user.username)} - }; - - const auto request = make_request(args); - EXPECT_FALSE(bool(auth.get_response(request))); - - for (unsigned i = 2; i < 20; ++i) - { - nc = get_nc(i); - args.at(u8"nc") = nc; - args.at(u8"response") = quoted(generate_auth()); - EXPECT_FALSE(auth.get_response(make_request(args))); - } - - const auto replay = auth.get_response(request); - ASSERT_TRUE(bool(replay)); - EXPECT_TRUE(is_unauthorized(*replay)); - - const auto parsed_replay = parse_response(*replay); - ASSERT_LE(2u, parsed_replay.size()); - EXPECT_TRUE(has_same_fields(parsed_replay)); - - EXPECT_NE(nonce, parsed_replay[0].at(u8"nonce")); - EXPECT_STREQ(u8"true", parsed_replay[0].at(u8"stale").c_str()); -} - - -TEST(HTTP_Auth, DogFood) -{ - const auto add_field = [] (http::http_request_info& request, http::http_client_auth& client) - { - auto field = client.get_auth_field(request.m_http_method_str, request.m_URI); - EXPECT_TRUE(bool(field)); - if (!field) - return false; - request.m_header_info.m_etc_fields.push_back(std::move(*field)); - return true; - }; - - const http::login user{"some_user", "ultimate password"}; - - http::http_server_auth server{user}; - http::http_client_auth client{user}; - - http::http_request_info request{}; - request.m_http_method_str = "GET"; - request.m_URI = "/FOO"; - - const auto response = server.get_response(request); - ASSERT_TRUE(bool(response)); - EXPECT_TRUE(is_unauthorized(*response)); - - EXPECT_EQ(http::http_client_auth::kSuccess, client.handle_401(*response)); - EXPECT_TRUE(add_field(request, client)); - EXPECT_FALSE(bool(server.get_response(request))); - - for (unsigned i = 0; i < 1000; ++i) - { - request.m_http_method_str += std::to_string(i); - request.m_header_info.m_etc_fields.clear(); - EXPECT_TRUE(add_field(request, client)); - EXPECT_FALSE(bool(server.get_response(request))); - } - - // resetting counter should be rejected by server - request.m_header_info.m_etc_fields.clear(); - client = http::http_client_auth{user}; - EXPECT_EQ(http::http_client_auth::kSuccess, client.handle_401(*response)); - EXPECT_TRUE(add_field(request, client)); - - const auto response2 = server.get_response(request); - ASSERT_TRUE(bool(response2)); - EXPECT_TRUE(is_unauthorized(*response2)); - - const auth_responses parsed1 = parse_response(*response); - const auth_responses parsed2 = parse_response(*response2); - ASSERT_LE(1u, parsed1.size()); - ASSERT_LE(1u, parsed2.size()); - EXPECT_NE(parsed1[0].at(u8"nonce"), parsed2[0].at(u8"nonce")); - - // with stale=true client should reset - request.m_header_info.m_etc_fields.clear(); - EXPECT_EQ(http::http_client_auth::kSuccess, client.handle_401(*response2)); - EXPECT_TRUE(add_field(request, client)); - EXPECT_FALSE(bool(server.get_response(request))); - - // client should give up if stale=false - EXPECT_EQ(http::http_client_auth::kBadPassword, client.handle_401(*response)); -} - -TEST(HTTP_Client_Auth, Unavailable) -{ - http::http_client_auth auth{}; - EXPECT_EQ(http::http_client_auth::kBadPassword, auth.handle_401(http::http_response_info{})); - EXPECT_FALSE(bool(auth.get_auth_field("GET", "/file"))); -} - -TEST(HTTP_Client_Auth, MissingAuthenticate) -{ - http::http_client_auth auth{{"foo", "bar"}}; - EXPECT_EQ(http::http_client_auth::kParseFailure, auth.handle_401(http::http_response_info{})); - EXPECT_FALSE(bool(auth.get_auth_field("POST", "/\xFFname"))); - { - http::http_response_info response{}; - response.m_additional_fields.push_back({"\xFF", "\xFF"}); - EXPECT_EQ(http::http_client_auth::kParseFailure, auth.handle_401(response)); - } - EXPECT_FALSE(bool(auth.get_auth_field("DELETE", "/file/does/not/exist"))); -} - -TEST(HTTP_Client_Auth, BadSyntax) -{ - http::http_client_auth auth{{"foo", "bar"}}; - EXPECT_EQ(http::http_client_auth::kParseFailure, auth.handle_401(make_response({{{u8"realm", "fo\xFF"}}}))); - EXPECT_EQ(http::http_client_auth::kParseFailure, auth.handle_401(make_response({{{u8"domain", "fo\xFF"}}}))); - EXPECT_EQ(http::http_client_auth::kParseFailure, auth.handle_401(make_response({{{u8"nonce", "fo\xFF"}}}))); - EXPECT_EQ(http::http_client_auth::kParseFailure, auth.handle_401(make_response({{{u8"nonce \xFF =", "fo\xFF"}}}))); - EXPECT_EQ(http::http_client_auth::kParseFailure, auth.handle_401(make_response({{{u8" \xFF nonce", "fo\xFF"}}}))); -} - -TEST(HTTP_Client_Auth, MD5) -{ - constexpr char method[] = "NOP"; - constexpr char nonce[] = "some crazy nonce"; - constexpr char realm[] = "the only realm"; - constexpr char uri[] = "/some_file"; - - const http::login user{"foo", "bar"}; - http::http_client_auth auth{user}; - - auto response = make_response({ - { - {u8"domain", quoted("ignored")}, - {u8"nonce", quoted(nonce)}, - {u8"REALM", quoted(realm)} - }, - { - {u8"algorithm", "null"}, - {u8"domain", quoted("ignored")}, - {u8"nonce", quoted(std::string{"e"} + nonce)}, - {u8"realm", quoted(std::string{"e"} + realm)} - }, - }); - - EXPECT_EQ(http::http_client_auth::kSuccess, auth.handle_401(response)); - const auto auth_field = auth.get_auth_field(method, uri); - ASSERT_TRUE(bool(auth_field)); - - const auto parsed = parse_fields(auth_field->second); - EXPECT_STREQ(u8"Authorization", auth_field->first.c_str()); - EXPECT_EQ(parsed.end(), parsed.find(u8"opaque")); - EXPECT_EQ(parsed.end(), parsed.find(u8"qop")); - EXPECT_EQ(parsed.end(), parsed.find(u8"nc")); - EXPECT_STREQ(u8"MD5", parsed.at(u8"algorithm").c_str()); - EXPECT_STREQ(nonce, parsed.at(u8"nonce").c_str()); - EXPECT_STREQ(uri, parsed.at(u8"uri").c_str()); - EXPECT_EQ(user.username, parsed.at(u8"username")); - EXPECT_STREQ(realm, parsed.at(u8"realm").c_str()); - - const std::string a1 = get_a1(user, parsed); - const std::string a2 = get_a2(uri); - const std::string auth_code = md5_hex( - boost::join(std::vector<std::string>{md5_hex(a1), nonce, md5_hex(a2)}, u8":") - ); - EXPECT_TRUE(boost::iequals(auth_code, parsed.at(u8"response"))); - { - const auto auth_field_dup = auth.get_auth_field(method, uri); - ASSERT_TRUE(bool(auth_field_dup)); - EXPECT_EQ(*auth_field, *auth_field_dup); - } - - - EXPECT_EQ(http::http_client_auth::kBadPassword, auth.handle_401(response)); - response.m_additional_fields.front().second.append(u8"," + write_fields({{u8"stale", u8"TRUE"}})); - EXPECT_EQ(http::http_client_auth::kSuccess, auth.handle_401(response)); -} - -TEST(HTTP_Client_Auth, MD5_auth) -{ - constexpr char cnonce[] = ""; - constexpr char method[] = "NOP"; - constexpr char nonce[] = "some crazy nonce"; - constexpr char opaque[] = "this is the opaque"; - constexpr char qop[] = u8"ignore,auth,ignore"; - constexpr char realm[] = "the only realm"; - constexpr char uri[] = "/some_file"; - - const http::login user{"foo", "bar"}; - http::http_client_auth auth{user}; - - auto response = make_response({ - { - {u8"algorithm", u8"MD5"}, - {u8"domain", quoted("ignored")}, - {u8"nonce", quoted(std::string{"e"} + nonce)}, - {u8"realm", quoted(std::string{"e"} + realm)}, - {u8"qop", quoted("some,thing,to,ignore")} - }, - { - {u8"algorIthm", quoted(u8"md5")}, - {u8"domain", quoted("ignored")}, - {u8"noNce", quoted(nonce)}, - {u8"opaque", quoted(opaque)}, - {u8"realm", quoted(realm)}, - {u8"QoP", quoted(qop)} - } - }); - - EXPECT_EQ(http::http_client_auth::kSuccess, auth.handle_401(response)); - - for (unsigned i = 1; i < 1000; ++i) - { - const std::string nc = get_nc(i); - - const auto auth_field = auth.get_auth_field(method, uri); - ASSERT_TRUE(bool(auth_field)); - - const auto parsed = parse_fields(auth_field->second); - EXPECT_STREQ(u8"Authorization", auth_field->first.c_str()); - EXPECT_STREQ(u8"MD5", parsed.at(u8"algorithm").c_str()); - EXPECT_STREQ(nonce, parsed.at(u8"nonce").c_str()); - EXPECT_STREQ(opaque, parsed.at(u8"opaque").c_str()); - EXPECT_STREQ(u8"auth", parsed.at(u8"qop").c_str()); - EXPECT_STREQ(uri, parsed.at(u8"uri").c_str()); - EXPECT_EQ(user.username, parsed.at(u8"username")); - EXPECT_STREQ(realm, parsed.at(u8"realm").c_str()); - EXPECT_EQ(nc, parsed.at(u8"nc")); - - const std::string a1 = get_a1(user, parsed); - const std::string a2 = get_a2(uri); - const std::string auth_code = md5_hex( - boost::join(std::vector<std::string>{md5_hex(a1), nonce, nc, cnonce, u8"auth", md5_hex(a2)}, u8":") - ); - EXPECT_TRUE(boost::iequals(auth_code, parsed.at(u8"response"))); - } - - EXPECT_EQ(http::http_client_auth::kBadPassword, auth.handle_401(response)); - response.m_additional_fields.back().second.append(u8"," + write_fields({{u8"stale", u8"trUe"}})); - EXPECT_EQ(http::http_client_auth::kSuccess, auth.handle_401(response)); -} - |