Index: net/http/http_auth.cc |
diff --git a/net/http/http_auth.cc b/net/http/http_auth.cc |
deleted file mode 100644 |
index 35251140f4763431900696d82d451dc5fc08bb9c..0000000000000000000000000000000000000000 |
--- a/net/http/http_auth.cc |
+++ /dev/null |
@@ -1,149 +0,0 @@ |
-// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/http/http_auth.h" |
- |
-#include <algorithm> |
- |
-#include "base/basictypes.h" |
-#include "base/strings/string_tokenizer.h" |
-#include "base/strings/string_util.h" |
-#include "net/base/net_errors.h" |
-#include "net/http/http_auth_challenge_tokenizer.h" |
-#include "net/http/http_auth_handler.h" |
-#include "net/http/http_auth_handler_factory.h" |
-#include "net/http/http_request_headers.h" |
-#include "net/http/http_response_headers.h" |
-#include "net/http/http_util.h" |
- |
-namespace net { |
- |
-HttpAuth::Identity::Identity() : source(IDENT_SRC_NONE), invalid(true) {} |
- |
-// static |
-void HttpAuth::ChooseBestChallenge( |
- HttpAuthHandlerFactory* http_auth_handler_factory, |
- const HttpResponseHeaders* headers, |
- Target target, |
- const GURL& origin, |
- const std::set<Scheme>& disabled_schemes, |
- const BoundNetLog& net_log, |
- scoped_ptr<HttpAuthHandler>* handler) { |
- DCHECK(http_auth_handler_factory); |
- DCHECK(handler->get() == NULL); |
- |
- // Choose the challenge whose authentication handler gives the maximum score. |
- scoped_ptr<HttpAuthHandler> best; |
- const std::string header_name = GetChallengeHeaderName(target); |
- std::string cur_challenge; |
- void* iter = NULL; |
- while (headers->EnumerateHeader(&iter, header_name, &cur_challenge)) { |
- scoped_ptr<HttpAuthHandler> cur; |
- int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
- cur_challenge, target, origin, net_log, &cur); |
- if (rv != OK) { |
- VLOG(1) << "Unable to create AuthHandler. Status: " |
- << ErrorToString(rv) << " Challenge: " << cur_challenge; |
- continue; |
- } |
- if (cur.get() && (!best.get() || best->score() < cur->score()) && |
- (disabled_schemes.find(cur->auth_scheme()) == disabled_schemes.end())) |
- best.swap(cur); |
- } |
- handler->swap(best); |
-} |
- |
-// static |
-HttpAuth::AuthorizationResult HttpAuth::HandleChallengeResponse( |
- HttpAuthHandler* handler, |
- const HttpResponseHeaders* headers, |
- Target target, |
- const std::set<Scheme>& disabled_schemes, |
- std::string* challenge_used) { |
- DCHECK(handler); |
- DCHECK(headers); |
- DCHECK(challenge_used); |
- challenge_used->clear(); |
- HttpAuth::Scheme current_scheme = handler->auth_scheme(); |
- if (disabled_schemes.find(current_scheme) != disabled_schemes.end()) |
- return HttpAuth::AUTHORIZATION_RESULT_REJECT; |
- std::string current_scheme_name = SchemeToString(current_scheme); |
- const std::string header_name = GetChallengeHeaderName(target); |
- void* iter = NULL; |
- std::string challenge; |
- HttpAuth::AuthorizationResult authorization_result = |
- HttpAuth::AUTHORIZATION_RESULT_INVALID; |
- while (headers->EnumerateHeader(&iter, header_name, &challenge)) { |
- HttpAuthChallengeTokenizer props(challenge.begin(), challenge.end()); |
- if (!LowerCaseEqualsASCII(props.scheme(), current_scheme_name.c_str())) |
- continue; |
- authorization_result = handler->HandleAnotherChallenge(&props); |
- if (authorization_result != HttpAuth::AUTHORIZATION_RESULT_INVALID) { |
- *challenge_used = challenge; |
- return authorization_result; |
- } |
- } |
- // Finding no matches is equivalent to rejection. |
- return HttpAuth::AUTHORIZATION_RESULT_REJECT; |
-} |
- |
-// static |
-std::string HttpAuth::GetChallengeHeaderName(Target target) { |
- switch (target) { |
- case AUTH_PROXY: |
- return "Proxy-Authenticate"; |
- case AUTH_SERVER: |
- return "WWW-Authenticate"; |
- default: |
- NOTREACHED(); |
- return std::string(); |
- } |
-} |
- |
-// static |
-std::string HttpAuth::GetAuthorizationHeaderName(Target target) { |
- switch (target) { |
- case AUTH_PROXY: |
- return HttpRequestHeaders::kProxyAuthorization; |
- case AUTH_SERVER: |
- return HttpRequestHeaders::kAuthorization; |
- default: |
- NOTREACHED(); |
- return std::string(); |
- } |
-} |
- |
-// static |
-std::string HttpAuth::GetAuthTargetString(Target target) { |
- switch (target) { |
- case AUTH_PROXY: |
- return "proxy"; |
- case AUTH_SERVER: |
- return "server"; |
- default: |
- NOTREACHED(); |
- return std::string(); |
- } |
-} |
- |
-// static |
-const char* HttpAuth::SchemeToString(Scheme scheme) { |
- static const char* const kSchemeNames[] = { |
- "basic", |
- "digest", |
- "ntlm", |
- "negotiate", |
- "spdyproxy", |
- "mock", |
- }; |
- static_assert(arraysize(kSchemeNames) == AUTH_SCHEME_MAX, |
- "http auth scheme names incorrect size"); |
- if (scheme < AUTH_SCHEME_BASIC || scheme >= AUTH_SCHEME_MAX) { |
- NOTREACHED(); |
- return "invalid_scheme"; |
- } |
- return kSchemeNames[scheme]; |
-} |
- |
-} // namespace net |