OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #import "remoting/host/me2me_preference_pane.h" | 5 #import "remoting/host/me2me_preference_pane.h" |
6 | 6 |
7 #import <Cocoa/Cocoa.h> | 7 #import <Cocoa/Cocoa.h> |
8 #include <CommonCrypto/CommonHMAC.h> | |
8 #include <launch.h> | 9 #include <launch.h> |
9 #import <PreferencePanes/PreferencePanes.h> | 10 #import <PreferencePanes/PreferencePanes.h> |
10 #import <SecurityInterface/SFAuthorizationView.h> | 11 #import <SecurityInterface/SFAuthorizationView.h> |
11 | 12 |
12 #include "base/eintr_wrapper.h" | 13 #include "base/eintr_wrapper.h" |
13 #include "base/file_path.h" | 14 #include "base/file_path.h" |
14 #include "base/file_util.h" | 15 #include "base/file_util.h" |
15 #include "base/logging.h" | 16 #include "base/logging.h" |
16 #include "base/mac/authorization_util.h" | 17 #include "base/mac/authorization_util.h" |
17 #include "base/mac/foundation_util.h" | 18 #include "base/mac/foundation_util.h" |
18 #include "base/mac/launchd.h" | 19 #include "base/mac/launchd.h" |
19 #include "base/mac/mac_logging.h" | 20 #include "base/mac/mac_logging.h" |
20 #include "base/mac/scoped_launch_data.h" | 21 #include "base/mac/scoped_launch_data.h" |
21 #include "base/memory/scoped_ptr.h" | 22 #include "base/memory/scoped_ptr.h" |
22 #include "base/stringprintf.h" | 23 #include "base/stringprintf.h" |
23 #include "base/sys_string_conversions.h" | 24 #include "base/sys_string_conversions.h" |
24 #include "remoting/host/host_config.h" | 25 #include "remoting/host/host_config.h" |
25 #include "remoting/host/json_host_config.h" | 26 #include "remoting/host/json_host_config.h" |
26 #include "remoting/protocol/me2me_host_authenticator_factory.h" | 27 #include "third_party/modp_b64/modp_b64.h" |
27 | 28 |
28 namespace { | 29 namespace { |
29 // The name of the Remoting Host service that is registered with launchd. | 30 // The name of the Remoting Host service that is registered with launchd. |
30 #define kServiceName "org.chromium.chromoting" | 31 #define kServiceName "org.chromium.chromoting" |
31 #define kConfigDir "/Library/PrivilegedHelperTools/" | 32 #define kConfigDir "/Library/PrivilegedHelperTools/" |
32 | 33 |
33 // This helper script is executed as root. It is passed a command-line option | 34 // This helper script is executed as root. It is passed a command-line option |
34 // (--enable or --disable), which causes it to create or remove a file that | 35 // (--enable or --disable), which causes it to create or remove a file that |
35 // informs the host's launch script of whether the host is enabled or disabled. | 36 // informs the host's launch script of whether the host is enabled or disabled. |
36 const char kHelperTool[] = kConfigDir kServiceName ".me2me.sh"; | 37 const char kHelperTool[] = kConfigDir kServiceName ".me2me.sh"; |
37 | 38 |
38 bool GetTemporaryConfigFilePath(FilePath* path) { | 39 bool GetTemporaryConfigFilePath(FilePath* path) { |
39 if (!file_util::GetTempDir(path)) | 40 if (!file_util::GetTempDir(path)) |
40 return false; | 41 return false; |
41 *path = path->Append(kServiceName ".json"); | 42 *path = path->Append(kServiceName ".json"); |
42 return true; | 43 return true; |
43 } | 44 } |
44 | 45 |
45 bool IsConfigValid(const remoting::JsonHostConfig* config) { | 46 bool IsConfigValid(const remoting::JsonHostConfig* config) { |
46 std::string value; | 47 std::string value; |
47 return (config->GetString(remoting::kHostIdConfigPath, &value) && | 48 return (config->GetString(remoting::kHostIdConfigPath, &value) && |
48 config->GetString(remoting::kHostSecretHashConfigPath, &value) && | 49 config->GetString(remoting::kHostSecretHashConfigPath, &value) && |
49 config->GetString(remoting::kXmppLoginConfigPath, &value)); | 50 config->GetString(remoting::kXmppLoginConfigPath, &value)); |
50 } | 51 } |
51 | 52 |
52 bool IsPinValid(const std::string& pin, const std::string& host_id, | 53 bool IsPinValid(const std::string& pin, const std::string& host_id, |
53 const std::string& host_secret_hash) { | 54 const std::string& host_secret_hash) { |
54 remoting::protocol::SharedSecretHash hash; | 55 size_t separator = host_secret_hash.find(':'); |
Jamie
2012/05/14 17:37:49
Would it be possible to define a local class with
Lambros
2012/05/14 19:58:34
The SharedSecretHash/AuthenticationMethod interfac
| |
55 if (!hash.Parse(host_secret_hash)) { | 56 if (separator == std::string::npos) |
56 LOG(ERROR) << "Invalid host_secret_hash."; | 57 return false; |
58 | |
59 std::string method = host_secret_hash.substr(0, separator); | |
60 if (method != "hmac") { | |
61 LOG(ERROR) << "Authentication method '" << method << "' not supported"; | |
57 return false; | 62 return false; |
58 } | 63 } |
59 std::string result = | 64 |
60 remoting::protocol::AuthenticationMethod::ApplyHashFunction( | 65 std::string hash_base64 = host_secret_hash.substr(separator + 1); |
61 hash.hash_function, host_id, pin); | 66 |
62 return result == hash.value; | 67 // Convert |hash_base64| to |hash|, based on code from base/base64.cc. |
68 int hash_base64_size = static_cast<int>(hash_base64.size()); | |
69 std::string hash; | |
70 hash.resize(modp_b64_decode_len(hash_base64_size)); | |
71 int hash_size = modp_b64_decode(&(hash[0]), hash_base64.data(), | |
72 hash_base64_size); | |
73 if (hash_size < 0) { | |
74 LOG(ERROR) << "Failed to parse host_secret_hash"; | |
75 return false; | |
76 } | |
77 hash.resize(hash_size); | |
78 | |
79 std::string computed_hash; | |
80 computed_hash.resize(32); | |
dcaiafa
2012/05/14 15:04:43
s/32/CC_SHA256_DIGEST_LENGTH/
Lambros
2012/05/14 19:58:34
Thanks for that! Done.
| |
81 | |
82 CCHmac(kCCHmacAlgSHA256, | |
83 host_id.data(), host_id.size(), | |
84 pin.data(), pin.size(), | |
85 &(computed_hash[0])); | |
86 | |
87 return computed_hash == hash; | |
63 } | 88 } |
64 | 89 |
65 } // namespace | 90 } // namespace |
66 | 91 |
67 | 92 |
68 @implementation Me2MePreferencePane | 93 @implementation Me2MePreferencePane |
69 | 94 |
70 - (void)mainViewDidLoad { | 95 - (void)mainViewDidLoad { |
71 [authorization_view_ setDelegate:self]; | 96 [authorization_view_ setDelegate:self]; |
72 [authorization_view_ setString:kAuthorizationRightExecute]; | 97 [authorization_view_ setString:kAuthorizationRightExecute]; |
(...skipping 321 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
394 int error = launch_data_get_errno(response.get()); | 419 int error = launch_data_get_errno(response.get()); |
395 if (error) { | 420 if (error) { |
396 LOG(ERROR) << "launchd returned error: " << error; | 421 LOG(ERROR) << "launchd returned error: " << error; |
397 [self showError]; | 422 [self showError]; |
398 return NO; | 423 return NO; |
399 } | 424 } |
400 return YES; | 425 return YES; |
401 } | 426 } |
402 | 427 |
403 @end | 428 @end |
OLD | NEW |