| Index: remoting/protocol/me2me_host_authenticator_factory.cc
|
| diff --git a/remoting/protocol/me2me_host_authenticator_factory.cc b/remoting/protocol/me2me_host_authenticator_factory.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..3c7c8d21de7142cd76f12a32ce054099e33211e2
|
| --- /dev/null
|
| +++ b/remoting/protocol/me2me_host_authenticator_factory.cc
|
| @@ -0,0 +1,63 @@
|
| +// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "remoting/protocol/me2me_host_authenticator_factory.h"
|
| +
|
| +#include "base/string_util.h"
|
| +#include "crypto/rsa_private_key.h"
|
| +#include "remoting/protocol/v1_authenticator.h"
|
| +#include "remoting/protocol/v2_authenticator.h"
|
| +
|
| +namespace remoting {
|
| +namespace protocol {
|
| +
|
| +Me2MeHostAuthenticatorFactory::Me2MeHostAuthenticatorFactory(
|
| + const std::string& local_jid,
|
| + const std::string& local_cert,
|
| + const crypto::RSAPrivateKey* local_private_key,
|
| + const std::string& shared_secret)
|
| + : local_cert_(local_cert),
|
| + local_private_key_(local_private_key->Copy()),
|
| + shared_secret_(shared_secret) {
|
| + // Verify that |local_jid| is bare.
|
| + DCHECK_EQ(local_jid.find('/'), std::string::npos);
|
| + local_jid_prefix_ = local_jid + '/';
|
| +}
|
| +
|
| +Me2MeHostAuthenticatorFactory::~Me2MeHostAuthenticatorFactory() {
|
| +}
|
| +
|
| +Authenticator* Me2MeHostAuthenticatorFactory::CreateAuthenticator(
|
| + const std::string& remote_jid,
|
| + const buzz::XmlElement* first_message) {
|
| + // Reject incoming connection if the client's jid is not an ASCII string.
|
| + if (!IsStringASCII(remote_jid)) {
|
| + LOG(ERROR) << "Rejecting incoming connection from " << remote_jid;
|
| + return NULL;
|
| + }
|
| +
|
| + // Check that the client has the same bare jid as the host, i.e.
|
| + // client's full JID starts with host's bare jid. Comparison is case
|
| + // insensitive.
|
| + if (!StartsWithASCII(remote_jid, local_jid_prefix_, false)) {
|
| + LOG(ERROR) << "Rejecting incoming connection from " << remote_jid;
|
| + return NULL;
|
| + }
|
| +
|
| + // TODO(sergeyu): V2 authenticator is not finished it. Enable it
|
| + // here when it is finished. crbug.com/105214
|
| + //
|
| + // if (V2Authenticator::IsEkeMessage(first_message)) {
|
| + // return V2Authenticator::CreateForHost(
|
| + // local_cert_, local_private_key_.get(), shared_secret_);
|
| + // }
|
| +
|
| + // TODO(sergeyu): Old clients still use V1 auth protocol. Remove
|
| + // this once we are done migrating to V2.
|
| + return new V1HostAuthenticator(local_cert_, local_private_key_.get(),
|
| + shared_secret_, remote_jid);
|
| +}
|
| +
|
| +} // namespace protocol
|
| +} // namespace remoting
|
|
|