1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84
|
// Copyright 2016 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef REMOTING_HOST_SECURITY_KEY_SECURITY_KEY_AUTH_HANDLER_H_
#define REMOTING_HOST_SECURITY_KEY_SECURITY_KEY_AUTH_HANDLER_H_
#include <memory>
#include <string>
#include "base/functional/callback.h"
#include "base/memory/scoped_refptr.h"
#include "base/time/time.h"
#include "build/build_config.h"
#include "mojo/public/cpp/bindings/pending_receiver.h"
#include "remoting/host/mojom/remote_security_key.mojom.h"
namespace base {
class FilePath;
class SingleThreadTaskRunner;
} // namespace base
namespace remoting {
class ClientSessionDetails;
// Class responsible for proxying authentication data between a local gnubbyd
// and the client.
class SecurityKeyAuthHandler {
public:
virtual ~SecurityKeyAuthHandler() = default;
// Used to send security key extension messages to the client.
using SendMessageCallback =
base::RepeatingCallback<void(int connection_id, const std::string& data)>;
// Creates a platform-specific SecurityKeyAuthHandler.
// All invocations of |send_message_callback| are guaranteed to occur before
// the underlying SecurityKeyAuthHandler object is destroyed. It is not safe
// to destroy the SecurityKeyAuthHandler object within the callback.
// |client_session_details| will be valid until this instance is destroyed.
static std::unique_ptr<SecurityKeyAuthHandler> Create(
ClientSessionDetails* client_session_details,
const SendMessageCallback& send_message_callback,
scoped_refptr<base::SingleThreadTaskRunner> file_task_runner);
#if BUILDFLAG(IS_POSIX)
// Specify the name of the socket to listen to security key requests on.
static void SetSecurityKeySocketName(
const base::FilePath& security_key_socket_name);
#endif // BUILDFLAG(IS_POSIX)
#if BUILDFLAG(IS_WIN)
// Binds a SecurityKeyForwarder receiver for receiving SK forwarding requests.
virtual void BindSecurityKeyForwarder(
mojo::PendingReceiver<mojom::SecurityKeyForwarder> receiver) = 0;
#endif // BUILDFLAG(IS_WIN)
// Sets the callback used to send messages to the client.
virtual void SetSendMessageCallback(const SendMessageCallback& callback) = 0;
// Creates the platform specific connection to handle security key requests.
virtual void CreateSecurityKeyConnection() = 0;
// Returns true if |security_key_connection_id| represents a valid connection.
virtual bool IsValidConnectionId(int security_key_connection_id) const = 0;
// Sends security key response from client to local security key agent.
virtual void SendClientResponse(int security_key_connection_id,
const std::string& response) = 0;
// Closes key connection represented by |security_key_connection_id|.
virtual void SendErrorAndCloseConnection(int security_key_connection_id) = 0;
// Returns the number of active security key connections.
virtual size_t GetActiveConnectionCountForTest() const = 0;
// Sets the timeout used when waiting for a security key response.
virtual void SetRequestTimeoutForTest(base::TimeDelta timeout) = 0;
};
} // namespace remoting
#endif // REMOTING_HOST_SECURITY_KEY_SECURITY_KEY_AUTH_HANDLER_H_
|