OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // See "SSPI Sample Application" at | 5 // See "SSPI Sample Application" at |
6 // http://msdn.microsoft.com/en-us/library/aa918273.aspx | 6 // http://msdn.microsoft.com/en-us/library/aa918273.aspx |
7 // and "NTLM Security Support Provider" at | 7 // and "NTLM Security Support Provider" at |
8 // http://msdn.microsoft.com/en-us/library/aa923611.aspx. | 8 // http://msdn.microsoft.com/en-us/library/aa923611.aspx. |
9 | 9 |
10 #include "net/http/http_auth_handler_ntlm.h" | 10 #include "net/http/http_auth_handler_ntlm.h" |
11 | 11 |
12 #include "base/strings/string_util.h" | 12 #include "base/strings/string_util.h" |
13 #include "net/base/net_errors.h" | 13 #include "net/base/net_errors.h" |
14 #include "net/base/net_util.h" | 14 #include "net/base/net_util.h" |
15 #include "net/http/http_auth_sspi_win.h" | 15 #include "net/http/http_auth_sspi_win.h" |
16 #include "net/http/url_security_manager.h" | 16 #include "net/http/url_security_manager.h" |
17 | 17 |
18 #pragma comment(lib, "secur32.lib") | 18 #pragma comment(lib, "secur32.lib") |
19 | 19 |
20 namespace net { | 20 namespace net { |
21 | 21 |
22 HttpAuthHandlerNTLM::HttpAuthHandlerNTLM( | 22 HttpAuthHandlerNTLM::HttpAuthHandlerNTLM( |
23 SSPILibrary* sspi_library, ULONG max_token_length, | 23 SSPILibrary* sspi_library, |
| 24 ULONG max_token_length, |
24 URLSecurityManager* url_security_manager) | 25 URLSecurityManager* url_security_manager) |
25 : auth_sspi_(sspi_library, "NTLM", NTLMSP_NAME, max_token_length), | 26 : auth_sspi_(sspi_library, "NTLM", NTLMSP_NAME, max_token_length), |
26 url_security_manager_(url_security_manager) { | 27 url_security_manager_(url_security_manager) { |
27 } | 28 } |
28 | 29 |
29 HttpAuthHandlerNTLM::~HttpAuthHandlerNTLM() { | 30 HttpAuthHandlerNTLM::~HttpAuthHandlerNTLM() { |
30 } | 31 } |
31 | 32 |
32 // Require identity on first pass instead of second. | 33 // Require identity on first pass instead of second. |
33 bool HttpAuthHandlerNTLM::NeedsIdentity() { | 34 bool HttpAuthHandlerNTLM::NeedsIdentity() { |
34 return auth_sspi_.NeedsIdentity(); | 35 return auth_sspi_.NeedsIdentity(); |
35 } | 36 } |
36 | 37 |
37 bool HttpAuthHandlerNTLM::AllowsDefaultCredentials() { | 38 bool HttpAuthHandlerNTLM::AllowsDefaultCredentials() { |
38 if (target_ == HttpAuth::AUTH_PROXY) | 39 if (target_ == HttpAuth::AUTH_PROXY) |
39 return true; | 40 return true; |
40 if (!url_security_manager_) | 41 if (!url_security_manager_) |
41 return false; | 42 return false; |
42 return url_security_manager_->CanUseDefaultCredentials(origin_); | 43 return url_security_manager_->CanUseDefaultCredentials(origin_); |
43 } | 44 } |
44 | 45 |
45 HttpAuthHandlerNTLM::Factory::Factory() | 46 HttpAuthHandlerNTLM::Factory::Factory() |
46 : max_token_length_(0), | 47 : max_token_length_(0), first_creation_(true), is_unsupported_(false) { |
47 first_creation_(true), | |
48 is_unsupported_(false) { | |
49 } | 48 } |
50 | 49 |
51 HttpAuthHandlerNTLM::Factory::~Factory() { | 50 HttpAuthHandlerNTLM::Factory::~Factory() { |
52 } | 51 } |
53 | 52 |
54 int HttpAuthHandlerNTLM::Factory::CreateAuthHandler( | 53 int HttpAuthHandlerNTLM::Factory::CreateAuthHandler( |
55 HttpAuthChallengeTokenizer* challenge, | 54 HttpAuthChallengeTokenizer* challenge, |
56 HttpAuth::Target target, | 55 HttpAuth::Target target, |
57 const GURL& origin, | 56 const GURL& origin, |
58 CreateReason reason, | 57 CreateReason reason, |
59 int digest_nonce_count, | 58 int digest_nonce_count, |
60 const BoundNetLog& net_log, | 59 const BoundNetLog& net_log, |
61 scoped_ptr<HttpAuthHandler>* handler) { | 60 scoped_ptr<HttpAuthHandler>* handler) { |
62 if (is_unsupported_ || reason == CREATE_PREEMPTIVE) | 61 if (is_unsupported_ || reason == CREATE_PREEMPTIVE) |
63 return ERR_UNSUPPORTED_AUTH_SCHEME; | 62 return ERR_UNSUPPORTED_AUTH_SCHEME; |
64 if (max_token_length_ == 0) { | 63 if (max_token_length_ == 0) { |
65 int rv = DetermineMaxTokenLength(sspi_library_.get(), NTLMSP_NAME, | 64 int rv = DetermineMaxTokenLength( |
66 &max_token_length_); | 65 sspi_library_.get(), NTLMSP_NAME, &max_token_length_); |
67 if (rv == ERR_UNSUPPORTED_AUTH_SCHEME) | 66 if (rv == ERR_UNSUPPORTED_AUTH_SCHEME) |
68 is_unsupported_ = true; | 67 is_unsupported_ = true; |
69 if (rv != OK) | 68 if (rv != OK) |
70 return rv; | 69 return rv; |
71 } | 70 } |
72 // TODO(cbentzel): Move towards model of parsing in the factory | 71 // TODO(cbentzel): Move towards model of parsing in the factory |
73 // method and only constructing when valid. | 72 // method and only constructing when valid. |
74 scoped_ptr<HttpAuthHandler> tmp_handler( | 73 scoped_ptr<HttpAuthHandler> tmp_handler(new HttpAuthHandlerNTLM( |
75 new HttpAuthHandlerNTLM(sspi_library_.get(), max_token_length_, | 74 sspi_library_.get(), max_token_length_, url_security_manager())); |
76 url_security_manager())); | |
77 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) | 75 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) |
78 return ERR_INVALID_RESPONSE; | 76 return ERR_INVALID_RESPONSE; |
79 handler->swap(tmp_handler); | 77 handler->swap(tmp_handler); |
80 return OK; | 78 return OK; |
81 } | 79 } |
82 | 80 |
83 } // namespace net | 81 } // namespace net |
OLD | NEW |