Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(83)

Side by Side Diff: net/http/http_auth_gssapi_posix_unittest.cc

Issue 266243004: Clang format slam. Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/http/http_auth_gssapi_posix.h" 5 #include "net/http/http_auth_gssapi_posix.h"
6 6
7 #include "base/basictypes.h" 7 #include "base/basictypes.h"
8 #include "base/logging.h" 8 #include "base/logging.h"
9 #include "base/memory/scoped_ptr.h" 9 #include "base/memory/scoped_ptr.h"
10 #include "base/native_library.h" 10 #include "base/native_library.h"
11 #include "net/base/net_errors.h" 11 #include "net/base/net_errors.h"
12 #include "net/http/http_auth_challenge_tokenizer.h" 12 #include "net/http/http_auth_challenge_tokenizer.h"
13 #include "net/http/mock_gssapi_library_posix.h" 13 #include "net/http/mock_gssapi_library_posix.h"
14 #include "testing/gtest/include/gtest/gtest.h" 14 #include "testing/gtest/include/gtest/gtest.h"
15 15
16 namespace net { 16 namespace net {
17 17
18 namespace { 18 namespace {
19 19
20 // gss_buffer_t helpers. 20 // gss_buffer_t helpers.
21 void ClearBuffer(gss_buffer_t dest) { 21 void ClearBuffer(gss_buffer_t dest) {
22 if (!dest) 22 if (!dest)
23 return; 23 return;
24 dest->length = 0; 24 dest->length = 0;
25 delete [] reinterpret_cast<char*>(dest->value); 25 delete[] reinterpret_cast<char*>(dest->value);
26 dest->value = NULL; 26 dest->value = NULL;
27 } 27 }
28 28
29 void SetBuffer(gss_buffer_t dest, const void* src, size_t length) { 29 void SetBuffer(gss_buffer_t dest, const void* src, size_t length) {
30 if (!dest) 30 if (!dest)
31 return; 31 return;
32 ClearBuffer(dest); 32 ClearBuffer(dest);
33 if (!src) 33 if (!src)
34 return; 34 return;
35 dest->length = length; 35 dest->length = length;
36 if (length) { 36 if (length) {
37 dest->value = new char[length]; 37 dest->value = new char[length];
38 memcpy(dest->value, src, length); 38 memcpy(dest->value, src, length);
39 } 39 }
40 } 40 }
41 41
42 void CopyBuffer(gss_buffer_t dest, const gss_buffer_t src) { 42 void CopyBuffer(gss_buffer_t dest, const gss_buffer_t src) {
43 if (!dest) 43 if (!dest)
44 return; 44 return;
45 ClearBuffer(dest); 45 ClearBuffer(dest);
46 if (!src) 46 if (!src)
47 return; 47 return;
48 SetBuffer(dest, src->value, src->length); 48 SetBuffer(dest, src->value, src->length);
49 } 49 }
50 50
51 const char kInitialAuthResponse[] = "Mary had a little lamb"; 51 const char kInitialAuthResponse[] = "Mary had a little lamb";
52 52
53 void EstablishInitialContext(test::MockGSSAPILibrary* library) { 53 void EstablishInitialContext(test::MockGSSAPILibrary* library) {
54 test::GssContextMockImpl context_info( 54 test::GssContextMockImpl context_info(
55 "localhost", // Source name 55 "localhost", // Source name
56 "example.com", // Target name 56 "example.com", // Target name
57 23, // Lifetime 57 23, // Lifetime
58 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism 58 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism
59 0, // Context flags 59 0, // Context flags
60 1, // Locally initiated 60 1, // Locally initiated
61 0); // Open 61 0); // Open
62 gss_buffer_desc in_buffer = {0, NULL}; 62 gss_buffer_desc in_buffer = {0, NULL};
63 gss_buffer_desc out_buffer = {arraysize(kInitialAuthResponse), 63 gss_buffer_desc out_buffer = {arraysize(kInitialAuthResponse),
64 const_cast<char*>(kInitialAuthResponse)}; 64 const_cast<char*>(kInitialAuthResponse)};
65 library->ExpectSecurityContext( 65 library->ExpectSecurityContext("Negotiate",
66 "Negotiate", 66 GSS_S_CONTINUE_NEEDED,
67 GSS_S_CONTINUE_NEEDED, 67 0,
68 0, 68 context_info,
69 context_info, 69 in_buffer,
70 in_buffer, 70 out_buffer);
71 out_buffer);
72 } 71 }
73 72
74 } // namespace 73 } // namespace
75 74
76 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPIStartup) { 75 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPIStartup) {
77 // TODO(ahendrickson): Manipulate the libraries and paths to test each of the 76 // TODO(ahendrickson): Manipulate the libraries and paths to test each of the
78 // libraries we expect, and also whether or not they have the interface 77 // libraries we expect, and also whether or not they have the interface
79 // functions we want. 78 // functions we want.
80 scoped_ptr<GSSAPILibrary> gssapi(new GSSAPISharedLibrary(std::string())); 79 scoped_ptr<GSSAPILibrary> gssapi(new GSSAPISharedLibrary(std::string()));
81 DCHECK(gssapi.get()); 80 DCHECK(gssapi.get());
82 EXPECT_TRUE(gssapi.get()->Init()); 81 EXPECT_TRUE(gssapi.get()->Init());
83 } 82 }
84 83
85 #if defined(DLOPEN_KERBEROS) 84 #if defined(DLOPEN_KERBEROS)
86 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPILoadCustomLibrary) { 85 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPILoadCustomLibrary) {
87 scoped_ptr<GSSAPILibrary> gssapi( 86 scoped_ptr<GSSAPILibrary> gssapi(
88 new GSSAPISharedLibrary("/this/library/does/not/exist")); 87 new GSSAPISharedLibrary("/this/library/does/not/exist"));
89 EXPECT_FALSE(gssapi.get()->Init()); 88 EXPECT_FALSE(gssapi.get()->Init());
90 } 89 }
91 #endif // defined(DLOPEN_KERBEROS) 90 #endif // defined(DLOPEN_KERBEROS)
92 91
93 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPICycle) { 92 TEST(HttpAuthGSSAPIPOSIXTest, GSSAPICycle) {
94 scoped_ptr<test::MockGSSAPILibrary> mock_library(new test::MockGSSAPILibrary); 93 scoped_ptr<test::MockGSSAPILibrary> mock_library(new test::MockGSSAPILibrary);
95 DCHECK(mock_library.get()); 94 DCHECK(mock_library.get());
96 mock_library->Init(); 95 mock_library->Init();
97 const char kAuthResponse[] = "Mary had a little lamb"; 96 const char kAuthResponse[] = "Mary had a little lamb";
98 test::GssContextMockImpl context1( 97 test::GssContextMockImpl context1(
99 "localhost", // Source name 98 "localhost", // Source name
100 "example.com", // Target name 99 "example.com", // Target name
101 23, // Lifetime 100 23, // Lifetime
102 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism 101 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism
103 0, // Context flags 102 0, // Context flags
104 1, // Locally initiated 103 1, // Locally initiated
105 0); // Open 104 0); // Open
106 test::GssContextMockImpl context2( 105 test::GssContextMockImpl context2(
107 "localhost", // Source name 106 "localhost", // Source name
108 "example.com", // Target name 107 "example.com", // Target name
109 23, // Lifetime 108 23, // Lifetime
110 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism 109 *CHROME_GSS_SPNEGO_MECH_OID_DESC, // Mechanism
111 0, // Context flags 110 0, // Context flags
112 1, // Locally initiated 111 1, // Locally initiated
113 1); // Open 112 1); // Open
114 test::MockGSSAPILibrary::SecurityContextQuery queries[] = { 113 test::MockGSSAPILibrary::SecurityContextQuery queries[] = {
115 test::MockGSSAPILibrary::SecurityContextQuery( 114 test::MockGSSAPILibrary::SecurityContextQuery(
116 "Negotiate", // Package name 115 "Negotiate", // Package name
117 GSS_S_CONTINUE_NEEDED, // Major response code 116 GSS_S_CONTINUE_NEEDED, // Major response code
118 0, // Minor response code 117 0, // Minor response code
119 context1, // Context 118 context1, // Context
120 NULL, // Expected input token 119 NULL, // Expected input token
121 kAuthResponse), // Output token 120 kAuthResponse), // Output token
122 test::MockGSSAPILibrary::SecurityContextQuery( 121 test::MockGSSAPILibrary::SecurityContextQuery(
123 "Negotiate", // Package name 122 "Negotiate", // Package name
124 GSS_S_COMPLETE, // Major response code 123 GSS_S_COMPLETE, // Major response code
125 0, // Minor response code 124 0, // Minor response code
126 context2, // Context 125 context2, // Context
127 kAuthResponse, // Expected input token 126 kAuthResponse, // Expected input token
128 kAuthResponse) // Output token 127 kAuthResponse) // Output token
129 }; 128 };
130 129
131 for (size_t i = 0; i < arraysize(queries); ++i) { 130 for (size_t i = 0; i < arraysize(queries); ++i) {
132 mock_library->ExpectSecurityContext(queries[i].expected_package, 131 mock_library->ExpectSecurityContext(queries[i].expected_package,
133 queries[i].response_code, 132 queries[i].response_code,
134 queries[i].minor_response_code, 133 queries[i].minor_response_code,
135 queries[i].context_info, 134 queries[i].context_info,
136 queries[i].expected_input_token, 135 queries[i].expected_input_token,
137 queries[i].output_token); 136 queries[i].output_token);
138 } 137 }
139 138
140 OM_uint32 major_status = 0; 139 OM_uint32 major_status = 0;
141 OM_uint32 minor_status = 0; 140 OM_uint32 minor_status = 0;
142 gss_cred_id_t initiator_cred_handle = NULL; 141 gss_cred_id_t initiator_cred_handle = NULL;
143 gss_ctx_id_t context_handle = NULL; 142 gss_ctx_id_t context_handle = NULL;
144 gss_name_t target_name = NULL; 143 gss_name_t target_name = NULL;
145 gss_OID mech_type = NULL; 144 gss_OID mech_type = NULL;
146 OM_uint32 req_flags = 0; 145 OM_uint32 req_flags = 0;
147 OM_uint32 time_req = 25; 146 OM_uint32 time_req = 25;
148 gss_channel_bindings_t input_chan_bindings = NULL; 147 gss_channel_bindings_t input_chan_bindings = NULL;
149 gss_buffer_desc input_token = { 0, NULL }; 148 gss_buffer_desc input_token = {0, NULL};
150 gss_OID actual_mech_type= NULL; 149 gss_OID actual_mech_type = NULL;
151 gss_buffer_desc output_token = { 0, NULL }; 150 gss_buffer_desc output_token = {0, NULL};
152 OM_uint32 ret_flags = 0; 151 OM_uint32 ret_flags = 0;
153 OM_uint32 time_rec = 0; 152 OM_uint32 time_rec = 0;
154 for (size_t i = 0; i < arraysize(queries); ++i) { 153 for (size_t i = 0; i < arraysize(queries); ++i) {
155 major_status = mock_library->init_sec_context(&minor_status, 154 major_status = mock_library->init_sec_context(&minor_status,
156 initiator_cred_handle, 155 initiator_cred_handle,
157 &context_handle, 156 &context_handle,
158 target_name, 157 target_name,
159 mech_type, 158 mech_type,
160 req_flags, 159 req_flags,
161 time_req, 160 time_req,
162 input_chan_bindings, 161 input_chan_bindings,
163 &input_token, 162 &input_token,
164 &actual_mech_type, 163 &actual_mech_type,
165 &output_token, 164 &output_token,
166 &ret_flags, 165 &ret_flags,
167 &time_rec); 166 &time_rec);
168 EXPECT_EQ(queries[i].response_code, major_status); 167 EXPECT_EQ(queries[i].response_code, major_status);
169 CopyBuffer(&input_token, &output_token); 168 CopyBuffer(&input_token, &output_token);
170 ClearBuffer(&output_token); 169 ClearBuffer(&output_token);
171 } 170 }
172 ClearBuffer(&input_token); 171 ClearBuffer(&input_token);
173 major_status = mock_library->delete_sec_context(&minor_status, 172 major_status = mock_library->delete_sec_context(
174 &context_handle, 173 &minor_status, &context_handle, GSS_C_NO_BUFFER);
175 GSS_C_NO_BUFFER);
176 EXPECT_EQ(static_cast<OM_uint32>(GSS_S_COMPLETE), major_status); 174 EXPECT_EQ(static_cast<OM_uint32>(GSS_S_COMPLETE), major_status);
177 } 175 }
178 176
179 TEST(HttpAuthGSSAPITest, ParseChallenge_FirstRound) { 177 TEST(HttpAuthGSSAPITest, ParseChallenge_FirstRound) {
180 // The first round should just consist of an unadorned "Negotiate" header. 178 // The first round should just consist of an unadorned "Negotiate" header.
181 test::MockGSSAPILibrary mock_library; 179 test::MockGSSAPILibrary mock_library;
182 HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", 180 HttpAuthGSSAPI auth_gssapi(
183 CHROME_GSS_SPNEGO_MECH_OID_DESC); 181 &mock_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC);
184 std::string challenge_text = "Negotiate"; 182 std::string challenge_text = "Negotiate";
185 HttpAuthChallengeTokenizer challenge(challenge_text.begin(), 183 HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
186 challenge_text.end()); 184 challenge_text.end());
187 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, 185 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
188 auth_gssapi.ParseChallenge(&challenge)); 186 auth_gssapi.ParseChallenge(&challenge));
189 } 187 }
190 188
191 TEST(HttpAuthGSSAPITest, ParseChallenge_TwoRounds) { 189 TEST(HttpAuthGSSAPITest, ParseChallenge_TwoRounds) {
192 // The first round should just have "Negotiate", and the second round should 190 // The first round should just have "Negotiate", and the second round should
193 // have a valid base64 token associated with it. 191 // have a valid base64 token associated with it.
194 test::MockGSSAPILibrary mock_library; 192 test::MockGSSAPILibrary mock_library;
195 HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", 193 HttpAuthGSSAPI auth_gssapi(
196 CHROME_GSS_SPNEGO_MECH_OID_DESC); 194 &mock_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC);
197 std::string first_challenge_text = "Negotiate"; 195 std::string first_challenge_text = "Negotiate";
198 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), 196 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(),
199 first_challenge_text.end()); 197 first_challenge_text.end());
200 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, 198 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
201 auth_gssapi.ParseChallenge(&first_challenge)); 199 auth_gssapi.ParseChallenge(&first_challenge));
202 200
203 // Generate an auth token and create another thing. 201 // Generate an auth token and create another thing.
204 EstablishInitialContext(&mock_library); 202 EstablishInitialContext(&mock_library);
205 std::string auth_token; 203 std::string auth_token;
206 EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com", 204 EXPECT_EQ(OK,
207 &auth_token)); 205 auth_gssapi.GenerateAuthToken(
206 NULL, "HTTP/intranet.google.com", &auth_token));
208 207
209 std::string second_challenge_text = "Negotiate Zm9vYmFy"; 208 std::string second_challenge_text = "Negotiate Zm9vYmFy";
210 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), 209 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(),
211 second_challenge_text.end()); 210 second_challenge_text.end());
212 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, 211 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
213 auth_gssapi.ParseChallenge(&second_challenge)); 212 auth_gssapi.ParseChallenge(&second_challenge));
214 } 213 }
215 214
216 TEST(HttpAuthGSSAPITest, ParseChallenge_UnexpectedTokenFirstRound) { 215 TEST(HttpAuthGSSAPITest, ParseChallenge_UnexpectedTokenFirstRound) {
217 // If the first round challenge has an additional authentication token, it 216 // If the first round challenge has an additional authentication token, it
218 // should be treated as an invalid challenge from the server. 217 // should be treated as an invalid challenge from the server.
219 test::MockGSSAPILibrary mock_library; 218 test::MockGSSAPILibrary mock_library;
220 HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", 219 HttpAuthGSSAPI auth_gssapi(
221 CHROME_GSS_SPNEGO_MECH_OID_DESC); 220 &mock_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC);
222 std::string challenge_text = "Negotiate Zm9vYmFy"; 221 std::string challenge_text = "Negotiate Zm9vYmFy";
223 HttpAuthChallengeTokenizer challenge(challenge_text.begin(), 222 HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
224 challenge_text.end()); 223 challenge_text.end());
225 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID, 224 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID,
226 auth_gssapi.ParseChallenge(&challenge)); 225 auth_gssapi.ParseChallenge(&challenge));
227 } 226 }
228 227
229 TEST(HttpAuthGSSAPITest, ParseChallenge_MissingTokenSecondRound) { 228 TEST(HttpAuthGSSAPITest, ParseChallenge_MissingTokenSecondRound) {
230 // If a later-round challenge is simply "Negotiate", it should be treated as 229 // If a later-round challenge is simply "Negotiate", it should be treated as
231 // an authentication challenge rejection from the server or proxy. 230 // an authentication challenge rejection from the server or proxy.
232 test::MockGSSAPILibrary mock_library; 231 test::MockGSSAPILibrary mock_library;
233 HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", 232 HttpAuthGSSAPI auth_gssapi(
234 CHROME_GSS_SPNEGO_MECH_OID_DESC); 233 &mock_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC);
235 std::string first_challenge_text = "Negotiate"; 234 std::string first_challenge_text = "Negotiate";
236 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), 235 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(),
237 first_challenge_text.end()); 236 first_challenge_text.end());
238 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, 237 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
239 auth_gssapi.ParseChallenge(&first_challenge)); 238 auth_gssapi.ParseChallenge(&first_challenge));
240 239
241 EstablishInitialContext(&mock_library); 240 EstablishInitialContext(&mock_library);
242 std::string auth_token; 241 std::string auth_token;
243 EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com", 242 EXPECT_EQ(OK,
244 &auth_token)); 243 auth_gssapi.GenerateAuthToken(
244 NULL, "HTTP/intranet.google.com", &auth_token));
245 std::string second_challenge_text = "Negotiate"; 245 std::string second_challenge_text = "Negotiate";
246 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), 246 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(),
247 second_challenge_text.end()); 247 second_challenge_text.end());
248 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_REJECT, 248 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_REJECT,
249 auth_gssapi.ParseChallenge(&second_challenge)); 249 auth_gssapi.ParseChallenge(&second_challenge));
250 } 250 }
251 251
252 TEST(HttpAuthGSSAPITest, ParseChallenge_NonBase64EncodedToken) { 252 TEST(HttpAuthGSSAPITest, ParseChallenge_NonBase64EncodedToken) {
253 // If a later-round challenge has an invalid base64 encoded token, it should 253 // If a later-round challenge has an invalid base64 encoded token, it should
254 // be treated as an invalid challenge. 254 // be treated as an invalid challenge.
255 test::MockGSSAPILibrary mock_library; 255 test::MockGSSAPILibrary mock_library;
256 HttpAuthGSSAPI auth_gssapi(&mock_library, "Negotiate", 256 HttpAuthGSSAPI auth_gssapi(
257 CHROME_GSS_SPNEGO_MECH_OID_DESC); 257 &mock_library, "Negotiate", CHROME_GSS_SPNEGO_MECH_OID_DESC);
258 std::string first_challenge_text = "Negotiate"; 258 std::string first_challenge_text = "Negotiate";
259 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(), 259 HttpAuthChallengeTokenizer first_challenge(first_challenge_text.begin(),
260 first_challenge_text.end()); 260 first_challenge_text.end());
261 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT, 261 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_ACCEPT,
262 auth_gssapi.ParseChallenge(&first_challenge)); 262 auth_gssapi.ParseChallenge(&first_challenge));
263 263
264 EstablishInitialContext(&mock_library); 264 EstablishInitialContext(&mock_library);
265 std::string auth_token; 265 std::string auth_token;
266 EXPECT_EQ(OK, auth_gssapi.GenerateAuthToken(NULL, "HTTP/intranet.google.com", 266 EXPECT_EQ(OK,
267 &auth_token)); 267 auth_gssapi.GenerateAuthToken(
268 NULL, "HTTP/intranet.google.com", &auth_token));
268 std::string second_challenge_text = "Negotiate =happyjoy="; 269 std::string second_challenge_text = "Negotiate =happyjoy=";
269 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(), 270 HttpAuthChallengeTokenizer second_challenge(second_challenge_text.begin(),
270 second_challenge_text.end()); 271 second_challenge_text.end());
271 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID, 272 EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_INVALID,
272 auth_gssapi.ParseChallenge(&second_challenge)); 273 auth_gssapi.ParseChallenge(&second_challenge));
273 } 274 }
274 275
275 } // namespace net 276 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698