Roll src/third_party/WebKit 90b25ae:5baf25d (svn 200622:200623)
[chromium-blink-merge.git] / net / http / http_auth_handler_basic.cc
blob27b892bb016b2670266a0c7c6ce40fd1e95cb41a
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/http/http_auth_handler_basic.h"
7 #include <string>
9 #include "base/base64.h"
10 #include "base/strings/string_util.h"
11 #include "base/strings/utf_string_conversions.h"
12 #include "net/base/net_errors.h"
13 #include "net/base/net_string_util.h"
14 #include "net/http/http_auth.h"
15 #include "net/http/http_auth_challenge_tokenizer.h"
17 namespace net {
19 namespace {
21 // Parses a realm from an auth challenge, and converts to UTF8-encoding.
22 // Returns whether the realm is invalid or the parameters are invalid.
24 // Note that if a realm was not specified, we will default it to "";
25 // so specifying 'Basic realm=""' is equivalent to 'Basic'.
27 // This is more generous than RFC 2617, which is pretty clear in the
28 // production of challenge that realm is required.
30 // We allow it to be compatibility with certain embedded webservers that don't
31 // include a realm (see http://crbug.com/20984.)
33 // The over-the-wire realm is encoded as ISO-8859-1 (aka Latin-1).
35 // TODO(cbentzel): Realm may need to be decoded using RFC 2047 rules as
36 // well, see http://crbug.com/25790.
37 bool ParseRealm(const HttpAuthChallengeTokenizer& tokenizer,
38 std::string* realm) {
39 CHECK(realm);
40 realm->clear();
41 HttpUtil::NameValuePairsIterator parameters = tokenizer.param_pairs();
42 while (parameters.GetNext()) {
43 if (!base::LowerCaseEqualsASCII(parameters.name(), "realm"))
44 continue;
46 if (!ConvertToUtf8AndNormalize(parameters.value(), kCharsetLatin1, realm)) {
47 return false;
50 return parameters.valid();
53 } // namespace
55 bool HttpAuthHandlerBasic::Init(HttpAuthChallengeTokenizer* challenge) {
56 auth_scheme_ = HttpAuth::AUTH_SCHEME_BASIC;
57 score_ = 1;
58 properties_ = 0;
59 return ParseChallenge(challenge);
62 bool HttpAuthHandlerBasic::ParseChallenge(
63 HttpAuthChallengeTokenizer* challenge) {
64 // Verify the challenge's auth-scheme.
65 if (!base::LowerCaseEqualsASCII(challenge->scheme(), "basic"))
66 return false;
68 std::string realm;
69 if (!ParseRealm(*challenge, &realm))
70 return false;
72 realm_ = realm;
73 return true;
76 HttpAuth::AuthorizationResult HttpAuthHandlerBasic::HandleAnotherChallenge(
77 HttpAuthChallengeTokenizer* challenge) {
78 // Basic authentication is always a single round, so any responses
79 // should be treated as a rejection. However, if the new challenge
80 // is for a different realm, then indicate the realm change.
81 std::string realm;
82 if (!ParseRealm(*challenge, &realm))
83 return HttpAuth::AUTHORIZATION_RESULT_INVALID;
84 return (realm_ != realm)?
85 HttpAuth::AUTHORIZATION_RESULT_DIFFERENT_REALM:
86 HttpAuth::AUTHORIZATION_RESULT_REJECT;
89 int HttpAuthHandlerBasic::GenerateAuthTokenImpl(
90 const AuthCredentials* credentials, const HttpRequestInfo*,
91 const CompletionCallback&, std::string* auth_token) {
92 DCHECK(credentials);
93 // TODO(eroman): is this the right encoding of username/password?
94 std::string base64_username_password;
95 base::Base64Encode(base::UTF16ToUTF8(credentials->username()) + ":" +
96 base::UTF16ToUTF8(credentials->password()),
97 &base64_username_password);
98 *auth_token = "Basic " + base64_username_password;
99 return OK;
102 HttpAuthHandlerBasic::Factory::Factory() {
105 HttpAuthHandlerBasic::Factory::~Factory() {
108 int HttpAuthHandlerBasic::Factory::CreateAuthHandler(
109 HttpAuthChallengeTokenizer* challenge,
110 HttpAuth::Target target,
111 const GURL& origin,
112 CreateReason reason,
113 int digest_nonce_count,
114 const BoundNetLog& net_log,
115 scoped_ptr<HttpAuthHandler>* handler) {
116 // TODO(cbentzel): Move towards model of parsing in the factory
117 // method and only constructing when valid.
118 scoped_ptr<HttpAuthHandler> tmp_handler(new HttpAuthHandlerBasic());
119 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
120 return ERR_INVALID_RESPONSE;
121 handler->swap(tmp_handler);
122 return OK;
125 } // namespace net