OLD | NEW |
| (Empty) |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #ifndef REMOTING_HOST_SECURITY_KEY_SECURITY_KEY_AUTH_HANDLER_H_ | |
6 #define REMOTING_HOST_SECURITY_KEY_SECURITY_KEY_AUTH_HANDLER_H_ | |
7 | |
8 #include <memory> | |
9 #include <string> | |
10 | |
11 #include "base/callback.h" | |
12 #include "base/time/time.h" | |
13 | |
14 namespace base { | |
15 class FilePath; | |
16 } // namespace base | |
17 | |
18 namespace remoting { | |
19 | |
20 class ClientSessionDetails; | |
21 | |
22 // Class responsible for proxying authentication data between a local gnubbyd | |
23 // and the client. | |
24 class SecurityKeyAuthHandler { | |
25 public: | |
26 virtual ~SecurityKeyAuthHandler() {} | |
27 | |
28 // Used to send security key extension messages to the client. | |
29 typedef base::Callback<void(int connection_id, const std::string& data)> | |
30 SendMessageCallback; | |
31 | |
32 // Creates a platform-specific SecurityKeyAuthHandler. | |
33 // All invocations of |send_message_callback| are guaranteed to occur before | |
34 // the underlying SecurityKeyAuthHandler object is destroyed. It is not safe | |
35 // to destroy the SecurityKeyAuthHandler object within the callback. | |
36 // |client_session_details| will be valid until this instance is destroyed. | |
37 static std::unique_ptr<SecurityKeyAuthHandler> Create( | |
38 ClientSessionDetails* client_session_details, | |
39 const SendMessageCallback& send_message_callback); | |
40 | |
41 #if defined(OS_LINUX) | |
42 // Specify the name of the socket to listen to security key requests on. | |
43 static void SetSecurityKeySocketName( | |
44 const base::FilePath& security_key_socket_name); | |
45 #endif // defined(OS_LINUX) | |
46 | |
47 // Sets the callback used to send messages to the client. | |
48 virtual void SetSendMessageCallback(const SendMessageCallback& callback) = 0; | |
49 | |
50 // Creates the platform specific connection to handle security key requests. | |
51 virtual void CreateSecurityKeyConnection() = 0; | |
52 | |
53 // Returns true if |security_key_connection_id| represents a valid connection. | |
54 virtual bool IsValidConnectionId(int security_key_connection_id) const = 0; | |
55 | |
56 // Sends security key response from client to local security key agent. | |
57 virtual void SendClientResponse(int security_key_connection_id, | |
58 const std::string& response) = 0; | |
59 | |
60 // Closes key connection represented by |security_key_connection_id|. | |
61 virtual void SendErrorAndCloseConnection(int security_key_connection_id) = 0; | |
62 | |
63 // Returns the number of active security key connections. | |
64 virtual size_t GetActiveConnectionCountForTest() const = 0; | |
65 | |
66 // Sets the timeout used when waiting for a security key response. | |
67 virtual void SetRequestTimeoutForTest(base::TimeDelta timeout) = 0; | |
68 }; | |
69 | |
70 } // namespace remoting | |
71 | |
72 #endif // REMOTING_HOST_SECURITY_KEY_SECURITY_KEY_AUTH_HANDLER_H_ | |
OLD | NEW |