OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "remoting/protocol/me2me_host_authenticator_factory.h" | 5 #include "remoting/protocol/me2me_host_authenticator_factory.h" |
6 | 6 |
7 #include "base/base64.h" | 7 #include "base/base64.h" |
8 #include "base/string_util.h" | 8 #include "base/string_util.h" |
9 #include "crypto/rsa_private_key.h" | 9 #include "crypto/rsa_private_key.h" |
10 #include "remoting/protocol/channel_authenticator.h" | 10 #include "remoting/protocol/channel_authenticator.h" |
11 #include "remoting/protocol/negotiating_authenticator.h" | 11 #include "remoting/protocol/negotiating_authenticator.h" |
| 12 #include "remoting/protocol/v1_authenticator.h" |
12 #include "third_party/libjingle/source/talk/xmllite/xmlelement.h" | 13 #include "third_party/libjingle/source/talk/xmllite/xmlelement.h" |
13 | 14 |
14 namespace remoting { | 15 namespace remoting { |
15 namespace protocol { | 16 namespace protocol { |
16 | 17 |
17 namespace { | 18 namespace { |
18 | 19 |
19 // Authenticator that accepts one message and rejects connection after that. | 20 // Authenticator that accepts one message and rejects connection after that. |
20 class RejectingAuthenticator : public Authenticator { | 21 class RejectingAuthenticator : public Authenticator { |
21 public: | 22 public: |
(...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
82 // Verify that the client's jid is an ASCII string, and then check | 83 // Verify that the client's jid is an ASCII string, and then check |
83 // that the client has the same bare jid as the host, i.e. client's | 84 // that the client has the same bare jid as the host, i.e. client's |
84 // full JID starts with host's bare jid. Comparison is case | 85 // full JID starts with host's bare jid. Comparison is case |
85 // insensitive. | 86 // insensitive. |
86 if (!IsStringASCII(remote_jid) || | 87 if (!IsStringASCII(remote_jid) || |
87 !StartsWithASCII(remote_jid, local_jid.substr(0, slash_pos + 1), false)) { | 88 !StartsWithASCII(remote_jid, local_jid.substr(0, slash_pos + 1), false)) { |
88 LOG(ERROR) << "Rejecting incoming connection from " << remote_jid; | 89 LOG(ERROR) << "Rejecting incoming connection from " << remote_jid; |
89 return scoped_ptr<Authenticator>(new RejectingAuthenticator()); | 90 return scoped_ptr<Authenticator>(new RejectingAuthenticator()); |
90 } | 91 } |
91 | 92 |
| 93 if (shared_secret_hash_.hash_function == AuthenticationMethod::NONE && |
| 94 shared_secret_hash_.value.empty()) { |
| 95 // PIN isn't set. Enable V1 authentication. |
| 96 if (!NegotiatingAuthenticator::IsNegotiableMessage(first_message)) { |
| 97 return scoped_ptr<Authenticator>( |
| 98 new V1HostAuthenticator(local_cert_, *local_private_key_, |
| 99 "", remote_jid)); |
| 100 } |
| 101 } |
| 102 |
92 return NegotiatingAuthenticator::CreateForHost( | 103 return NegotiatingAuthenticator::CreateForHost( |
93 local_cert_, *local_private_key_, shared_secret_hash_.value, | 104 local_cert_, *local_private_key_, shared_secret_hash_.value, |
94 shared_secret_hash_.hash_function); | 105 shared_secret_hash_.hash_function); |
95 } | 106 } |
96 | 107 |
97 } // namespace protocol | 108 } // namespace protocol |
98 } // namespace remoting | 109 } // namespace remoting |
OLD | NEW |