Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(306)

Unified Diff: remoting/protocol/pairing_authenticator_base.h

Issue 14793021: PairingAuthenticator implementation and plumbing. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Refactored common host- and client-side code into common base. Created 7 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: remoting/protocol/pairing_authenticator_base.h
diff --git a/remoting/protocol/pairing_authenticator_base.h b/remoting/protocol/pairing_authenticator_base.h
new file mode 100644
index 0000000000000000000000000000000000000000..100cde1655b46a89ff584a08ec863383130de359
--- /dev/null
+++ b/remoting/protocol/pairing_authenticator_base.h
@@ -0,0 +1,108 @@
+// Copyright 2013 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef REMOTING_PROTOCOL_PAIRING_AUTHENTICATOR_BASE_H_
+#define REMOTING_PROTOCOL_PAIRING_AUTHENTICATOR_BASE_H_
+
+#include "base/memory/weak_ptr.h"
+#include "remoting/protocol/authenticator.h"
+#include "third_party/libjingle/source/talk/xmllite/xmlelement.h"
+
+namespace remoting {
+namespace protocol {
+
+// The pairing authenticator builds on top of V2Authenticator to add
+// support for PIN-less authentication via device pairing:
+//
+// * If a client device is already paired, it includes a Client Id in
+// the initial authentication message.
rmsousa 2013/05/21 23:17:07 it includes a client id and the first SPAKE messag
Jamie 2013/05/22 00:19:14 Done.
+// * If the host recognizes the Client Id, it looks up the corresponding
+// Paired Secret and initiates a SPAKE with HMAC_SHA256.
rmsousa 2013/05/21 23:17:07 processes the incoming spake message.
Jamie 2013/05/22 00:19:14 Done. I've also added a comment to describe the fa
+// * If it does not recognize the Client Id, it initiates a SPAKE exchange
+// with HMAC_SHA256 using the PIN as the shared secret. The initial
+// message of this exchange includes an an error message, which
+// informs the client that the PIN-less connection failed and causes
+// it to prompt the user for a PIN to use for authentication
+// instead.
+//
+// If a client device is not already paired, but supports pairing, then
+// the V2Authenticator is used instead of this class. Only the method name
+// differs, which the client uses to determine that pairing should be offered
+// to the user.
rmsousa 2013/05/21 23:17:07 Nit: (see Negotiating{Client,Host}Authenticator::C
Jamie 2013/05/22 00:19:14 Done.
+class PairingAuthenticatorBase : public Authenticator {
+ public:
+ PairingAuthenticatorBase();
+ virtual ~PairingAuthenticatorBase() {}
+
+ // Authenticator interface.
+ virtual State state() const OVERRIDE;
+ virtual RejectionReason rejection_reason() const OVERRIDE;
+ virtual void ProcessMessage(const buzz::XmlElement* message,
+ const base::Closure& resume_callback) OVERRIDE;
+ virtual scoped_ptr<buzz::XmlElement> GetNextMessage() OVERRIDE;
+ virtual scoped_ptr<ChannelAuthenticator>
+ CreateChannelAuthenticator() const OVERRIDE;
+
+ typedef base::Callback<void(scoped_ptr<Authenticator> authenticator)>
+ SetAuthenticatorCallback;
+
+ protected:
+ // Create a V2 authenticator in the specified state, prompting the user for
+ // the PIN first if necessary.
+ virtual void CreateV2AuthenticatorWithPIN(
+ State initial_state,
+ const SetAuthenticatorCallback& callback) = 0;
+
+ // Create a V2 authenticator using either the paired secret or the PIN,
+ // depending on the contents of the initial message, |message|. Note that,
+ // since the client always initiates the pairing exchange, this method is
+ // only called on the host side. In particular, that means that it can be
rmsousa 2013/05/21 23:17:07 So, should this be in PairingHostAuthentciator?
Jamie 2013/05/22 00:19:14 Done.
+ // synchronous, since there is never a need to prompt the user for the PIN.
+ virtual scoped_ptr<Authenticator> CreateV2AuthenticatorFromInitialMessage(
+ const buzz::XmlElement* message) = 0;
+
+ // Amend a protocol message, for example to add client- or host-specific
rmsousa 2013/05/21 23:17:07 Nit: Not sure I'd call it a "protocol message". Au
Jamie 2013/05/22 00:19:14 Done.
+ // elements to it.
+ virtual void AmendProtocolMessage(buzz::XmlElement* message) = 0;
rmsousa 2013/05/21 23:17:07 Nit: I'd go with AddPairingElements, for consisten
Jamie 2013/05/22 00:19:14 Done.
+
+ // A non-fatal error message that derived classes should set in order to
+ // cause the peer to be notified that pairing has failed and that it should
+ // fall back on PIN authentication. This string need not be human-readable.
+ std::string error_message_;
rmsousa 2013/05/21 23:17:07 Nit: define a few enum-like string constants for t
Jamie 2013/05/22 00:19:14 I'm not sure there's any value in that, and I don'
+
+ // The underlying V2 authenticator, created with either the PIN or the
+ // Paired Secret by the derived class.
+ scoped_ptr<Authenticator> v2_authenticator_;
+
+ // Derived classes must set this to True if the underlying authenticator is
+ // using the Paired Secret.
+ bool using_paired_secret_;
+
+ static const buzz::StaticQName kPairingInfoTag;
+ static const buzz::StaticQName kClientIdAttribute;
+
+ private:
+ void MaybeAddErrorMessage(buzz::XmlElement* message);
+ bool HasErrorMessage(const buzz::XmlElement* message) const;
+ void CheckForFailedSpakeExchange(const base::Closure& resume_callback);
+ void SetAuthenticator(const base::Closure& resume_callback,
+ scoped_ptr<Authenticator> authenticator);
+ void SetAuthenticatorAndProcessMessage(
+ const buzz::XmlElement* message,
+ const base::Closure& resume_callback,
+ scoped_ptr<Authenticator> authenticator);
+
+ // Set to true if a PIN-based authenticator has been requested but has not
+ // yet been set.
+ bool waiting_for_authenticator_;
+
+ base::WeakPtrFactory<PairingAuthenticatorBase> weak_factory_;
+
+ DISALLOW_COPY_AND_ASSIGN(PairingAuthenticatorBase);
+};
+
+} // namespace protocol
+} // namespace remoting
+
+#endif // REMOTING_PROTOCOL_PAIRING_AUTHENTICATOR_H_

Powered by Google App Engine
This is Rietveld 408576698