Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(72)

Side by Side Diff: remoting/host/security_key/security_key_auth_handler.h

Issue 2167473003: Revert of Renaming Gnubby and RemoteSecurityKey files/classes/members (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2016 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #ifndef REMOTING_HOST_SECURITY_KEY_SECURITY_KEY_AUTH_HANDLER_H_
6 #define REMOTING_HOST_SECURITY_KEY_SECURITY_KEY_AUTH_HANDLER_H_
7
8 #include <memory>
9 #include <string>
10
11 #include "base/callback.h"
12 #include "base/time/time.h"
13
14 namespace base {
15 class FilePath;
16 } // namespace base
17
18 namespace remoting {
19
20 class ClientSessionDetails;
21
22 // Class responsible for proxying authentication data between a local gnubbyd
23 // and the client.
24 class SecurityKeyAuthHandler {
25 public:
26 virtual ~SecurityKeyAuthHandler() {}
27
28 // Used to send security key extension messages to the client.
29 typedef base::Callback<void(int connection_id, const std::string& data)>
30 SendMessageCallback;
31
32 // Creates a platform-specific SecurityKeyAuthHandler.
33 // All invocations of |send_message_callback| are guaranteed to occur before
34 // the underlying SecurityKeyAuthHandler object is destroyed. It is not safe
35 // to destroy the SecurityKeyAuthHandler object within the callback.
36 // |client_session_details| will be valid until this instance is destroyed.
37 static std::unique_ptr<SecurityKeyAuthHandler> Create(
38 ClientSessionDetails* client_session_details,
39 const SendMessageCallback& send_message_callback);
40
41 #if defined(OS_LINUX)
42 // Specify the name of the socket to listen to security key requests on.
43 static void SetSecurityKeySocketName(
44 const base::FilePath& security_key_socket_name);
45 #endif // defined(OS_LINUX)
46
47 // Sets the callback used to send messages to the client.
48 virtual void SetSendMessageCallback(const SendMessageCallback& callback) = 0;
49
50 // Creates the platform specific connection to handle security key requests.
51 virtual void CreateSecurityKeyConnection() = 0;
52
53 // Returns true if |security_key_connection_id| represents a valid connection.
54 virtual bool IsValidConnectionId(int security_key_connection_id) const = 0;
55
56 // Sends security key response from client to local security key agent.
57 virtual void SendClientResponse(int security_key_connection_id,
58 const std::string& response) = 0;
59
60 // Closes key connection represented by |security_key_connection_id|.
61 virtual void SendErrorAndCloseConnection(int security_key_connection_id) = 0;
62
63 // Returns the number of active security key connections.
64 virtual size_t GetActiveConnectionCountForTest() const = 0;
65
66 // Sets the timeout used when waiting for a security key response.
67 virtual void SetRequestTimeoutForTest(base::TimeDelta timeout) = 0;
68 };
69
70 } // namespace remoting
71
72 #endif // REMOTING_HOST_SECURITY_KEY_SECURITY_KEY_AUTH_HANDLER_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698