OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 // This is an application of a minimal host process in a Chromoting | 5 // This is an application of a minimal host process in a Chromoting |
6 // system. It serves the purpose of gluing different pieces together | 6 // system. It serves the purpose of gluing different pieces together |
7 // to make a functional host process for testing. | 7 // to make a functional host process for testing. |
8 // | 8 // |
9 // It peforms the following functionality: | 9 // It peforms the following functionality: |
10 // 1. Connect to the GTalk network and register the machine as a host. | 10 // 1. Connect to the GTalk network and register the machine as a host. |
(...skipping 250 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
261 | 261 |
262 if (is_it2me_) { | 262 if (is_it2me_) { |
263 register_request_.reset(new RegisterSupportHostRequest( | 263 register_request_.reset(new RegisterSupportHostRequest( |
264 signal_strategy_.get(), &key_pair_, | 264 signal_strategy_.get(), &key_pair_, |
265 base::Bind(&SimpleHost::SetIT2MeAccessCode, host_, &key_pair_))); | 265 base::Bind(&SimpleHost::SetIT2MeAccessCode, host_, &key_pair_))); |
266 } else { | 266 } else { |
267 heartbeat_sender_.reset(new HeartbeatSender( | 267 heartbeat_sender_.reset(new HeartbeatSender( |
268 this, host_id_, signal_strategy_.get(), &key_pair_)); | 268 this, host_id_, signal_strategy_.get(), &key_pair_)); |
269 } | 269 } |
270 | 270 |
271 host_->Start(); | 271 host_->Start(xmpp_login_); |
272 | 272 |
273 // Create a Me2Me authenticator factory. | 273 // Create a Me2Me authenticator factory. |
274 if (!is_it2me_) { | 274 if (!is_it2me_) { |
275 scoped_ptr<protocol::AuthenticatorFactory> factory( | 275 scoped_ptr<protocol::AuthenticatorFactory> factory( |
276 new protocol::Me2MeHostAuthenticatorFactory( | 276 new protocol::Me2MeHostAuthenticatorFactory( |
277 key_pair_.GenerateCertificate(), *key_pair_.private_key(), | 277 key_pair_.GenerateCertificate(), *key_pair_.private_key(), |
278 host_secret_hash_)); | 278 host_secret_hash_)); |
279 host_->SetAuthenticatorFactory(factory.Pass()); | 279 host_->SetAuthenticatorFactory(factory.Pass()); |
280 } | 280 } |
281 } | 281 } |
(...skipping 150 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
432 max_port < 0 || max_port > 65535) { | 432 max_port < 0 || max_port > 65535) { |
433 LOG(ERROR) << "Invalid max-port value: " << max_port | 433 LOG(ERROR) << "Invalid max-port value: " << max_port |
434 << ". Expected integer in range [0, 65535]."; | 434 << ". Expected integer in range [0, 65535]."; |
435 return 1; | 435 return 1; |
436 } | 436 } |
437 simple_host.network_settings()->max_port = max_port; | 437 simple_host.network_settings()->max_port = max_port; |
438 } | 438 } |
439 | 439 |
440 return simple_host.Run(); | 440 return simple_host.Run(); |
441 } | 441 } |
OLD | NEW |