OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/http/http_auth_handler_ntlm.h" | 5 #include "net/http/http_auth_handler_ntlm.h" |
6 | 6 |
7 #if !defined(NTLM_SSPI) | 7 #if !defined(NTLM_SSPI) |
8 #include "base/base64.h" | 8 #include "base/base64.h" |
9 #endif | 9 #endif |
10 #include "base/logging.h" | 10 #include "base/logging.h" |
(...skipping 11 matching lines...) Expand all Loading... |
22 | 22 |
23 bool HttpAuthHandlerNTLM::Init(HttpAuth::ChallengeTokenizer* tok) { | 23 bool HttpAuthHandlerNTLM::Init(HttpAuth::ChallengeTokenizer* tok) { |
24 auth_scheme_ = HttpAuth::AUTH_SCHEME_NTLM; | 24 auth_scheme_ = HttpAuth::AUTH_SCHEME_NTLM; |
25 score_ = 3; | 25 score_ = 3; |
26 properties_ = ENCRYPTS_IDENTITY | IS_CONNECTION_BASED; | 26 properties_ = ENCRYPTS_IDENTITY | IS_CONNECTION_BASED; |
27 | 27 |
28 return ParseChallenge(tok, true) == HttpAuth::AUTHORIZATION_RESULT_ACCEPT; | 28 return ParseChallenge(tok, true) == HttpAuth::AUTHORIZATION_RESULT_ACCEPT; |
29 } | 29 } |
30 | 30 |
31 int HttpAuthHandlerNTLM::GenerateAuthTokenImpl( | 31 int HttpAuthHandlerNTLM::GenerateAuthTokenImpl( |
32 const string16* username, | 32 const AuthCredentials* credentials, |
33 const string16* password, | |
34 const HttpRequestInfo* request, | 33 const HttpRequestInfo* request, |
35 OldCompletionCallback* callback, | 34 OldCompletionCallback* callback, |
36 std::string* auth_token) { | 35 std::string* auth_token) { |
37 #if defined(NTLM_SSPI) | 36 #if defined(NTLM_SSPI) |
38 return auth_sspi_.GenerateAuthToken( | 37 return auth_sspi_.GenerateAuthToken( |
39 username, | 38 credentials, |
40 password, | |
41 CreateSPN(origin_), | 39 CreateSPN(origin_), |
42 auth_token); | 40 auth_token); |
43 #else // !defined(NTLM_SSPI) | 41 #else // !defined(NTLM_SSPI) |
44 // TODO(cbentzel): Shouldn't be hitting this case. | 42 // TODO(cbentzel): Shouldn't be hitting this case. |
45 if (!username || !password) { | 43 if (!credentials) { |
46 LOG(ERROR) << "Username and password are expected to be non-NULL."; | 44 LOG(ERROR) << "Username and password are expected to be non-NULL."; |
47 return ERR_MISSING_AUTH_CREDENTIALS; | 45 return ERR_MISSING_AUTH_CREDENTIALS; |
48 } | 46 } |
49 // TODO(wtc): See if we can use char* instead of void* for in_buf and | 47 // TODO(wtc): See if we can use char* instead of void* for in_buf and |
50 // out_buf. This change will need to propagate to GetNextToken, | 48 // out_buf. This change will need to propagate to GetNextToken, |
51 // GenerateType1Msg, and GenerateType3Msg, and perhaps further. | 49 // GenerateType1Msg, and GenerateType3Msg, and perhaps further. |
52 const void* in_buf; | 50 const void* in_buf; |
53 void* out_buf; | 51 void* out_buf; |
54 uint32 in_buf_len, out_buf_len; | 52 uint32 in_buf_len, out_buf_len; |
55 std::string decoded_auth_data; | 53 std::string decoded_auth_data; |
56 | 54 |
57 // |username| may be in the form "DOMAIN\user". Parse it into the two | 55 // The username may be in the form "DOMAIN\user". Parse it into the two |
58 // components. | 56 // components. |
59 string16 domain; | 57 string16 domain; |
60 string16 user; | 58 string16 user; |
| 59 const string16& username = credentials->username(); |
61 const char16 backslash_character = '\\'; | 60 const char16 backslash_character = '\\'; |
62 size_t backslash_idx = username->find(backslash_character); | 61 size_t backslash_idx = username.find(backslash_character); |
63 if (backslash_idx == string16::npos) { | 62 if (backslash_idx == string16::npos) { |
64 user = *username; | 63 user = username; |
65 } else { | 64 } else { |
66 domain = username->substr(0, backslash_idx); | 65 domain = username.substr(0, backslash_idx); |
67 user = username->substr(backslash_idx + 1); | 66 user = username.substr(backslash_idx + 1); |
68 } | 67 } |
69 domain_ = domain; | 68 domain_ = domain; |
70 username_ = user; | 69 credentials_.Set(user, credentials->password()); |
71 password_ = *password; | |
72 | 70 |
73 // Initial challenge. | 71 // Initial challenge. |
74 if (auth_data_.empty()) { | 72 if (auth_data_.empty()) { |
75 in_buf_len = 0; | 73 in_buf_len = 0; |
76 in_buf = NULL; | 74 in_buf = NULL; |
77 int rv = InitializeBeforeFirstChallenge(); | 75 int rv = InitializeBeforeFirstChallenge(); |
78 if (rv != OK) | 76 if (rv != OK) |
79 return rv; | 77 return rv; |
80 } else { | 78 } else { |
81 if (!base::Base64Decode(auth_data_, &decoded_auth_data)) { | 79 if (!base::Base64Decode(auth_data_, &decoded_auth_data)) { |
(...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
142 // static | 140 // static |
143 std::wstring HttpAuthHandlerNTLM::CreateSPN(const GURL& origin) { | 141 std::wstring HttpAuthHandlerNTLM::CreateSPN(const GURL& origin) { |
144 // The service principal name of the destination server. See | 142 // The service principal name of the destination server. See |
145 // http://msdn.microsoft.com/en-us/library/ms677949%28VS.85%29.aspx | 143 // http://msdn.microsoft.com/en-us/library/ms677949%28VS.85%29.aspx |
146 std::wstring target(L"HTTP/"); | 144 std::wstring target(L"HTTP/"); |
147 target.append(ASCIIToWide(GetHostAndPort(origin))); | 145 target.append(ASCIIToWide(GetHostAndPort(origin))); |
148 return target; | 146 return target; |
149 } | 147 } |
150 | 148 |
151 } // namespace net | 149 } // namespace net |
OLD | NEW |