You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

ScramMechanismTest.kt 9.0KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230
  1. package com.dmdirc.ktirc.sasl
  2. import com.dmdirc.ktirc.IrcClient
  3. import com.dmdirc.ktirc.SaslConfig
  4. import com.dmdirc.ktirc.model.ServerState
  5. import com.nhaarman.mockitokotlin2.doReturn
  6. import com.nhaarman.mockitokotlin2.mock
  7. import com.nhaarman.mockitokotlin2.verify
  8. import org.junit.jupiter.api.Assertions.assertEquals
  9. import org.junit.jupiter.api.Test
  10. internal class ScramMechanismTest {
  11. private val serverState = ServerState("", "")
  12. private val ircClient = mock<IrcClient> {
  13. on { serverState } doReturn serverState
  14. }
  15. @Test
  16. fun `sends first message when no state is present`() {
  17. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  18. username = "user"
  19. password = "pencil"
  20. })
  21. mechanism.handleAuthenticationEvent(ircClient, "+".toByteArray())
  22. val nonce = (serverState.sasl.mechanismState as ScramState).clientNonce
  23. verify(ircClient).send("AUTHENTICATE", "n,,n=user,r=$nonce".toByteArray().toBase64())
  24. }
  25. @Test
  26. fun `aborts if the server's first message contains extensions`() {
  27. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  28. username = "user"
  29. password = "pencil"
  30. })
  31. serverState.sasl.mechanismState = ScramState(scramStage = ScramStage.SendingSecondMessage)
  32. mechanism.handleAuthenticationEvent(ircClient, "m=future".toByteArray())
  33. verify(ircClient).send("AUTHENTICATE", "*")
  34. }
  35. @Test
  36. fun `aborts if the server's first message contains an error`() {
  37. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  38. username = "user"
  39. password = "pencil"
  40. })
  41. serverState.sasl.mechanismState = ScramState(scramStage = ScramStage.SendingSecondMessage)
  42. mechanism.handleAuthenticationEvent(ircClient, "e=whoops".toByteArray())
  43. verify(ircClient).send("AUTHENTICATE", "*")
  44. }
  45. @Test
  46. fun `aborts if the server's first message lacks an iteration count`() {
  47. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  48. username = "user"
  49. password = "pencil"
  50. })
  51. serverState.sasl.mechanismState = ScramState(scramStage = ScramStage.SendingSecondMessage)
  52. mechanism.handleAuthenticationEvent(ircClient, "r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,s=QSXCR+Q6sek8bf92".toByteArray())
  53. verify(ircClient).send("AUTHENTICATE", "*")
  54. }
  55. @Test
  56. fun `aborts if the server's first message has an invalid iteration count`() {
  57. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  58. username = "user"
  59. password = "pencil"
  60. })
  61. serverState.sasl.mechanismState = ScramState(scramStage = ScramStage.SendingSecondMessage)
  62. mechanism.handleAuthenticationEvent(ircClient, "r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,s=QSXCR+Q6sek8bf92,i=leet".toByteArray())
  63. verify(ircClient).send("AUTHENTICATE", "*")
  64. }
  65. @Test
  66. fun `aborts if the server's first message lacks a nonce`() {
  67. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  68. username = "user"
  69. password = "pencil"
  70. })
  71. serverState.sasl.mechanismState = ScramState(scramStage = ScramStage.SendingSecondMessage)
  72. mechanism.handleAuthenticationEvent(ircClient, "rs=QSXCR+Q6sek8bf92,i=4096".toByteArray())
  73. verify(ircClient).send("AUTHENTICATE", "*")
  74. }
  75. @Test
  76. fun `aborts if the server's first message lacks a salt`() {
  77. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  78. username = "user"
  79. password = "pencil"
  80. })
  81. serverState.sasl.mechanismState = ScramState(scramStage = ScramStage.SendingSecondMessage)
  82. mechanism.handleAuthenticationEvent(ircClient, "r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,i=4096".toByteArray())
  83. verify(ircClient).send("AUTHENTICATE", "*")
  84. }
  85. @Test
  86. fun `updates state after receiving server's first message`() {
  87. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  88. username = "user"
  89. password = "pencil"
  90. })
  91. serverState.sasl.mechanismState = ScramState(scramStage = ScramStage.SendingSecondMessage, clientNonce = "fyko+d2lbbFgONRv9qkxdawL")
  92. mechanism.handleAuthenticationEvent(ircClient, "r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,s=QSXCR+Q6sek8bf92,i=4096".toByteArray())
  93. (serverState.sasl.mechanismState as ScramState).let {
  94. assertEquals(ScramStage.Finishing, it.scramStage)
  95. assertEquals("fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j", it.serverNonce)
  96. assertEquals(4096, it.iterCount)
  97. assertEquals("QSXCR+Q6sek8bf92", it.salt.toBase64())
  98. assertEquals("HZbuOlKbWl+eR8AfIposuKbhX30=", it.saltedPassword.toBase64())
  99. assertEquals("n=user,r=fyko+d2lbbFgONRv9qkxdawL,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,s=QSXCR+Q6sek8bf92,i=4096,c=biws,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j", String(it.authMessage))
  100. }
  101. }
  102. @Test
  103. fun `responds to server's first message`() {
  104. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  105. username = "user"
  106. password = "pencil"
  107. })
  108. serverState.sasl.mechanismState = ScramState(scramStage = ScramStage.SendingSecondMessage, clientNonce = "fyko+d2lbbFgONRv9qkxdawL")
  109. mechanism.handleAuthenticationEvent(ircClient, "r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,s=QSXCR+Q6sek8bf92,i=4096".toByteArray())
  110. verify(ircClient).send("AUTHENTICATE", "c=biws,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,p=v0X8v3Bz2T0CJGbJQyF0X+HI4Ts=".toByteArray().toBase64())
  111. }
  112. @Test
  113. fun `aborts if the server's final message contains extensions`() {
  114. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  115. username = "user"
  116. password = "pencil"
  117. })
  118. serverState.sasl.mechanismState = ScramState(scramStage = ScramStage.Finishing)
  119. mechanism.handleAuthenticationEvent(ircClient, "m=future".toByteArray())
  120. verify(ircClient).send("AUTHENTICATE", "*")
  121. }
  122. @Test
  123. fun `aborts if the server's final message contains an error`() {
  124. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  125. username = "user"
  126. password = "pencil"
  127. })
  128. serverState.sasl.mechanismState = ScramState(scramStage = ScramStage.Finishing)
  129. mechanism.handleAuthenticationEvent(ircClient, "e=whoops".toByteArray())
  130. verify(ircClient).send("AUTHENTICATE", "*")
  131. }
  132. @Test
  133. fun `aborts if the server's final message doesn't contain a verifier`() {
  134. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  135. username = "user"
  136. password = "pencil"
  137. })
  138. serverState.sasl.mechanismState = ScramState(
  139. scramStage = ScramStage.Finishing,
  140. saltedPassword = "HZbuOlKbWl+eR8AfIposuKbhX30=".fromBase64(),
  141. authMessage = "n=user,r=fyko+d2lbbFgONRv9qkxdawL,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,s=QSXCR+Q6sek8bf92,i=4096,c=biws,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j".toByteArray())
  142. mechanism.handleAuthenticationEvent(ircClient, "".toByteArray())
  143. verify(ircClient).send("AUTHENTICATE", "*")
  144. }
  145. @Test
  146. fun `aborts if the server's verifier doesn't match`() {
  147. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  148. username = "user"
  149. password = "pencil"
  150. })
  151. serverState.sasl.mechanismState = ScramState(
  152. scramStage = ScramStage.Finishing,
  153. saltedPassword = "HZbuOlKbWl+eR8AfIposuKbhX30=".fromBase64(),
  154. authMessage = "n=user,r=fyko+d2lbbFgONRv9qkxdawL,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,s=QSXCR+Q6sek8bf92,i=4096,c=biws,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j".toByteArray())
  155. mechanism.handleAuthenticationEvent(ircClient, "v=rmF9pqV8S7suAoZWja4dJRkF=".toByteArray())
  156. verify(ircClient).send("AUTHENTICATE", "*")
  157. }
  158. @Test
  159. fun `sends final message if server's verifier matches`() {
  160. val mechanism = ScramMechanism("SHA-1", 1, SaslConfig().apply {
  161. username = "user"
  162. password = "pencil"
  163. })
  164. serverState.sasl.mechanismState = ScramState(
  165. scramStage = ScramStage.Finishing,
  166. saltedPassword = "HZbuOlKbWl+eR8AfIposuKbhX30=".fromBase64(),
  167. authMessage = "n=user,r=fyko+d2lbbFgONRv9qkxdawL,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,s=QSXCR+Q6sek8bf92,i=4096,c=biws,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j".toByteArray())
  168. mechanism.handleAuthenticationEvent(ircClient, "v=rmF9pqV8S7suAoZWja4dJRkFsKQ=".toByteArray())
  169. verify(ircClient).send("AUTHENTICATE", "+")
  170. }
  171. }