OLD | NEW |
---|---|
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "remoting/protocol/auth_util.h" | 5 #include "remoting/protocol/auth_util.h" |
6 | 6 |
7 #include "base/base64.h" | 7 #include "base/base64.h" |
8 #include "base/logging.h" | 8 #include "base/logging.h" |
9 #include "base/string_util.h" | 9 #include "base/string_util.h" |
10 #include "crypto/hmac.h" | 10 #include "crypto/hmac.h" |
(...skipping 29 matching lines...) Expand all Loading... | |
40 return expected_token == auth_token; | 40 return expected_token == auth_token; |
41 } | 41 } |
42 | 42 |
43 // static | 43 // static |
44 std::string GetAuthBytes(net::SSLSocket* socket, | 44 std::string GetAuthBytes(net::SSLSocket* socket, |
45 const base::StringPiece& label, | 45 const base::StringPiece& label, |
46 const base::StringPiece& shared_secret) { | 46 const base::StringPiece& shared_secret) { |
47 // Get keying material from SSL. | 47 // Get keying material from SSL. |
48 unsigned char key_material[kAuthDigestLength]; | 48 unsigned char key_material[kAuthDigestLength]; |
49 int export_result = socket->ExportKeyingMaterial( | 49 int export_result = socket->ExportKeyingMaterial( |
50 label, "", key_material, kAuthDigestLength); | 50 label, false, "", key_material, kAuthDigestLength); |
wtc
2012/03/14 03:35:46
Here we're using no context (""), so the new has_c
| |
51 if (export_result != net::OK) { | 51 if (export_result != net::OK) { |
52 LOG(ERROR) << "Error fetching keying material: " << export_result; | 52 LOG(ERROR) << "Error fetching keying material: " << export_result; |
53 return std::string(); | 53 return std::string(); |
54 } | 54 } |
55 | 55 |
56 // Generate auth digest based on the keying material and shared secret. | 56 // Generate auth digest based on the keying material and shared secret. |
57 crypto::HMAC response(crypto::HMAC::SHA256); | 57 crypto::HMAC response(crypto::HMAC::SHA256); |
58 if (!response.Init(key_material, kAuthDigestLength)) { | 58 if (!response.Init(key_material, kAuthDigestLength)) { |
59 NOTREACHED() << "HMAC::Init failed"; | 59 NOTREACHED() << "HMAC::Init failed"; |
60 return std::string(); | 60 return std::string(); |
61 } | 61 } |
62 unsigned char out_bytes[kAuthDigestLength]; | 62 unsigned char out_bytes[kAuthDigestLength]; |
63 if (!response.Sign(shared_secret, out_bytes, kAuthDigestLength)) { | 63 if (!response.Sign(shared_secret, out_bytes, kAuthDigestLength)) { |
64 NOTREACHED() << "HMAC::Sign failed"; | 64 NOTREACHED() << "HMAC::Sign failed"; |
65 return std::string(); | 65 return std::string(); |
66 } | 66 } |
67 | 67 |
68 return std::string(out_bytes, out_bytes + kAuthDigestLength); | 68 return std::string(out_bytes, out_bytes + kAuthDigestLength); |
69 } | 69 } |
70 | 70 |
71 } // namespace protocol | 71 } // namespace protocol |
72 } // namespace remoting | 72 } // namespace remoting |
OLD | NEW |