mirror of
https://github.com/bolkedebruin/rdpgw.git
synced 2025-08-18 06:23:49 +02:00
Add tunnelauth tests
This commit is contained in:
parent
057799e0e5
commit
29d4b276e6
2 changed files with 79 additions and 0 deletions
|
@ -114,3 +114,37 @@ func (c *ClientConfig) tunnelResponse(data []byte) (tunnelId uint32, caps uint32
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *ClientConfig) tunnelAuthRequest(name string) []byte {
|
||||||
|
utf16name := EncodeUTF16(name)
|
||||||
|
size := uint16(len(utf16name))
|
||||||
|
|
||||||
|
buf := new(bytes.Buffer)
|
||||||
|
binary.Write(buf, binary.LittleEndian, size)
|
||||||
|
buf.Write(utf16name)
|
||||||
|
|
||||||
|
return createPacket(PKT_TYPE_TUNNEL_AUTH, buf.Bytes())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *ClientConfig) tunnelAuthResponse(data []byte) (flags uint32, timeout uint32, err error) {
|
||||||
|
var errorCode uint32
|
||||||
|
var fields uint16
|
||||||
|
|
||||||
|
r := bytes.NewReader(data)
|
||||||
|
binary.Read(r, binary.LittleEndian, &errorCode)
|
||||||
|
binary.Read(r, binary.LittleEndian, &fields)
|
||||||
|
r.Seek(2, io.SeekCurrent)
|
||||||
|
|
||||||
|
if (fields & HTTP_TUNNEL_AUTH_RESPONSE_FIELD_REDIR_FLAGS) == HTTP_TUNNEL_AUTH_RESPONSE_FIELD_REDIR_FLAGS {
|
||||||
|
binary.Read(r, binary.LittleEndian, &flags)
|
||||||
|
}
|
||||||
|
if (fields & HTTP_TUNNEL_AUTH_RESPONSE_FIELD_IDLE_TIMEOUT) == HTTP_TUNNEL_AUTH_RESPONSE_FIELD_IDLE_TIMEOUT {
|
||||||
|
binary.Read(r, binary.LittleEndian, &timeout)
|
||||||
|
}
|
||||||
|
|
||||||
|
if errorCode > 0 {
|
||||||
|
return 0, 0, fmt.Errorf("tunnel auth error %d", errorCode)
|
||||||
|
}
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
|
@ -12,6 +12,8 @@ const (
|
||||||
HandshakeResponseLen = HeaderLen + 10
|
HandshakeResponseLen = HeaderLen + 10
|
||||||
TunnelCreateRequestLen = HeaderLen + 8 // + dynamic
|
TunnelCreateRequestLen = HeaderLen + 8 // + dynamic
|
||||||
TunnelCreateResponseLen = HeaderLen + 18
|
TunnelCreateResponseLen = HeaderLen + 18
|
||||||
|
TunnelAuthLen = HeaderLen + 2 // + dynamic
|
||||||
|
TunnelAuthResponseLen = HeaderLen + 16
|
||||||
)
|
)
|
||||||
|
|
||||||
func verifyPacketHeader(data []byte , expPt uint16, expSize uint32) (uint16, uint32, []byte, error) {
|
func verifyPacketHeader(data []byte , expPt uint16, expSize uint32) (uint16, uint32, []byte, error) {
|
||||||
|
@ -114,3 +116,46 @@ func TestTunnelCreation(t *testing.T) {
|
||||||
t.Fatalf("tunnelResponse failed got caps %d, expected %d", caps, caps | HTTP_CAPABILITY_IDLE_TIMEOUT)
|
t.Fatalf("tunnelResponse failed got caps %d, expected %d", caps, caps | HTTP_CAPABILITY_IDLE_TIMEOUT)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestTunnelAuth(t *testing.T) {
|
||||||
|
client := ClientConfig{}
|
||||||
|
s := &SessionInfo{}
|
||||||
|
hc := &HandlerConf{
|
||||||
|
TokenAuth: true,
|
||||||
|
IdleTimeout: 10,
|
||||||
|
RedirectFlags: RedirectFlags{
|
||||||
|
Clipboard: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
h := NewHandler(s, hc)
|
||||||
|
name := "test_name"
|
||||||
|
|
||||||
|
data := client.tunnelAuthRequest(name)
|
||||||
|
_, _, pkt, err := verifyPacketHeader(data, PKT_TYPE_TUNNEL_AUTH, uint32(TunnelAuthLen + len(name) * 2))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("verifyHeader failed: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
n := h.readTunnelAuthRequest(pkt)
|
||||||
|
if n != name {
|
||||||
|
t.Fatalf("readTunnelAuthRequest failed got name %s, expected %s", n, name)
|
||||||
|
}
|
||||||
|
|
||||||
|
data = h.createTunnelAuthResponse()
|
||||||
|
_, _, pkt, err = verifyPacketHeader(data, PKT_TYPE_TUNNEL_AUTH_RESPONSE, TunnelAuthResponseLen)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("verifyHeader failed: %s", err)
|
||||||
|
}
|
||||||
|
flags, timeout, err := client.tunnelAuthResponse(pkt)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("tunnel auth error %s", err)
|
||||||
|
}
|
||||||
|
if (flags & HTTP_TUNNEL_REDIR_DISABLE_CLIPBOARD) == HTTP_TUNNEL_REDIR_DISABLE_CLIPBOARD {
|
||||||
|
t.Fatalf("tunnelAuthResponse failed got flags %d, expected %d",
|
||||||
|
flags, flags | HTTP_TUNNEL_REDIR_DISABLE_CLIPBOARD)
|
||||||
|
}
|
||||||
|
if int(timeout) != hc.IdleTimeout {
|
||||||
|
t.Fatalf("tunnelAuthResponse failed got timeout %d, expected %d",
|
||||||
|
timeout, hc.IdleTimeout)
|
||||||
|
}
|
||||||
|
}
|
Loading…
Add table
Add a link
Reference in a new issue