ctap_request_unittest.cc 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108
  1. // Copyright 2017 The Chromium Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style license that can be
  3. // found in the LICENSE file.
  4. #include "base/containers/contains.h"
  5. #include "components/cbor/reader.h"
  6. #include "device/fido/ctap_get_assertion_request.h"
  7. #include "device/fido/ctap_make_credential_request.h"
  8. #include "device/fido/fido_constants.h"
  9. #include "device/fido/fido_parsing_utils.h"
  10. #include "device/fido/fido_test_data.h"
  11. #include "device/fido/fido_transport_protocol.h"
  12. #include "device/fido/mock_fido_device.h"
  13. #include "device/fido/public_key_credential_descriptor.h"
  14. #include "device/fido/virtual_ctap2_device.h"
  15. #include "testing/gmock/include/gmock/gmock.h"
  16. #include "testing/gtest/include/gtest/gtest.h"
  17. namespace device {
  18. // Leveraging example 4 of section 6.1 of the spec
  19. // https://fidoalliance.org/specs/fido-v2.0-rd-20170927/fido-client-to-authenticator-protocol-v2.0-rd-20170927.html
  20. TEST(CTAPRequestTest, TestConstructMakeCredentialRequestParam) {
  21. PublicKeyCredentialRpEntity rp("acme.com");
  22. rp.name = "Acme";
  23. PublicKeyCredentialUserEntity user(
  24. fido_parsing_utils::Materialize(test_data::kUserId));
  25. user.name = "johnpsmith@example.com";
  26. user.display_name = "John P. Smith";
  27. user.icon_url = GURL("https://pics.acme.com/00/p/aBjjjpqPb.png");
  28. CtapMakeCredentialRequest make_credential_param(
  29. test_data::kClientDataJson, std::move(rp), std::move(user),
  30. PublicKeyCredentialParams({{CredentialType::kPublicKey, -7},
  31. {CredentialType::kPublicKey, 257}}));
  32. make_credential_param.resident_key_required = true;
  33. make_credential_param.user_verification =
  34. UserVerificationRequirement::kRequired;
  35. auto serialized_data = MockFidoDevice::EncodeCBORRequest(
  36. AsCTAPRequestValuePair(make_credential_param));
  37. EXPECT_THAT(serialized_data, ::testing::ElementsAreArray(
  38. test_data::kCtapMakeCredentialRequest));
  39. }
  40. TEST(CTAPRequestTest, TestConstructGetAssertionRequest) {
  41. CtapGetAssertionRequest get_assertion_req("acme.com",
  42. test_data::kClientDataJson);
  43. std::vector<PublicKeyCredentialDescriptor> allowed_list;
  44. allowed_list.push_back(PublicKeyCredentialDescriptor(
  45. CredentialType::kPublicKey,
  46. {0xf2, 0x20, 0x06, 0xde, 0x4f, 0x90, 0x5a, 0xf6, 0x8a, 0x43, 0x94,
  47. 0x2f, 0x02, 0x4f, 0x2a, 0x5e, 0xce, 0x60, 0x3d, 0x9c, 0x6d, 0x4b,
  48. 0x3d, 0xf8, 0xbe, 0x08, 0xed, 0x01, 0xfc, 0x44, 0x26, 0x46, 0xd0,
  49. 0x34, 0x85, 0x8a, 0xc7, 0x5b, 0xed, 0x3f, 0xd5, 0x80, 0xbf, 0x98,
  50. 0x08, 0xd9, 0x4f, 0xcb, 0xee, 0x82, 0xb9, 0xb2, 0xef, 0x66, 0x77,
  51. 0xaf, 0x0a, 0xdc, 0xc3, 0x58, 0x52, 0xea, 0x6b, 0x9e}));
  52. allowed_list.push_back(PublicKeyCredentialDescriptor(
  53. CredentialType::kPublicKey,
  54. {0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03,
  55. 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03,
  56. 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03,
  57. 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03,
  58. 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03}));
  59. get_assertion_req.allow_list = std::move(allowed_list);
  60. get_assertion_req.user_presence_required = false;
  61. get_assertion_req.user_verification = UserVerificationRequirement::kRequired;
  62. auto serialized_data = MockFidoDevice::EncodeCBORRequest(
  63. AsCTAPRequestValuePair(get_assertion_req));
  64. EXPECT_THAT(serialized_data,
  65. ::testing::ElementsAreArray(
  66. test_data::kTestComplexCtapGetAssertionRequest));
  67. }
  68. // Regression test for https://crbug.com/1270757.
  69. TEST(CTAPRequestTest, PublicKeyCredentialDescriptorAsCBOR_1270757) {
  70. PublicKeyCredentialDescriptor descriptor(
  71. CredentialType::kPublicKey, {{1, 2, 3}},
  72. {FidoTransportProtocol::kUsbHumanInterfaceDevice});
  73. cbor::Value value = AsCBOR(descriptor);
  74. const cbor::Value::MapValue& map = value.GetMap();
  75. EXPECT_FALSE(base::Contains(map, cbor::Value("transports")));
  76. }
  77. // Also for https://crbug.com/1270757: check that
  78. // |PublicKeyCredentialDescriptor| notices when extra keys are present. The
  79. // |VirtualCtap2Device| will reject such requests.
  80. TEST(CTAPRequestTest, PublicKeyCredentialDescriptorNoticesExtraKeys) {
  81. for (const bool extra_key : {false, true}) {
  82. SCOPED_TRACE(extra_key);
  83. cbor::Value::MapValue map;
  84. map.emplace("type", "public-key");
  85. map.emplace("id", std::vector<uint8_t>({1, 2, 3, 4}));
  86. if (extra_key) {
  87. map.emplace("unexpected", "value");
  88. }
  89. const absl::optional<PublicKeyCredentialDescriptor> descriptor(
  90. PublicKeyCredentialDescriptor::CreateFromCBORValue(
  91. cbor::Value(std::move(map))));
  92. ASSERT_TRUE(descriptor);
  93. EXPECT_EQ(extra_key, descriptor->had_other_keys);
  94. }
  95. }
  96. } // namespace device