github.com/psiphon-Labs/psiphon-tunnel-core@v2.0.28+incompatible/psiphon/common/crypto/ssh/ssh_gss_test.go (about) 1 package ssh 2 3 import ( 4 "fmt" 5 "testing" 6 ) 7 8 func TestParseGSSAPIPayload(t *testing.T) { 9 payload := []byte{0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x0b, 0x06, 0x09, 10 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x12, 0x01, 0x02, 0x02} 11 res, err := parseGSSAPIPayload(payload) 12 if err != nil { 13 t.Fatal(err) 14 } 15 if ok := res.OIDS[0].Equal(krb5Mesh); !ok { 16 t.Fatalf("got %v, want %v", res, krb5Mesh) 17 } 18 } 19 20 func TestBuildMIC(t *testing.T) { 21 sessionID := []byte{134, 180, 134, 194, 62, 145, 171, 82, 119, 149, 254, 196, 125, 173, 177, 145, 187, 85, 53, 22 183, 44, 150, 219, 129, 166, 195, 19, 33, 209, 246, 175, 121} 23 username := "testuser" 24 service := "ssh-connection" 25 authMethod := "gssapi-with-mic" 26 expected := []byte{0, 0, 0, 32, 134, 180, 134, 194, 62, 145, 171, 82, 119, 149, 254, 196, 125, 173, 177, 145, 187, 85, 53, 183, 44, 150, 219, 129, 166, 195, 19, 33, 209, 246, 175, 121, 50, 0, 0, 0, 8, 116, 101, 115, 116, 117, 115, 101, 114, 0, 0, 0, 14, 115, 115, 104, 45, 99, 111, 110, 110, 101, 99, 116, 105, 111, 110, 0, 0, 0, 15, 103, 115, 115, 97, 112, 105, 45, 119, 105, 116, 104, 45, 109, 105, 99} 27 result := buildMIC(string(sessionID), username, service, authMethod) 28 if string(result) != string(expected) { 29 t.Fatalf("buildMic: got %v, want %v", result, expected) 30 } 31 } 32 33 type exchange struct { 34 outToken string 35 expectedToken string 36 } 37 38 type FakeClient struct { 39 exchanges []*exchange 40 round int 41 mic []byte 42 maxRound int 43 } 44 45 func (f *FakeClient) InitSecContext(target string, token []byte, isGSSDelegCreds bool) (outputToken []byte, needContinue bool, err error) { 46 if token == nil { 47 if f.exchanges[f.round].expectedToken != "" { 48 err = fmt.Errorf("got empty token, want %q", f.exchanges[f.round].expectedToken) 49 } else { 50 outputToken = []byte(f.exchanges[f.round].outToken) 51 } 52 } else { 53 if string(token) != string(f.exchanges[f.round].expectedToken) { 54 err = fmt.Errorf("got %q, want token %q", token, f.exchanges[f.round].expectedToken) 55 } else { 56 outputToken = []byte(f.exchanges[f.round].outToken) 57 } 58 } 59 f.round++ 60 needContinue = f.round < f.maxRound 61 return 62 } 63 64 func (f *FakeClient) GetMIC(micField []byte) ([]byte, error) { 65 return f.mic, nil 66 } 67 68 func (f *FakeClient) DeleteSecContext() error { 69 return nil 70 } 71 72 type FakeServer struct { 73 exchanges []*exchange 74 round int 75 expectedMIC []byte 76 srcName string 77 maxRound int 78 } 79 80 func (f *FakeServer) AcceptSecContext(token []byte) (outputToken []byte, srcName string, needContinue bool, err error) { 81 if token == nil { 82 if f.exchanges[f.round].expectedToken != "" { 83 err = fmt.Errorf("got empty token, want %q", f.exchanges[f.round].expectedToken) 84 } else { 85 outputToken = []byte(f.exchanges[f.round].outToken) 86 } 87 } else { 88 if string(token) != string(f.exchanges[f.round].expectedToken) { 89 err = fmt.Errorf("got %q, want token %q", token, f.exchanges[f.round].expectedToken) 90 } else { 91 outputToken = []byte(f.exchanges[f.round].outToken) 92 } 93 } 94 f.round++ 95 needContinue = f.round < f.maxRound 96 srcName = f.srcName 97 return 98 } 99 100 func (f *FakeServer) VerifyMIC(micField []byte, micToken []byte) error { 101 if string(micToken) != string(f.expectedMIC) { 102 return fmt.Errorf("got MICToken %q, want %q", micToken, f.expectedMIC) 103 } 104 return nil 105 } 106 107 func (f *FakeServer) DeleteSecContext() error { 108 return nil 109 }