1. 28 Apr, 2017 1 commit
  2. 06 Apr, 2016 1 commit
  3. 12 Mar, 2016 1 commit
  4. 09 Mar, 2016 1 commit
    • sergeyu's avatar
      Cleanup AuthenticationMethod usage. · 42cb6f9f
      sergeyu authored
      Previously AuthenticationMethod type was used in many places. Removed
      all dependencies on it except from NegotiatingAuthenticator classes.
      AuthenticationMethod has been moved to
      NegotiatingAuthenticatorBase::Method.
      
      Also includes the following cleanups:
       - removed old authentication functions from auth_util.cc which were
         no longer needed.
       - Remove HashFunction enum as it wasn't useful.
      
      BUG=589698
      
      Review URL: https://codereview.chromium.org/1768383004
      
      Cr-Commit-Position: refs/heads/master@{#380078}
      42cb6f9f
  5. 07 Mar, 2016 1 commit
  6. 04 Mar, 2016 1 commit
    • sergeyu's avatar
      Simplify AuthenticationMethod type and PIN hash handling. · 3c759246
      sergeyu authored
      1 Previously AuthenticationMethod was a class. Replaced
        it with a simple enum.
      2 Removed SharedSecretHash struct and simplified the code
        that passes around PIN hash.
      3 If the host config contains PIN in plain text then now
        the host hashes it instead of using spake2_plain
        authenticator method. This means that spake2_hmac is
        always used for Me2Me even when the PIN is not hashed
        in the config.
      
      This change will make it easier to add new authentication
      methods.
      
      BUG=589698
      
      Review URL: https://codereview.chromium.org/1755273003
      
      Cr-Commit-Position: refs/heads/master@{#379365}
      3c759246
  7. 08 Feb, 2016 1 commit
  8. 22 Dec, 2015 1 commit
  9. 03 Mar, 2015 1 commit
    • lukasza's avatar
      Malformed PortRange or ThirdPartyAuthConfig should trigger OnPolicyError. · 0d40d8ac
      lukasza authored
      Before this change a malformed value of RemoteAccessHostUdpPortRange policy
      (i.e. "123456-blah") was ignored and a default value was used.  Similarily for
      the 3 third-party-auth-config policies (RemoteAccessHostTokenUrl,
      ...TokenValidationUrl and ...TokenValidationCertificateIssuer) we were falling
      back to a secure default, but not reporting a policy error.  After this change
      such malformed values will trigger an OnPolicyError callback.
      
      Notes:
      - Guaranteeing that PolicyWatcher always returns valid policy values, removes
        the need for a "rejecting" Me2MeHostAuthenticatorFactory.
      - Moving PortRange and ThirdPartyAuthConfig to separate compilation units
        helps readability elsewhere + encourages better unit tests coverage.
      - Initially I tried to wrap all policies in a new ChromotingPolicies class,
        but eventually went back to prevalidating and passing base::DictionaryValue.
        - Arguments for using ChromotingPolicies:
          - Helps avoid overtesting in policy_watcher_unittests.cc (i.e. helps focus
            the tests on a single policy value).
        - Arguments for using base::DictionaryValue:
          - Minimizes changes.
          - Keeps things simple (as opposed to having to introduce a custom
            equivalent of optional<T> [nothing similar present in Chromium AFAICT]).
        - Neutral:
          - Strong-typing of ChromotingPolicies didn't help readability as much as I
            expected and hoped for.
      
      BUG=427513
      TEST=remoting_unittests
      
      Review URL: https://codereview.chromium.org/966433002
      
      Cr-Commit-Position: refs/heads/master@{#318910}
      0d40d8ac
  10. 21 Oct, 2014 1 commit
  11. 08 Oct, 2014 1 commit
  12. 26 Feb, 2014 1 commit
  13. 11 Jan, 2014 1 commit
  14. 16 Aug, 2013 1 commit
  15. 22 May, 2013 1 commit
  16. 06 Apr, 2013 1 commit
    • rmsousa@chromium.org's avatar
      Host-side third party token validation · 4386f0a9
      rmsousa@chromium.org authored
      This creates a TokenValidator implementation on the host, that upon receiving a token:
      Signs the token with its private key.
      Uses URLFetcher to request the exchange of the token for a secret from the Token Validation URL.
      On receiving a reply, checks that the scope in the reply matches the one required for this connection.
      Uses the callback to send the shared_token back to the authentication layer.
      
      (The server will authenticate the host by checking that the token signature matches the host public key that the client included in the token request)
      
      BUG=115899
      
      Review URL: https://chromiumcodereview.appspot.com/12313085
      
      git-svn-id: svn://svn.chromium.org/chrome/trunk/src@192701 0039d316-1c4b-4281-b951-d872f2087c98
      4386f0a9
  17. 07 Mar, 2013 1 commit
  18. 22 May, 2012 2 commits
  19. 18 May, 2012 1 commit
  20. 05 May, 2012 1 commit
  21. 24 Jan, 2012 1 commit
  22. 20 Jan, 2012 1 commit
  23. 11 Jan, 2012 1 commit
  24. 10 Jan, 2012 1 commit