Index: net/http/http_auth_handler_mock.cc |
diff --git a/net/http/http_auth_handler_mock.cc b/net/http/http_auth_handler_mock.cc |
index 2f37e93c052af50936b6bb091a64cbb79f813a0c..b26c0610c64604dc55d75eb636f5418ebf1ed84e 100644 |
--- a/net/http/http_auth_handler_mock.cc |
+++ b/net/http/http_auth_handler_mock.cc |
@@ -28,17 +28,17 @@ void HttpAuthHandlerMock::SetGenerateExpectation(bool async, int rv) { |
} |
HttpAuth::AuthorizationResult HttpAuthHandlerMock::HandleAnotherChallenge( |
- HttpAuthChallengeTokenizer* challenge) { |
+ const HttpAuthChallengeTokenizer& challenge) { |
// If we receive a second challenge for a regular scheme, assume it's a |
// rejection. Receiving an empty second challenge when expecting multiple |
// rounds is also considered a rejection. |
- if (!expect_multiple_challenges_ || challenge->base64_param().empty()) |
+ if (!expect_multiple_challenges_ || challenge.base64_param().empty()) |
return HttpAuth::AUTHORIZATION_RESULT_REJECT; |
- if (!challenge->SchemeIs(auth_scheme_)) |
+ if (!challenge.SchemeIs(auth_scheme_)) |
return HttpAuth::AUTHORIZATION_RESULT_INVALID; |
auth_token_ = auth_scheme_; |
auth_token_.append(" continuation,"); |
- auth_token_.append(challenge->base64_param()); |
+ auth_token_.append(challenge.base64_param()); |
return HttpAuth::AUTHORIZATION_RESULT_ACCEPT; |
} |
@@ -54,28 +54,28 @@ bool HttpAuthHandlerMock::AllowsExplicitCredentials() { |
return allows_explicit_credentials_; |
} |
-bool HttpAuthHandlerMock::Init(HttpAuthChallengeTokenizer* challenge) { |
- EXPECT_TRUE(challenge->SchemeIs(expected_auth_scheme_)) |
- << "Mismatched scheme for challenge: " << challenge->challenge_text(); |
+int HttpAuthHandlerMock::Init(const HttpAuthChallengeTokenizer& challenge) { |
+ EXPECT_TRUE(challenge.SchemeIs(expected_auth_scheme_)) |
+ << "Mismatched scheme for challenge: " << challenge.challenge_text(); |
EXPECT_TRUE(auth_scheme_.empty()) << "Init was already called."; |
EXPECT_TRUE(HttpAuth::IsValidNormalizedScheme(expected_auth_scheme_)) |
<< "Invalid expected auth scheme."; |
auth_scheme_ = expected_auth_scheme_; |
auth_token_ = expected_auth_scheme_ + " auth_token"; |
- if (challenge->params_end() != challenge->params_begin()) { |
+ if (challenge.params_end() != challenge.params_begin()) { |
auth_token_ += ","; |
- auth_token_.append(challenge->params_begin(), challenge->params_end()); |
+ auth_token_.append(challenge.params_begin(), challenge.params_end()); |
} |
- return true; |
+ return OK; |
} |
int HttpAuthHandlerMock::GenerateAuthTokenImpl( |
const AuthCredentials* credentials, |
- const HttpRequestInfo* request, |
+ const HttpRequestInfo& request, |
const CompletionCallback& callback, |
std::string* auth_token) { |
first_round_ = false; |
- request_url_ = request->url; |
+ request_url_ = request.url; |
if (!credentials || credentials->Empty()) { |
EXPECT_TRUE(AllowsDefaultCredentials()) << "Credentials must be specified " |
@@ -138,7 +138,7 @@ bool HttpAuthHandlerMock::Factory::HaveAuthHandlers( |
} |
int HttpAuthHandlerMock::Factory::CreateAuthHandler( |
- HttpAuthChallengeTokenizer* challenge, |
+ const HttpAuthChallengeTokenizer& challenge, |
HttpAuth::Target target, |
const GURL& origin, |
CreateReason reason, |
@@ -152,10 +152,11 @@ int HttpAuthHandlerMock::Factory::CreateAuthHandler( |
return ERR_UNEXPECTED; |
scoped_ptr<HttpAuthHandler> tmp_handler(handler_list.front()); |
handler_list.weak_erase(handler_list.begin()); |
- if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) |
- return ERR_INVALID_RESPONSE; |
- handler->swap(tmp_handler); |
- return OK; |
+ int result = |
+ tmp_handler->HandleInitialChallenge(challenge, target, origin, net_log); |
+ if (result == OK) |
+ handler->swap(tmp_handler); |
+ return result; |
} |
} // namespace net |