Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(62)

Side by Side Diff: net/http/http_auth_handler_ntlm_win.cc

Issue 266243004: Clang format slam. Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // See "SSPI Sample Application" at 5 // See "SSPI Sample Application" at
6 // http://msdn.microsoft.com/en-us/library/aa918273.aspx 6 // http://msdn.microsoft.com/en-us/library/aa918273.aspx
7 // and "NTLM Security Support Provider" at 7 // and "NTLM Security Support Provider" at
8 // http://msdn.microsoft.com/en-us/library/aa923611.aspx. 8 // http://msdn.microsoft.com/en-us/library/aa923611.aspx.
9 9
10 #include "net/http/http_auth_handler_ntlm.h" 10 #include "net/http/http_auth_handler_ntlm.h"
11 11
12 #include "base/strings/string_util.h" 12 #include "base/strings/string_util.h"
13 #include "net/base/net_errors.h" 13 #include "net/base/net_errors.h"
14 #include "net/base/net_util.h" 14 #include "net/base/net_util.h"
15 #include "net/http/http_auth_sspi_win.h" 15 #include "net/http/http_auth_sspi_win.h"
16 #include "net/http/url_security_manager.h" 16 #include "net/http/url_security_manager.h"
17 17
18 #pragma comment(lib, "secur32.lib") 18 #pragma comment(lib, "secur32.lib")
19 19
20 namespace net { 20 namespace net {
21 21
22 HttpAuthHandlerNTLM::HttpAuthHandlerNTLM( 22 HttpAuthHandlerNTLM::HttpAuthHandlerNTLM(
23 SSPILibrary* sspi_library, ULONG max_token_length, 23 SSPILibrary* sspi_library,
24 ULONG max_token_length,
24 URLSecurityManager* url_security_manager) 25 URLSecurityManager* url_security_manager)
25 : auth_sspi_(sspi_library, "NTLM", NTLMSP_NAME, max_token_length), 26 : auth_sspi_(sspi_library, "NTLM", NTLMSP_NAME, max_token_length),
26 url_security_manager_(url_security_manager) { 27 url_security_manager_(url_security_manager) {
27 } 28 }
28 29
29 HttpAuthHandlerNTLM::~HttpAuthHandlerNTLM() { 30 HttpAuthHandlerNTLM::~HttpAuthHandlerNTLM() {
30 } 31 }
31 32
32 // Require identity on first pass instead of second. 33 // Require identity on first pass instead of second.
33 bool HttpAuthHandlerNTLM::NeedsIdentity() { 34 bool HttpAuthHandlerNTLM::NeedsIdentity() {
34 return auth_sspi_.NeedsIdentity(); 35 return auth_sspi_.NeedsIdentity();
35 } 36 }
36 37
37 bool HttpAuthHandlerNTLM::AllowsDefaultCredentials() { 38 bool HttpAuthHandlerNTLM::AllowsDefaultCredentials() {
38 if (target_ == HttpAuth::AUTH_PROXY) 39 if (target_ == HttpAuth::AUTH_PROXY)
39 return true; 40 return true;
40 if (!url_security_manager_) 41 if (!url_security_manager_)
41 return false; 42 return false;
42 return url_security_manager_->CanUseDefaultCredentials(origin_); 43 return url_security_manager_->CanUseDefaultCredentials(origin_);
43 } 44 }
44 45
45 HttpAuthHandlerNTLM::Factory::Factory() 46 HttpAuthHandlerNTLM::Factory::Factory()
46 : max_token_length_(0), 47 : max_token_length_(0), first_creation_(true), is_unsupported_(false) {
47 first_creation_(true),
48 is_unsupported_(false) {
49 } 48 }
50 49
51 HttpAuthHandlerNTLM::Factory::~Factory() { 50 HttpAuthHandlerNTLM::Factory::~Factory() {
52 } 51 }
53 52
54 int HttpAuthHandlerNTLM::Factory::CreateAuthHandler( 53 int HttpAuthHandlerNTLM::Factory::CreateAuthHandler(
55 HttpAuthChallengeTokenizer* challenge, 54 HttpAuthChallengeTokenizer* challenge,
56 HttpAuth::Target target, 55 HttpAuth::Target target,
57 const GURL& origin, 56 const GURL& origin,
58 CreateReason reason, 57 CreateReason reason,
59 int digest_nonce_count, 58 int digest_nonce_count,
60 const BoundNetLog& net_log, 59 const BoundNetLog& net_log,
61 scoped_ptr<HttpAuthHandler>* handler) { 60 scoped_ptr<HttpAuthHandler>* handler) {
62 if (is_unsupported_ || reason == CREATE_PREEMPTIVE) 61 if (is_unsupported_ || reason == CREATE_PREEMPTIVE)
63 return ERR_UNSUPPORTED_AUTH_SCHEME; 62 return ERR_UNSUPPORTED_AUTH_SCHEME;
64 if (max_token_length_ == 0) { 63 if (max_token_length_ == 0) {
65 int rv = DetermineMaxTokenLength(sspi_library_.get(), NTLMSP_NAME, 64 int rv = DetermineMaxTokenLength(
66 &max_token_length_); 65 sspi_library_.get(), NTLMSP_NAME, &max_token_length_);
67 if (rv == ERR_UNSUPPORTED_AUTH_SCHEME) 66 if (rv == ERR_UNSUPPORTED_AUTH_SCHEME)
68 is_unsupported_ = true; 67 is_unsupported_ = true;
69 if (rv != OK) 68 if (rv != OK)
70 return rv; 69 return rv;
71 } 70 }
72 // TODO(cbentzel): Move towards model of parsing in the factory 71 // TODO(cbentzel): Move towards model of parsing in the factory
73 // method and only constructing when valid. 72 // method and only constructing when valid.
74 scoped_ptr<HttpAuthHandler> tmp_handler( 73 scoped_ptr<HttpAuthHandler> tmp_handler(new HttpAuthHandlerNTLM(
75 new HttpAuthHandlerNTLM(sspi_library_.get(), max_token_length_, 74 sspi_library_.get(), max_token_length_, url_security_manager()));
76 url_security_manager()));
77 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 75 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
78 return ERR_INVALID_RESPONSE; 76 return ERR_INVALID_RESPONSE;
79 handler->swap(tmp_handler); 77 handler->swap(tmp_handler);
80 return OK; 78 return OK;
81 } 79 }
82 80
83 } // namespace net 81 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698