OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "remoting/protocol/it2me_host_authenticator_factory.h" | 5 #include "remoting/protocol/it2me_host_authenticator_factory.h" |
6 | 6 |
7 #include "base/logging.h" | 7 #include "base/logging.h" |
| 8 #include "base/memory/ptr_util.h" |
8 #include "base/strings/string_util.h" | 9 #include "base/strings/string_util.h" |
9 #include "remoting/base/rsa_key_pair.h" | 10 #include "remoting/base/rsa_key_pair.h" |
10 #include "remoting/protocol/negotiating_host_authenticator.h" | 11 #include "remoting/protocol/negotiating_host_authenticator.h" |
11 #include "remoting/protocol/rejecting_authenticator.h" | 12 #include "remoting/protocol/rejecting_authenticator.h" |
12 | 13 |
13 namespace remoting { | 14 namespace remoting { |
14 namespace protocol { | 15 namespace protocol { |
15 | 16 |
16 It2MeHostAuthenticatorFactory::It2MeHostAuthenticatorFactory( | 17 It2MeHostAuthenticatorFactory::It2MeHostAuthenticatorFactory( |
17 const std::string& local_cert, | 18 const std::string& local_cert, |
18 scoped_refptr<RsaKeyPair> key_pair, | 19 scoped_refptr<RsaKeyPair> key_pair, |
19 const std::string& access_code_hash, | 20 const std::string& access_code_hash, |
20 const std::string& required_client_domain) | 21 const std::string& required_client_domain) |
21 : local_cert_(local_cert), | 22 : local_cert_(local_cert), |
22 key_pair_(key_pair), | 23 key_pair_(key_pair), |
23 access_code_hash_(access_code_hash), | 24 access_code_hash_(access_code_hash), |
24 required_client_domain_(required_client_domain) {} | 25 required_client_domain_(required_client_domain) {} |
25 | 26 |
26 It2MeHostAuthenticatorFactory::~It2MeHostAuthenticatorFactory() {} | 27 It2MeHostAuthenticatorFactory::~It2MeHostAuthenticatorFactory() {} |
27 | 28 |
28 scoped_ptr<Authenticator> It2MeHostAuthenticatorFactory::CreateAuthenticator( | 29 std::unique_ptr<Authenticator> |
| 30 It2MeHostAuthenticatorFactory::CreateAuthenticator( |
29 const std::string& local_jid, | 31 const std::string& local_jid, |
30 const std::string& remote_jid) { | 32 const std::string& remote_jid) { |
31 // Check the client domain policy. | 33 // Check the client domain policy. |
32 if (!required_client_domain_.empty()) { | 34 if (!required_client_domain_.empty()) { |
33 std::string client_username = remote_jid; | 35 std::string client_username = remote_jid; |
34 size_t pos = client_username.find('/'); | 36 size_t pos = client_username.find('/'); |
35 if (pos != std::string::npos) { | 37 if (pos != std::string::npos) { |
36 client_username.replace(pos, std::string::npos, ""); | 38 client_username.replace(pos, std::string::npos, ""); |
37 } | 39 } |
38 if (!base::EndsWith(client_username, | 40 if (!base::EndsWith(client_username, |
39 std::string("@") + required_client_domain_, | 41 std::string("@") + required_client_domain_, |
40 base::CompareCase::INSENSITIVE_ASCII)) { | 42 base::CompareCase::INSENSITIVE_ASCII)) { |
41 LOG(ERROR) << "Rejecting incoming connection from " << remote_jid | 43 LOG(ERROR) << "Rejecting incoming connection from " << remote_jid |
42 << ": Domain mismatch."; | 44 << ": Domain mismatch."; |
43 return make_scoped_ptr( | 45 return base::WrapUnique( |
44 new RejectingAuthenticator(Authenticator::INVALID_CREDENTIALS)); | 46 new RejectingAuthenticator(Authenticator::INVALID_CREDENTIALS)); |
45 } | 47 } |
46 } | 48 } |
47 | 49 |
48 return NegotiatingHostAuthenticator::CreateWithSharedSecret( | 50 return NegotiatingHostAuthenticator::CreateWithSharedSecret( |
49 local_jid, remote_jid, local_cert_, key_pair_, access_code_hash_, | 51 local_jid, remote_jid, local_cert_, key_pair_, access_code_hash_, |
50 nullptr); | 52 nullptr); |
51 } | 53 } |
52 | 54 |
53 } // namespace protocol | 55 } // namespace protocol |
54 } // namespace remoting | 56 } // namespace remoting |
OLD | NEW |