Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(293)

Unified Diff: net/http/http_auth_handler_digest_unittest.cc

Issue 992733002: Remove //net (except for Android test stuff) and sdch (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/http/http_auth_handler_digest.cc ('k') | net/http/http_auth_handler_factory.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/http/http_auth_handler_digest_unittest.cc
diff --git a/net/http/http_auth_handler_digest_unittest.cc b/net/http/http_auth_handler_digest_unittest.cc
deleted file mode 100644
index 8b5179e19261ced094ea1e6537e351287ddbc6e6..0000000000000000000000000000000000000000
--- a/net/http/http_auth_handler_digest_unittest.cc
+++ /dev/null
@@ -1,698 +0,0 @@
-// Copyright (c) 2011 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include <string>
-
-#include "base/basictypes.h"
-#include "base/strings/string_util.h"
-#include "base/strings/utf_string_conversions.h"
-#include "net/base/net_errors.h"
-#include "net/base/test_completion_callback.h"
-#include "net/http/http_auth_challenge_tokenizer.h"
-#include "net/http/http_auth_handler_digest.h"
-#include "net/http/http_request_info.h"
-#include "testing/gtest/include/gtest/gtest.h"
-
-namespace net {
-
-namespace {
-
-const char* const kSimpleChallenge =
- "Digest realm=\"Oblivion\", nonce=\"nonce-value\"";
-
-// RespondToChallenge creates an HttpAuthHandlerDigest for the specified
-// |challenge|, and generates a response to the challenge which is returned in
-// |token|.
-//
-// The return value indicates whether the |token| was successfully created.
-//
-// If |target| is HttpAuth::AUTH_PROXY, then |proxy_name| specifies the source
-// of the |challenge|. Otherwise, the scheme and host and port of |request_url|
-// indicates the origin of the challenge.
-bool RespondToChallenge(HttpAuth::Target target,
- const std::string& proxy_name,
- const std::string& request_url,
- const std::string& challenge,
- std::string* token) {
- // Input validation.
- if (token == NULL) {
- ADD_FAILURE() << "|token| must be non-NULL";
- return false;
- }
- EXPECT_TRUE(target != HttpAuth::AUTH_PROXY || !proxy_name.empty());
- EXPECT_FALSE(request_url.empty());
- EXPECT_FALSE(challenge.empty());
-
- token->clear();
- scoped_ptr<HttpAuthHandlerDigest::Factory> factory(
- new HttpAuthHandlerDigest::Factory());
- HttpAuthHandlerDigest::NonceGenerator* nonce_generator =
- new HttpAuthHandlerDigest::FixedNonceGenerator("client_nonce");
- factory->set_nonce_generator(nonce_generator);
- scoped_ptr<HttpAuthHandler> handler;
-
- // Create a handler for a particular challenge.
- GURL url_origin(target == HttpAuth::AUTH_SERVER ? request_url : proxy_name);
- int rv_create = factory->CreateAuthHandlerFromString(
- challenge, target, url_origin.GetOrigin(), BoundNetLog(), &handler);
- if (rv_create != OK || handler.get() == NULL) {
- ADD_FAILURE() << "Unable to create auth handler.";
- return false;
- }
-
- // Create a token in response to the challenge.
- // NOTE: HttpAuthHandlerDigest's implementation of GenerateAuthToken always
- // completes synchronously. That's why this test can get away with a
- // TestCompletionCallback without an IO thread.
- TestCompletionCallback callback;
- scoped_ptr<HttpRequestInfo> request(new HttpRequestInfo());
- request->url = GURL(request_url);
- AuthCredentials credentials(base::ASCIIToUTF16("foo"),
- base::ASCIIToUTF16("bar"));
- int rv_generate = handler->GenerateAuthToken(
- &credentials, request.get(), callback.callback(), token);
- if (rv_generate != OK) {
- ADD_FAILURE() << "Problems generating auth token";
- return false;
- }
-
- return true;
-}
-
-} // namespace
-
-
-TEST(HttpAuthHandlerDigestTest, ParseChallenge) {
- static const struct {
- // The challenge string.
- const char* challenge;
- // Expected return value of ParseChallenge.
- bool parsed_success;
- // The expected values that were parsed.
- const char* parsed_realm;
- const char* parsed_nonce;
- const char* parsed_domain;
- const char* parsed_opaque;
- bool parsed_stale;
- int parsed_algorithm;
- int parsed_qop;
- } tests[] = {
- { // Check that a minimal challenge works correctly.
- "Digest nonce=\"xyz\", realm=\"Thunder Bluff\"",
- true,
- "Thunder Bluff",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // Realm does not need to be quoted, even though RFC2617 requires it.
- "Digest nonce=\"xyz\", realm=ThunderBluff",
- true,
- "ThunderBluff",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // We allow the realm to be omitted, and will default it to empty string.
- // See http://crbug.com/20984.
- "Digest nonce=\"xyz\"",
- true,
- "",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // Try with realm set to empty string.
- "Digest realm=\"\", nonce=\"xyz\"",
- true,
- "",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- // Handle ISO-8859-1 character as part of the realm. The realm is converted
- // to UTF-8. However, the credentials will still use the original encoding.
- {
- "Digest nonce=\"xyz\", realm=\"foo-\xE5\"",
- true,
- "foo-\xC3\xA5",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED,
- },
-
- { // At a minimum, a nonce must be provided.
- "Digest realm=\"Thunder Bluff\"",
- false,
- "",
- "",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // The nonce does not need to be quoted, even though RFC2617
- // requires it.
- "Digest nonce=xyz, realm=\"Thunder Bluff\"",
- true,
- "Thunder Bluff",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // Unknown authentication parameters are ignored.
- "Digest nonce=\"xyz\", realm=\"Thunder Bluff\", foo=\"bar\"",
- true,
- "Thunder Bluff",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // Check that when algorithm has an unsupported value, parsing fails.
- "Digest nonce=\"xyz\", algorithm=\"awezum\", realm=\"Thunder\"",
- false,
- // The remaining values don't matter (but some have been set already).
- "",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // Check that algorithm's value is case insensitive, and that MD5 is
- // a supported algorithm.
- "Digest nonce=\"xyz\", algorithm=\"mD5\", realm=\"Oblivion\"",
- true,
- "Oblivion",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_MD5,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // Check that md5-sess is a supported algorithm.
- "Digest nonce=\"xyz\", algorithm=\"md5-sess\", realm=\"Oblivion\"",
- true,
- "Oblivion",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_MD5_SESS,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED,
- },
-
- { // Check that qop's value is case insensitive, and that auth is known.
- "Digest nonce=\"xyz\", realm=\"Oblivion\", qop=\"aUth\"",
- true,
- "Oblivion",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_AUTH
- },
-
- { // auth-int is not handled, but will fall back to default qop.
- "Digest nonce=\"xyz\", realm=\"Oblivion\", qop=\"auth-int\"",
- true,
- "Oblivion",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // Unknown qop values are ignored.
- "Digest nonce=\"xyz\", realm=\"Oblivion\", qop=\"auth,foo\"",
- true,
- "Oblivion",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_AUTH
- },
-
- { // If auth-int is included with auth, then use auth.
- "Digest nonce=\"xyz\", realm=\"Oblivion\", qop=\"auth,auth-int\"",
- true,
- "Oblivion",
- "xyz",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_AUTH
- },
-
- { // Opaque parameter parsing should work correctly.
- "Digest nonce=\"xyz\", realm=\"Thunder Bluff\", opaque=\"foobar\"",
- true,
- "Thunder Bluff",
- "xyz",
- "",
- "foobar",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // Opaque parameters do not need to be quoted, even though RFC2617
- // seems to require it.
- "Digest nonce=\"xyz\", realm=\"Thunder Bluff\", opaque=foobar",
- true,
- "Thunder Bluff",
- "xyz",
- "",
- "foobar",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // Domain can be parsed.
- "Digest nonce=\"xyz\", realm=\"Thunder Bluff\", "
- "domain=\"http://intranet.example.com/protection\"",
- true,
- "Thunder Bluff",
- "xyz",
- "http://intranet.example.com/protection",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // Multiple domains can be parsed.
- "Digest nonce=\"xyz\", realm=\"Thunder Bluff\", "
- "domain=\"http://intranet.example.com/protection http://www.google.com\"",
- true,
- "Thunder Bluff",
- "xyz",
- "http://intranet.example.com/protection http://www.google.com",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
-
- { // If a non-Digest scheme is somehow passed in, it should be rejected.
- "Basic realm=\"foo\"",
- false,
- "",
- "",
- "",
- "",
- false,
- HttpAuthHandlerDigest::ALGORITHM_UNSPECIFIED,
- HttpAuthHandlerDigest::QOP_UNSPECIFIED
- },
- };
-
- GURL origin("http://www.example.com");
- scoped_ptr<HttpAuthHandlerDigest::Factory> factory(
- new HttpAuthHandlerDigest::Factory());
- for (size_t i = 0; i < arraysize(tests); ++i) {
- scoped_ptr<HttpAuthHandler> handler;
- int rv = factory->CreateAuthHandlerFromString(tests[i].challenge,
- HttpAuth::AUTH_SERVER,
- origin,
- BoundNetLog(),
- &handler);
- if (tests[i].parsed_success) {
- EXPECT_EQ(OK, rv);
- } else {
- EXPECT_NE(OK, rv);
- EXPECT_TRUE(handler.get() == NULL);
- continue;
- }
- ASSERT_TRUE(handler.get() != NULL);
- HttpAuthHandlerDigest* digest =
- static_cast<HttpAuthHandlerDigest*>(handler.get());
- EXPECT_STREQ(tests[i].parsed_realm, digest->realm_.c_str());
- EXPECT_STREQ(tests[i].parsed_nonce, digest->nonce_.c_str());
- EXPECT_STREQ(tests[i].parsed_domain, digest->domain_.c_str());
- EXPECT_STREQ(tests[i].parsed_opaque, digest->opaque_.c_str());
- EXPECT_EQ(tests[i].parsed_stale, digest->stale_);
- EXPECT_EQ(tests[i].parsed_algorithm, digest->algorithm_);
- EXPECT_EQ(tests[i].parsed_qop, digest->qop_);
- EXPECT_TRUE(handler->encrypts_identity());
- EXPECT_FALSE(handler->is_connection_based());
- EXPECT_TRUE(handler->NeedsIdentity());
- EXPECT_FALSE(handler->AllowsDefaultCredentials());
- }
-}
-
-TEST(HttpAuthHandlerDigestTest, AssembleCredentials) {
- static const struct {
- const char* req_method;
- const char* req_path;
- const char* challenge;
- const char* username;
- const char* password;
- const char* cnonce;
- int nonce_count;
- const char* expected_creds;
- } tests[] = {
- { // MD5 with username/password
- "GET",
- "/test/drealm1",
-
- // Challenge
- "Digest realm=\"DRealm1\", "
- "nonce=\"claGgoRXBAA=7583377687842fdb7b56ba0555d175baa0b800e3\", "
- "algorithm=MD5, qop=\"auth\"",
-
- "foo", "bar", // username/password
- "082c875dcb2ca740", // cnonce
- 1, // nc
-
- // Authorization
- "Digest username=\"foo\", realm=\"DRealm1\", "
- "nonce=\"claGgoRXBAA=7583377687842fdb7b56ba0555d175baa0b800e3\", "
- "uri=\"/test/drealm1\", algorithm=MD5, "
- "response=\"bcfaa62f1186a31ff1b474a19a17cf57\", "
- "qop=auth, nc=00000001, cnonce=\"082c875dcb2ca740\""
- },
-
- { // MD5 with username but empty password. username has space in it.
- "GET",
- "/test/drealm1/",
-
- // Challenge
- "Digest realm=\"DRealm1\", "
- "nonce=\"Ure30oRXBAA=7eca98bbf521ac6642820b11b86bd2d9ed7edc70\", "
- "algorithm=MD5, qop=\"auth\"",
-
- "foo bar", "", // Username/password
- "082c875dcb2ca740", // cnonce
- 1, // nc
-
- // Authorization
- "Digest username=\"foo bar\", realm=\"DRealm1\", "
- "nonce=\"Ure30oRXBAA=7eca98bbf521ac6642820b11b86bd2d9ed7edc70\", "
- "uri=\"/test/drealm1/\", algorithm=MD5, "
- "response=\"93c9c6d5930af3b0eb26c745e02b04a0\", "
- "qop=auth, nc=00000001, cnonce=\"082c875dcb2ca740\""
- },
-
- { // MD5 with no username.
- "GET",
- "/test/drealm1/",
-
- // Challenge
- "Digest realm=\"DRealm1\", "
- "nonce=\"7thGplhaBAA=41fb92453c49799cf353c8cd0aabee02d61a98a8\", "
- "algorithm=MD5, qop=\"auth\"",
-
- "", "pass", // Username/password
- "6509bc74daed8263", // cnonce
- 1, // nc
-
- // Authorization
- "Digest username=\"\", realm=\"DRealm1\", "
- "nonce=\"7thGplhaBAA=41fb92453c49799cf353c8cd0aabee02d61a98a8\", "
- "uri=\"/test/drealm1/\", algorithm=MD5, "
- "response=\"bc597110f41a62d07f8b70b6977fcb61\", "
- "qop=auth, nc=00000001, cnonce=\"6509bc74daed8263\""
- },
-
- { // MD5 with no username and no password.
- "GET",
- "/test/drealm1/",
-
- // Challenge
- "Digest realm=\"DRealm1\", "
- "nonce=\"s3MzvFhaBAA=4c520af5acd9d8d7ae26947529d18c8eae1e98f4\", "
- "algorithm=MD5, qop=\"auth\"",
-
- "", "", // Username/password
- "1522e61005789929", // cnonce
- 1, // nc
-
- // Authorization
- "Digest username=\"\", realm=\"DRealm1\", "
- "nonce=\"s3MzvFhaBAA=4c520af5acd9d8d7ae26947529d18c8eae1e98f4\", "
- "uri=\"/test/drealm1/\", algorithm=MD5, "
- "response=\"22cfa2b30cb500a9591c6d55ec5590a8\", "
- "qop=auth, nc=00000001, cnonce=\"1522e61005789929\""
- },
-
- { // No algorithm, and no qop.
- "GET",
- "/",
-
- // Challenge
- "Digest realm=\"Oblivion\", nonce=\"nonce-value\"",
-
- "FooBar", "pass", // Username/password
- "", // cnonce
- 1, // nc
-
- // Authorization
- "Digest username=\"FooBar\", realm=\"Oblivion\", "
- "nonce=\"nonce-value\", uri=\"/\", "
- "response=\"f72ff54ebde2f928860f806ec04acd1b\""
- },
-
- { // MD5-sess
- "GET",
- "/",
-
- // Challenge
- "Digest realm=\"Baztastic\", nonce=\"AAAAAAAA\", "
- "algorithm=\"md5-sess\", qop=auth",
-
- "USER", "123", // Username/password
- "15c07961ed8575c4", // cnonce
- 1, // nc
-
- // Authorization
- "Digest username=\"USER\", realm=\"Baztastic\", "
- "nonce=\"AAAAAAAA\", uri=\"/\", algorithm=MD5-sess, "
- "response=\"cbc1139821ee7192069580570c541a03\", "
- "qop=auth, nc=00000001, cnonce=\"15c07961ed8575c4\""
- }
- };
- GURL origin("http://www.example.com");
- scoped_ptr<HttpAuthHandlerDigest::Factory> factory(
- new HttpAuthHandlerDigest::Factory());
- for (size_t i = 0; i < arraysize(tests); ++i) {
- scoped_ptr<HttpAuthHandler> handler;
- int rv = factory->CreateAuthHandlerFromString(tests[i].challenge,
- HttpAuth::AUTH_SERVER,
- origin,
- BoundNetLog(),
- &handler);
- EXPECT_EQ(OK, rv);
- ASSERT_TRUE(handler != NULL);
-
- HttpAuthHandlerDigest* digest =
- static_cast<HttpAuthHandlerDigest*>(handler.get());
- std::string creds =
- digest->AssembleCredentials(tests[i].req_method,
- tests[i].req_path,
- AuthCredentials(
- base::ASCIIToUTF16(tests[i].username),
- base::ASCIIToUTF16(tests[i].password)),
- tests[i].cnonce,
- tests[i].nonce_count);
-
- EXPECT_STREQ(tests[i].expected_creds, creds.c_str());
- }
-}
-
-TEST(HttpAuthHandlerDigest, HandleAnotherChallenge) {
- scoped_ptr<HttpAuthHandlerDigest::Factory> factory(
- new HttpAuthHandlerDigest::Factory());
- scoped_ptr<HttpAuthHandler> handler;
- std::string default_challenge =
- "Digest realm=\"Oblivion\", nonce=\"nonce-value\"";
- GURL origin("intranet.google.com");
- int rv = factory->CreateAuthHandlerFromString(
- default_challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(),
- &handler);
- EXPECT_EQ(OK, rv);
- ASSERT_TRUE(handler.get() != NULL);
- HttpAuthChallengeTokenizer tok_default(default_challenge.begin(),
- default_challenge.end());
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_REJECT,
- handler->HandleAnotherChallenge(&tok_default));
-
- std::string stale_challenge = default_challenge + ", stale=true";
- HttpAuthChallengeTokenizer tok_stale(stale_challenge.begin(),
- stale_challenge.end());
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_STALE,
- handler->HandleAnotherChallenge(&tok_stale));
-
- std::string stale_false_challenge = default_challenge + ", stale=false";
- HttpAuthChallengeTokenizer tok_stale_false(stale_false_challenge.begin(),
- stale_false_challenge.end());
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_REJECT,
- handler->HandleAnotherChallenge(&tok_stale_false));
-
- std::string realm_change_challenge =
- "Digest realm=\"SomethingElse\", nonce=\"nonce-value2\"";
- HttpAuthChallengeTokenizer tok_realm_change(realm_change_challenge.begin(),
- realm_change_challenge.end());
- EXPECT_EQ(HttpAuth::AUTHORIZATION_RESULT_DIFFERENT_REALM,
- handler->HandleAnotherChallenge(&tok_realm_change));
-}
-
-TEST(HttpAuthHandlerDigest, RespondToServerChallenge) {
- std::string auth_token;
- EXPECT_TRUE(RespondToChallenge(
- HttpAuth::AUTH_SERVER,
- std::string(),
- "http://www.example.com/path/to/resource",
- kSimpleChallenge,
- &auth_token));
- EXPECT_EQ("Digest username=\"foo\", realm=\"Oblivion\", "
- "nonce=\"nonce-value\", uri=\"/path/to/resource\", "
- "response=\"6779f90bd0d658f937c1af967614fe84\"",
- auth_token);
-}
-
-TEST(HttpAuthHandlerDigest, RespondToHttpsServerChallenge) {
- std::string auth_token;
- EXPECT_TRUE(RespondToChallenge(
- HttpAuth::AUTH_SERVER,
- std::string(),
- "https://www.example.com/path/to/resource",
- kSimpleChallenge,
- &auth_token));
- EXPECT_EQ("Digest username=\"foo\", realm=\"Oblivion\", "
- "nonce=\"nonce-value\", uri=\"/path/to/resource\", "
- "response=\"6779f90bd0d658f937c1af967614fe84\"",
- auth_token);
-}
-
-TEST(HttpAuthHandlerDigest, RespondToProxyChallenge) {
- std::string auth_token;
- EXPECT_TRUE(RespondToChallenge(
- HttpAuth::AUTH_PROXY,
- "http://proxy.intranet.corp.com:3128",
- "http://www.example.com/path/to/resource",
- kSimpleChallenge,
- &auth_token));
- EXPECT_EQ("Digest username=\"foo\", realm=\"Oblivion\", "
- "nonce=\"nonce-value\", uri=\"/path/to/resource\", "
- "response=\"6779f90bd0d658f937c1af967614fe84\"",
- auth_token);
-}
-
-TEST(HttpAuthHandlerDigest, RespondToProxyChallengeHttps) {
- std::string auth_token;
- EXPECT_TRUE(RespondToChallenge(
- HttpAuth::AUTH_PROXY,
- "http://proxy.intranet.corp.com:3128",
- "https://www.example.com/path/to/resource",
- kSimpleChallenge,
- &auth_token));
- EXPECT_EQ("Digest username=\"foo\", realm=\"Oblivion\", "
- "nonce=\"nonce-value\", uri=\"www.example.com:443\", "
- "response=\"3270da8467afbe9ddf2334a48d46e9b9\"",
- auth_token);
-}
-
-TEST(HttpAuthHandlerDigest, RespondToProxyChallengeWs) {
- std::string auth_token;
- EXPECT_TRUE(RespondToChallenge(
- HttpAuth::AUTH_PROXY,
- "http://proxy.intranet.corp.com:3128",
- "ws://www.example.com/echo",
- kSimpleChallenge,
- &auth_token));
- EXPECT_EQ("Digest username=\"foo\", realm=\"Oblivion\", "
- "nonce=\"nonce-value\", uri=\"www.example.com:80\", "
- "response=\"aa1df184f68d5b6ab9d9aa4f88e41b4c\"",
- auth_token);
-}
-
-TEST(HttpAuthHandlerDigest, RespondToProxyChallengeWss) {
- std::string auth_token;
- EXPECT_TRUE(RespondToChallenge(
- HttpAuth::AUTH_PROXY,
- "http://proxy.intranet.corp.com:3128",
- "wss://www.example.com/echo",
- kSimpleChallenge,
- &auth_token));
- EXPECT_EQ("Digest username=\"foo\", realm=\"Oblivion\", "
- "nonce=\"nonce-value\", uri=\"www.example.com:443\", "
- "response=\"3270da8467afbe9ddf2334a48d46e9b9\"",
- auth_token);
-}
-
-TEST(HttpAuthHandlerDigest, RespondToChallengeAuthQop) {
- std::string auth_token;
- EXPECT_TRUE(RespondToChallenge(
- HttpAuth::AUTH_SERVER,
- std::string(),
- "http://www.example.com/path/to/resource",
- "Digest realm=\"Oblivion\", nonce=\"nonce-value\", qop=\"auth\"",
- &auth_token));
- EXPECT_EQ("Digest username=\"foo\", realm=\"Oblivion\", "
- "nonce=\"nonce-value\", uri=\"/path/to/resource\", "
- "response=\"5b1459beda5cee30d6ff9e970a69c0ea\", "
- "qop=auth, nc=00000001, cnonce=\"client_nonce\"",
- auth_token);
-}
-
-TEST(HttpAuthHandlerDigest, RespondToChallengeOpaque) {
- std::string auth_token;
- EXPECT_TRUE(RespondToChallenge(
- HttpAuth::AUTH_SERVER,
- std::string(),
- "http://www.example.com/path/to/resource",
- "Digest realm=\"Oblivion\", nonce=\"nonce-value\", "
- "qop=\"auth\", opaque=\"opaque text\"",
- &auth_token));
- EXPECT_EQ("Digest username=\"foo\", realm=\"Oblivion\", "
- "nonce=\"nonce-value\", uri=\"/path/to/resource\", "
- "response=\"5b1459beda5cee30d6ff9e970a69c0ea\", "
- "opaque=\"opaque text\", "
- "qop=auth, nc=00000001, cnonce=\"client_nonce\"",
- auth_token);
-}
-
-
-} // namespace net
« no previous file with comments | « net/http/http_auth_handler_digest.cc ('k') | net/http/http_auth_handler_factory.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698