Index: remoting/protocol/spake2_authenticator.h |
diff --git a/remoting/protocol/spake2_authenticator.h b/remoting/protocol/spake2_authenticator.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..b187d13980ae1c89f029dceba7ecd47c5134682a |
--- /dev/null |
+++ b/remoting/protocol/spake2_authenticator.h |
@@ -0,0 +1,99 @@ |
+// Copyright 2016 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef REMOTING_PROTOCOL_SPAKE2_AUTHENTICATOR_H_ |
+#define REMOTING_PROTOCOL_SPAKE2_AUTHENTICATOR_H_ |
+ |
+#include <queue> |
+#include <string> |
+ |
+#include "base/compiler_specific.h" |
+#include "base/gtest_prod_util.h" |
+#include "base/macros.h" |
+#include "base/memory/scoped_ptr.h" |
+#include "remoting/protocol/authenticator.h" |
+ |
+typedef struct spake2_ctx_st SPAKE2_CTX; |
+ |
+namespace remoting { |
+ |
+class RsaKeyPair; |
+ |
+namespace protocol { |
+ |
+// Authenticator that uses SPAKE2 implementation from BoringSSL. It |
+// implements SPAKE2 over Curve25519. |
+class Spake2Authenticator : public Authenticator { |
+ public: |
+ static scoped_ptr<Authenticator> CreateForClient( |
+ const std::string& local_id, |
+ const std::string& remote_id, |
+ const std::string& shared_secret, |
+ State initial_state); |
+ |
+ static scoped_ptr<Authenticator> CreateForHost( |
+ const std::string& local_id, |
+ const std::string& remote_id, |
+ const std::string& shared_secret, |
+ const std::string& local_cert, |
+ scoped_refptr<RsaKeyPair> key_pair, |
+ State initial_state); |
+ |
+ ~Spake2Authenticator() override; |
+ |
+ // Authenticator interface. |
+ State state() const override; |
+ bool started() const override; |
+ RejectionReason rejection_reason() const override; |
+ void ProcessMessage(const buzz::XmlElement* message, |
+ const base::Closure& resume_callback) override; |
+ scoped_ptr<buzz::XmlElement> GetNextMessage() override; |
+ const std::string& GetAuthKey() const override; |
+ scoped_ptr<ChannelAuthenticator> CreateChannelAuthenticator() const override; |
+ |
+ private: |
+ FRIEND_TEST_ALL_PREFIXES(Spake2AuthenticatorTest, InvalidSecret); |
+ |
+ Spake2Authenticator(const std::string& local_id, |
+ const std::string& remote_id, |
+ const std::string& shared_secret, |
+ bool is_server, |
kelvinp
2016/03/04 19:30:51
is_server is a bit confusing. s/is_server/is_host
Sergey Ulanov
2016/03/04 23:07:23
Done.
|
+ State initial_state); |
+ |
+ virtual void ProcessMessageInternal(const buzz::XmlElement* message); |
+ |
+ std::string CalculateVerificationHash(bool from_server, |
+ const std::string& local_id, |
+ const std::string& remote_id); |
+ |
+ const std::string local_id_; |
+ const std::string remote_id_; |
+ const std::string shared_secret_; |
+ const bool is_server_; |
+ |
+ // Used only for host authenticators. |
+ std::string local_cert_; |
+ scoped_refptr<RsaKeyPair> local_key_pair_; |
+ |
+ // Used only for client authenticators. |
+ std::string remote_cert_; |
+ |
+ // Used for both host and client authenticators. |
+ SPAKE2_CTX *spake2_context_; |
+ State state_; |
+ bool started_ = false; |
+ RejectionReason rejection_reason_ = INVALID_CREDENTIALS; |
+ std::string local_spake_message_; |
+ bool spake_message_sent_ = false; |
+ std::string outgoing_verification_hash_; |
+ std::string auth_key_; |
+ std::string expected_verification_hash_; |
+ |
+ DISALLOW_COPY_AND_ASSIGN(Spake2Authenticator); |
+}; |
+ |
+} // namespace protocol |
+} // namespace remoting |
+ |
+#endif // REMOTING_PROTOCOL_SPAKE2_AUTHENTICATOR_H_ |