| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/http/http_auth_handler_negotiate.h" | 5 #include "net/http/http_auth_handler_negotiate.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | 7 #include "base/bind.h" |
| 8 #include "base/bind_helpers.h" | 8 #include "base/bind_helpers.h" |
| 9 #include "base/logging.h" | 9 #include "base/logging.h" |
| 10 #include "base/strings/string_util.h" | 10 #include "base/strings/string_util.h" |
| 11 #include "base/strings/stringprintf.h" | 11 #include "base/strings/stringprintf.h" |
| 12 #include "net/base/address_family.h" | 12 #include "net/base/address_family.h" |
| 13 #include "net/base/net_errors.h" | 13 #include "net/base/net_errors.h" |
| 14 #include "net/dns/host_resolver.h" | 14 #include "net/dns/host_resolver.h" |
| 15 #include "net/dns/single_request_host_resolver.h" | 15 #include "net/dns/single_request_host_resolver.h" |
| 16 #include "net/http/http_auth_challenge_tokenizer.h" | 16 #include "net/http/http_auth_challenge_tokenizer.h" |
| 17 #include "net/http/http_auth_filter.h" | 17 #include "net/http/http_auth_filter.h" |
| 18 #include "net/http/url_security_manager.h" | 18 #include "net/http/url_security_manager.h" |
| 19 | 19 |
| 20 // TODO(asanka): This file is a mess of platform dependent code. We should break |
| 21 // it up. |
| 20 namespace net { | 22 namespace net { |
| 21 | 23 |
| 22 HttpAuthHandlerNegotiate::Factory::Factory() | 24 HttpAuthHandlerNegotiate::Factory::Factory() |
| 23 : disable_cname_lookup_(false), | 25 : disable_cname_lookup_(false), |
| 24 use_port_(false), | 26 use_port_(false), |
| 25 resolver_(NULL), | 27 resolver_(NULL), |
| 26 #if defined(OS_WIN) | 28 #if defined(OS_WIN) |
| 27 max_token_length_(0), | 29 max_token_length_(0), |
| 28 #endif | 30 #endif |
| 29 is_unsupported_(false) { | 31 is_unsupported_(false) { |
| 30 } | 32 } |
| 31 | 33 |
| 32 HttpAuthHandlerNegotiate::Factory::~Factory() { | 34 HttpAuthHandlerNegotiate::Factory::~Factory() { |
| 33 } | 35 } |
| 34 | 36 |
| 35 void HttpAuthHandlerNegotiate::Factory::set_host_resolver( | 37 void HttpAuthHandlerNegotiate::Factory::set_host_resolver( |
| 36 HostResolver* resolver) { | 38 HostResolver* resolver) { |
| 37 resolver_ = resolver; | 39 resolver_ = resolver; |
| 38 } | 40 } |
| 39 | 41 |
| 40 int HttpAuthHandlerNegotiate::Factory::CreateAuthHandler( | 42 scoped_ptr<HttpAuthHandler> |
| 41 const HttpAuthChallengeTokenizer& challenge, | 43 HttpAuthHandlerNegotiate::Factory::CreateAndInitPreemptiveAuthHandler( |
| 44 HttpAuthCache::Entry* cache_entry, |
| 45 const HttpAuthChallengeTokenizer& tokenizer, |
| 42 HttpAuth::Target target, | 46 HttpAuth::Target target, |
| 43 const GURL& origin, | 47 const BoundNetLog& net_log) { |
| 44 CreateReason reason, | 48 return scoped_ptr<HttpAuthHandler>(); |
| 45 int digest_nonce_count, | 49 } |
| 46 const BoundNetLog& net_log, | 50 |
| 47 scoped_ptr<HttpAuthHandler>* handler) { | 51 scoped_ptr<HttpAuthHandler> |
| 52 HttpAuthHandlerNegotiate::Factory::CreateAuthHandlerForScheme( |
| 53 const std::string& scheme) { |
| 54 DCHECK(HttpAuth::IsValidNormalizedScheme(scheme)); |
| 55 if (scheme != "negotiate") |
| 56 return scoped_ptr<HttpAuthHandler>(); |
| 48 #if defined(OS_WIN) | 57 #if defined(OS_WIN) |
| 49 if (is_unsupported_ || reason == CREATE_PREEMPTIVE) | 58 if (is_unsupported_) |
| 50 return ERR_UNSUPPORTED_AUTH_SCHEME; | 59 return scoped_ptr<HttpAuthHandler>(); |
| 51 if (max_token_length_ == 0) { | 60 if (max_token_length_ == 0) { |
| 52 int rv = DetermineMaxTokenLength(auth_library_.get(), NEGOSSP_NAME, | 61 int rv = DetermineMaxTokenLength(auth_library_.get(), NEGOSSP_NAME, |
| 53 &max_token_length_); | 62 &max_token_length_); |
| 54 if (rv == ERR_UNSUPPORTED_AUTH_SCHEME) | 63 if (rv == ERR_UNSUPPORTED_AUTH_SCHEME) |
| 55 is_unsupported_ = true; | 64 is_unsupported_ = true; |
| 56 if (rv != OK) | 65 if (rv != OK) |
| 57 return rv; | 66 return scoped_ptr<HttpAuthHandler>(); |
| 58 } | 67 } |
| 59 // TODO(cbentzel): Move towards model of parsing in the factory | 68 // TODO(cbentzel): Move towards model of parsing in the factory |
| 60 // method and only constructing when valid. | 69 // method and only constructing when valid. |
| 61 scoped_ptr<HttpAuthHandler> tmp_handler( | 70 return make_scoped_ptr(new HttpAuthHandlerNegotiate( |
| 62 new HttpAuthHandlerNegotiate(auth_library_.get(), max_token_length_, | 71 auth_library_.get(), max_token_length_, url_security_manager(), resolver_, |
| 63 url_security_manager(), resolver_, | 72 disable_cname_lookup_, use_port_)); |
| 64 disable_cname_lookup_, use_port_)); | |
| 65 #elif defined(OS_ANDROID) | 73 #elif defined(OS_ANDROID) |
| 66 if (is_unsupported_ || auth_library_->empty() || reason == CREATE_PREEMPTIVE) | 74 if (is_unsupported_ || auth_library_->empty()) |
| 67 return ERR_UNSUPPORTED_AUTH_SCHEME; | 75 return scoped_ptr<HttpAuthHandler>(); |
| 68 // TODO(cbentzel): Move towards model of parsing in the factory | 76 // TODO(cbentzel): Move towards model of parsing in the factory |
| 69 // method and only constructing when valid. | 77 // method and only constructing when valid. |
| 70 scoped_ptr<HttpAuthHandler> tmp_handler(new HttpAuthHandlerNegotiate( | 78 return make_scoped_ptr(new HttpAuthHandlerNegotiate( |
| 71 auth_library_.get(), url_security_manager(), resolver_, | 79 auth_library_.get(), url_security_manager(), resolver_, |
| 72 disable_cname_lookup_, use_port_)); | 80 disable_cname_lookup_, use_port_)); |
| 73 #elif defined(OS_POSIX) | 81 #elif defined(OS_POSIX) |
| 74 if (is_unsupported_) | 82 if (is_unsupported_) |
| 75 return ERR_UNSUPPORTED_AUTH_SCHEME; | 83 return scoped_ptr<HttpAuthHandler>(); |
| 76 if (!auth_library_->Init()) { | 84 if (!auth_library_->Init()) { |
| 77 is_unsupported_ = true; | 85 is_unsupported_ = true; |
| 78 return ERR_UNSUPPORTED_AUTH_SCHEME; | 86 return scoped_ptr<HttpAuthHandler>(); |
| 79 } | 87 } |
| 80 // TODO(ahendrickson): Move towards model of parsing in the factory | 88 // TODO(ahendrickson): Move towards model of parsing in the factory |
| 81 // method and only constructing when valid. | 89 // method and only constructing when valid. |
| 82 scoped_ptr<HttpAuthHandler> tmp_handler( | 90 return make_scoped_ptr(new HttpAuthHandlerNegotiate( |
| 83 new HttpAuthHandlerNegotiate(auth_library_.get(), url_security_manager(), | 91 auth_library_.get(), url_security_manager(), resolver_, |
| 84 resolver_, disable_cname_lookup_, | 92 disable_cname_lookup_, use_port_)); |
| 85 use_port_)); | |
| 86 #endif | 93 #endif |
| 87 int result = | |
| 88 tmp_handler->HandleInitialChallenge(challenge, target, origin, net_log); | |
| 89 if (result == OK) | |
| 90 handler->swap(tmp_handler); | |
| 91 return result; | |
| 92 } | 94 } |
| 93 | 95 |
| 94 HttpAuthHandlerNegotiate::HttpAuthHandlerNegotiate( | 96 HttpAuthHandlerNegotiate::HttpAuthHandlerNegotiate( |
| 95 AuthLibrary* auth_library, | 97 AuthLibrary* auth_library, |
| 96 #if defined(OS_WIN) | 98 #if defined(OS_WIN) |
| 97 ULONG max_token_length, | 99 ULONG max_token_length, |
| 98 #endif | 100 #endif |
| 99 URLSecurityManager* url_security_manager, | 101 URLSecurityManager* url_security_manager, |
| 100 HostResolver* resolver, | 102 HostResolver* resolver, |
| 101 bool disable_cname_lookup, | 103 bool disable_cname_lookup, |
| 102 bool use_port) | 104 bool use_port) |
| 105 : HttpAuthHandler("negotiate"), |
| 103 #if defined(OS_ANDROID) | 106 #if defined(OS_ANDROID) |
| 104 : auth_system_(*auth_library), | 107 auth_system_(*auth_library), |
| 105 #elif defined(OS_WIN) | 108 #elif defined(OS_WIN) |
| 106 : auth_system_(auth_library, "Negotiate", NEGOSSP_NAME, max_token_length), | 109 auth_system_(auth_library, "Negotiate", NEGOSSP_NAME, max_token_length), |
| 107 #elif defined(OS_POSIX) | 110 #elif defined(OS_POSIX) |
| 108 : auth_system_(auth_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC), | 111 auth_system_(auth_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC), |
| 109 #endif | 112 #endif |
| 110 disable_cname_lookup_(disable_cname_lookup), | 113 disable_cname_lookup_(disable_cname_lookup), |
| 111 use_port_(use_port), | 114 use_port_(use_port), |
| 112 resolver_(resolver), | 115 resolver_(resolver), |
| 113 already_called_(false), | 116 already_called_(false), |
| 114 has_credentials_(false), | 117 has_credentials_(false), |
| 115 auth_token_(NULL), | 118 auth_token_(NULL), |
| 116 next_state_(STATE_NONE), | 119 next_state_(STATE_NONE), |
| 117 url_security_manager_(url_security_manager) { | 120 url_security_manager_(url_security_manager) { |
| 118 } | 121 } |
| (...skipping 222 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 341 bool HttpAuthHandlerNegotiate::CanDelegate() const { | 344 bool HttpAuthHandlerNegotiate::CanDelegate() const { |
| 342 // TODO(cbentzel): Should delegation be allowed on proxies? | 345 // TODO(cbentzel): Should delegation be allowed on proxies? |
| 343 if (target_ == HttpAuth::AUTH_PROXY) | 346 if (target_ == HttpAuth::AUTH_PROXY) |
| 344 return false; | 347 return false; |
| 345 if (!url_security_manager_) | 348 if (!url_security_manager_) |
| 346 return false; | 349 return false; |
| 347 return url_security_manager_->CanDelegate(origin_); | 350 return url_security_manager_->CanDelegate(origin_); |
| 348 } | 351 } |
| 349 | 352 |
| 350 } // namespace net | 353 } // namespace net |
| OLD | NEW |