OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/http/http_auth_handler_ntlm.h" | 5 #include "net/http/http_auth_handler_ntlm.h" |
6 | 6 |
7 #if !defined(NTLM_SSPI) | 7 #if !defined(NTLM_SSPI) |
8 #include "base/base64.h" | 8 #include "base/base64.h" |
9 #endif | 9 #endif |
10 #include "base/logging.h" | 10 #include "base/logging.h" |
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
42 const CompletionCallback& callback, std::string* auth_token) { | 42 const CompletionCallback& callback, std::string* auth_token) { |
43 #if defined(NTLM_SSPI) | 43 #if defined(NTLM_SSPI) |
44 return auth_sspi_.GenerateAuthToken(credentials, CreateSPN(origin_), | 44 return auth_sspi_.GenerateAuthToken(credentials, CreateSPN(origin_), |
45 channel_bindings_, auth_token, callback); | 45 channel_bindings_, auth_token, callback); |
46 #else // !defined(NTLM_SSPI) | 46 #else // !defined(NTLM_SSPI) |
47 // TODO(cbentzel): Shouldn't be hitting this case. | 47 // TODO(cbentzel): Shouldn't be hitting this case. |
48 if (!credentials) { | 48 if (!credentials) { |
49 LOG(ERROR) << "Username and password are expected to be non-NULL."; | 49 LOG(ERROR) << "Username and password are expected to be non-NULL."; |
50 return ERR_MISSING_AUTH_CREDENTIALS; | 50 return ERR_MISSING_AUTH_CREDENTIALS; |
51 } | 51 } |
52 // TODO(wtc): See if we can use char* instead of void* for in_buf and | |
53 // out_buf. This change will need to propagate to GetNextToken, | |
54 // GenerateType1Msg, and GenerateType3Msg, and perhaps further. | |
55 const void* in_buf; | |
56 void* out_buf; | |
57 uint32_t in_buf_len, out_buf_len; | |
58 std::string decoded_auth_data; | |
59 | 52 |
60 // The username may be in the form "DOMAIN\user". Parse it into the two | 53 // The username may be in the form "DOMAIN\user". Parse it into the two |
61 // components. | 54 // components. |
62 base::string16 domain; | 55 base::string16 domain; |
63 base::string16 user; | 56 base::string16 user; |
64 const base::string16& username = credentials->username(); | 57 const base::string16& username = credentials->username(); |
65 const base::char16 backslash_character = '\\'; | 58 const base::char16 backslash_character = '\\'; |
66 size_t backslash_idx = username.find(backslash_character); | 59 size_t backslash_idx = username.find(backslash_character); |
67 if (backslash_idx == base::string16::npos) { | 60 if (backslash_idx == base::string16::npos) { |
68 user = username; | 61 user = username; |
69 } else { | 62 } else { |
70 domain = username.substr(0, backslash_idx); | 63 domain = username.substr(0, backslash_idx); |
71 user = username.substr(backslash_idx + 1); | 64 user = username.substr(backslash_idx + 1); |
72 } | 65 } |
73 domain_ = domain; | 66 domain_ = domain; |
74 credentials_.Set(user, credentials->password()); | 67 credentials_.Set(user, credentials->password()); |
75 | 68 |
76 // Initial challenge. | 69 std::string decoded_auth_data; |
77 if (auth_data_.empty()) { | 70 if (auth_data_.empty()) { |
78 in_buf_len = 0; | 71 // There is no |auth_data_| because the client sends the first message. |
79 in_buf = NULL; | |
80 int rv = InitializeBeforeFirstChallenge(); | 72 int rv = InitializeBeforeFirstChallenge(); |
81 if (rv != OK) | 73 if (rv != OK) |
82 return rv; | 74 return rv; |
83 } else { | 75 } else { |
| 76 // When |auth_data_| is present it contains the Challenge message. |
84 if (!base::Base64Decode(auth_data_, &decoded_auth_data)) { | 77 if (!base::Base64Decode(auth_data_, &decoded_auth_data)) { |
85 LOG(ERROR) << "Unexpected problem Base64 decoding."; | 78 LOG(ERROR) << "Unexpected problem Base64 decoding."; |
86 return ERR_UNEXPECTED; | 79 return ERR_UNEXPECTED; |
87 } | 80 } |
88 in_buf_len = decoded_auth_data.length(); | |
89 in_buf = decoded_auth_data.data(); | |
90 } | 81 } |
91 | 82 |
92 int rv = GetNextToken(in_buf, in_buf_len, &out_buf, &out_buf_len); | 83 ntlm::Buffer next_token = GetNextToken( |
93 if (rv != OK) | 84 ntlm::Buffer(reinterpret_cast<const uint8_t*>(decoded_auth_data.data()), |
94 return rv; | 85 decoded_auth_data.size())); |
| 86 if (next_token.empty()) |
| 87 return ERR_UNEXPECTED; |
95 | 88 |
96 // Base64 encode data in output buffer and prepend "NTLM ". | 89 // Base64 encode data in output buffer and prepend "NTLM ". |
97 std::string encode_input(static_cast<char*>(out_buf), out_buf_len); | |
98 std::string encode_output; | 90 std::string encode_output; |
99 base::Base64Encode(encode_input, &encode_output); | 91 base::Base64Encode( |
100 // OK, we are done with |out_buf| | 92 base::StringPiece(reinterpret_cast<const char*>(next_token.data()), |
101 free(out_buf); | 93 next_token.size()), |
| 94 &encode_output); |
| 95 |
102 *auth_token = std::string("NTLM ") + encode_output; | 96 *auth_token = std::string("NTLM ") + encode_output; |
103 return OK; | 97 return OK; |
104 #endif | 98 #endif |
105 } | 99 } |
106 | 100 |
107 // The NTLM challenge header looks like: | 101 // The NTLM challenge header looks like: |
108 // WWW-Authenticate: NTLM auth-data | 102 // WWW-Authenticate: NTLM auth-data |
109 HttpAuth::AuthorizationResult HttpAuthHandlerNTLM::ParseChallenge( | 103 HttpAuth::AuthorizationResult HttpAuthHandlerNTLM::ParseChallenge( |
110 HttpAuthChallengeTokenizer* tok, bool initial_challenge) { | 104 HttpAuthChallengeTokenizer* tok, bool initial_challenge) { |
111 #if defined(NTLM_SSPI) | 105 #if defined(NTLM_SSPI) |
(...skipping 29 matching lines...) Expand all Loading... |
141 // static | 135 // static |
142 std::string HttpAuthHandlerNTLM::CreateSPN(const GURL& origin) { | 136 std::string HttpAuthHandlerNTLM::CreateSPN(const GURL& origin) { |
143 // The service principal name of the destination server. See | 137 // The service principal name of the destination server. See |
144 // http://msdn.microsoft.com/en-us/library/ms677949%28VS.85%29.aspx | 138 // http://msdn.microsoft.com/en-us/library/ms677949%28VS.85%29.aspx |
145 std::string target("HTTP/"); | 139 std::string target("HTTP/"); |
146 target.append(GetHostAndPort(origin)); | 140 target.append(GetHostAndPort(origin)); |
147 return target; | 141 return target; |
148 } | 142 } |
149 | 143 |
150 } // namespace net | 144 } // namespace net |
OLD | NEW |