Index: remoting/host/remoting_me2me_host.cc |
diff --git a/remoting/host/remoting_me2me_host.cc b/remoting/host/remoting_me2me_host.cc |
index 322ff25ae2e03e7b8996da021bfc138fa06beb8f..3c1d98630d0be81e278602d82b08d6f92ad848ba 100644 |
--- a/remoting/host/remoting_me2me_host.cc |
+++ b/remoting/host/remoting_me2me_host.cc |
@@ -72,8 +72,8 @@ |
#include "remoting/host/pairing_registry_delegate.h" |
#include "remoting/host/pin_hash.h" |
#include "remoting/host/policy_watcher.h" |
-#include "remoting/host/security_key/security_key_auth_handler.h" |
-#include "remoting/host/security_key/security_key_extension.h" |
+#include "remoting/host/security_key/gnubby_auth_handler.h" |
+#include "remoting/host/security_key/gnubby_extension.h" |
#include "remoting/host/service_urls.h" |
#include "remoting/host/shutdown_watchdog.h" |
#include "remoting/host/signaling_connector.h" |
@@ -151,7 +151,7 @@ |
const char kAudioPipeSwitchName[] = "audio-pipe-name"; |
// The command line switch used to pass name of the unix domain socket used to |
-// listen for security key requests. |
+// listen for gnubby requests. |
const char kAuthSocknameSwitchName[] = "ssh-auth-sockname"; |
#endif // defined(OS_LINUX) |
@@ -374,8 +374,8 @@ |
bool curtain_required_ = false; |
ThirdPartyAuthConfig third_party_auth_config_; |
- bool security_key_auth_policy_enabled_ = false; |
- bool security_key_extension_supported_ = false; |
+ bool gnubby_auth_policy_enabled_ = false; |
+ bool gnubby_extension_supported_ = false; |
// Boolean to change flow, where necessary, if we're |
// capturing a window instead of the entire desktop. |
@@ -816,17 +816,15 @@ |
context_->audio_task_runner(), audio_pipe_name); |
} |
- base::FilePath security_key_socket_name = |
- base::CommandLine::ForCurrentProcess()->GetSwitchValuePath( |
- kAuthSocknameSwitchName); |
- if (!security_key_socket_name.empty()) { |
- remoting::SecurityKeyAuthHandler::SetSecurityKeySocketName( |
- security_key_socket_name); |
- security_key_extension_supported_ = true; |
+ base::FilePath gnubby_socket_name = base::CommandLine::ForCurrentProcess()-> |
+ GetSwitchValuePath(kAuthSocknameSwitchName); |
+ if (!gnubby_socket_name.empty()) { |
+ remoting::GnubbyAuthHandler::SetGnubbySocketName(gnubby_socket_name); |
+ gnubby_extension_supported_ = true; |
} |
#elif defined(OS_WIN) |
// TODO(joedow): Remove the conditional once this is supported on OSX. |
- security_key_extension_supported_ = true; |
+ gnubby_extension_supported_ = true; |
#endif // defined(OS_WIN) |
// Create a desktop environment factory appropriate to the build type & |
@@ -1319,14 +1317,14 @@ |
DCHECK(context_->network_task_runner()->BelongsToCurrentThread()); |
if (!policies->GetBoolean(policy::key::kRemoteAccessHostAllowGnubbyAuth, |
- &security_key_auth_policy_enabled_)) { |
+ &gnubby_auth_policy_enabled_)) { |
return false; |
} |
- if (security_key_auth_policy_enabled_) { |
- HOST_LOG << "Policy enables security key auth."; |
+ if (gnubby_auth_policy_enabled_) { |
+ HOST_LOG << "Policy enables gnubby auth."; |
} else { |
- HOST_LOG << "Policy disables security key auth."; |
+ HOST_LOG << "Policy disables gnubby auth."; |
} |
return true; |
@@ -1460,8 +1458,8 @@ |
context_->audio_task_runner(), |
context_->video_encode_task_runner())); |
- if (security_key_auth_policy_enabled_ && security_key_extension_supported_) { |
- host_->AddExtension(base::WrapUnique(new SecurityKeyExtension())); |
+ if (gnubby_auth_policy_enabled_ && gnubby_extension_supported_) { |
+ host_->AddExtension(base::WrapUnique(new GnubbyExtension())); |
} |
// TODO(simonmorris): Get the maximum session duration from a policy. |