// Copyright (c) 2010 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/http/mock_sspi_library_win.h" #include "testing/gtest/include/gtest/gtest.h" namespace net { MockSSPILibrary::MockSSPILibrary() { } MockSSPILibrary::~MockSSPILibrary() { EXPECT_TRUE(expected_package_queries_.empty()); EXPECT_TRUE(expected_freed_packages_.empty()); } SECURITY_STATUS MockSSPILibrary::AcquireCredentialsHandle( LPWSTR pszPrincipal, LPWSTR pszPackage, unsigned long fCredentialUse, void* pvLogonId, void* pvAuthData, SEC_GET_KEY_FN pGetKeyFn, void* pvGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry) { // Fill in phCredential with arbitrary value. phCredential->dwLower = phCredential->dwUpper = ((ULONG_PTR) ((INT_PTR)0)); return SEC_E_OK; } SECURITY_STATUS MockSSPILibrary::InitializeSecurityContext( PCredHandle phCredential, PCtxtHandle phContext, SEC_WCHAR* pszTargetName, unsigned long fContextReq, unsigned long Reserved1, unsigned long TargetDataRep, PSecBufferDesc pInput, unsigned long Reserved2, PCtxtHandle phNewContext, PSecBufferDesc pOutput, unsigned long* contextAttr, PTimeStamp ptsExpiry) { // Fill in the outbound buffer with garbage data. PSecBuffer out_buffer = pOutput->pBuffers; out_buffer->cbBuffer = 2; uint8* buf = reinterpret_cast<uint8 *>(out_buffer->pvBuffer); buf[0] = 0xAB; buf[1] = 0xBA; // Fill in phNewContext with arbitrary value if it's invalid. if (phNewContext != phContext) phNewContext->dwLower = phNewContext->dwUpper = ((ULONG_PTR) ((INT_PTR)0)); return SEC_E_OK; } SECURITY_STATUS MockSSPILibrary::QuerySecurityPackageInfo( LPWSTR pszPackageName, PSecPkgInfoW *pkgInfo) { EXPECT_TRUE(!expected_package_queries_.empty()); PackageQuery package_query = expected_package_queries_.front(); expected_package_queries_.pop_front(); std::wstring actual_package(pszPackageName); EXPECT_EQ(package_query.expected_package, actual_package); *pkgInfo = package_query.package_info; if (package_query.response_code == SEC_E_OK) expected_freed_packages_.insert(package_query.package_info); return package_query.response_code; } SECURITY_STATUS MockSSPILibrary::FreeCredentialsHandle( PCredHandle phCredential) { EXPECT_TRUE(phCredential->dwLower == ((ULONG_PTR) ((INT_PTR) 0))); EXPECT_TRUE(phCredential->dwLower == ((ULONG_PTR) ((INT_PTR) 0))); SecInvalidateHandle(phCredential); return SEC_E_OK; } SECURITY_STATUS MockSSPILibrary::DeleteSecurityContext(PCtxtHandle phContext) { EXPECT_TRUE(phContext->dwLower == ((ULONG_PTR) ((INT_PTR) 0))); EXPECT_TRUE(phContext->dwLower == ((ULONG_PTR) ((INT_PTR) 0))); SecInvalidateHandle(phContext); return SEC_E_OK; } SECURITY_STATUS MockSSPILibrary::FreeContextBuffer(PVOID pvContextBuffer) { PSecPkgInfoW package_info = static_cast<PSecPkgInfoW>(pvContextBuffer); std::set<PSecPkgInfoW>::iterator it = expected_freed_packages_.find( package_info); EXPECT_TRUE(it != expected_freed_packages_.end()); expected_freed_packages_.erase(it); return SEC_E_OK; } void MockSSPILibrary::ExpectQuerySecurityPackageInfo( const std::wstring& expected_package, SECURITY_STATUS response_code, PSecPkgInfoW package_info) { PackageQuery package_query = {expected_package, response_code, package_info}; expected_package_queries_.push_back(package_query); } } // namespace net