1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "remoting/protocol/negotiating_authenticator_base.h"
#include <algorithm>
#include <sstream>
#include "base/bind.h"
#include "base/callback.h"
#include "base/logging.h"
#include "base/strings/string_split.h"
#include "remoting/base/rsa_key_pair.h"
#include "remoting/protocol/channel_authenticator.h"
#include "remoting/protocol/v2_authenticator.h"
#include "third_party/libjingle/source/talk/xmllite/xmlelement.h"
namespace remoting {
namespace protocol {
const buzz::StaticQName NegotiatingAuthenticatorBase::kMethodAttributeQName =
{ "", "method" };
const buzz::StaticQName
NegotiatingAuthenticatorBase::kSupportedMethodsAttributeQName =
{ "", "supported-methods" };
const char NegotiatingAuthenticatorBase::kSupportedMethodsSeparator = ',';
NegotiatingAuthenticatorBase::NegotiatingAuthenticatorBase(
Authenticator::State initial_state)
: current_method_(AuthenticationMethod::Invalid()),
state_(initial_state),
rejection_reason_(INVALID_CREDENTIALS) {
}
NegotiatingAuthenticatorBase::~NegotiatingAuthenticatorBase() {
}
Authenticator::State NegotiatingAuthenticatorBase::state() const {
return state_;
}
Authenticator::RejectionReason
NegotiatingAuthenticatorBase::rejection_reason() const {
return rejection_reason_;
}
void NegotiatingAuthenticatorBase::ProcessMessageInternal(
const buzz::XmlElement* message,
const base::Closure& resume_callback) {
if (current_authenticator_->state() == WAITING_MESSAGE) {
// If the message was not discarded and the authenticator is waiting for it,
// give it to the underlying authenticator to process.
// |current_authenticator_| is owned, so Unretained() is safe here.
current_authenticator_->ProcessMessage(message, base::Bind(
&NegotiatingAuthenticatorBase::UpdateState,
base::Unretained(this), resume_callback));
} else {
// Otherwise, just discard the message and run the callback.
resume_callback.Run();
}
}
void NegotiatingAuthenticatorBase::UpdateState(
const base::Closure& resume_callback) {
// After the underlying authenticator finishes processing the message, the
// NegotiatingAuthenticatorBase must update its own state before running the
// |resume_callback| to resume the session negotiation.
state_ = current_authenticator_->state();
if (state_ == REJECTED)
rejection_reason_ = current_authenticator_->rejection_reason();
resume_callback.Run();
}
scoped_ptr<buzz::XmlElement>
NegotiatingAuthenticatorBase::GetNextMessageInternal() {
DCHECK_EQ(state(), MESSAGE_READY);
DCHECK(current_method_.is_valid());
scoped_ptr<buzz::XmlElement> result;
if (current_authenticator_->state() == MESSAGE_READY) {
result = current_authenticator_->GetNextMessage();
} else {
result = CreateEmptyAuthenticatorMessage();
}
state_ = current_authenticator_->state();
DCHECK(state_ == ACCEPTED || state_ == WAITING_MESSAGE);
result->AddAttr(kMethodAttributeQName, current_method_.ToString());
return result.Pass();
}
void NegotiatingAuthenticatorBase::AddMethod(
const AuthenticationMethod& method) {
DCHECK(method.is_valid());
methods_.push_back(method);
}
scoped_ptr<ChannelAuthenticator>
NegotiatingAuthenticatorBase::CreateChannelAuthenticator() const {
DCHECK_EQ(state(), ACCEPTED);
return current_authenticator_->CreateChannelAuthenticator();
}
} // namespace protocol
} // namespace remoting
|