Roll src/third_party/WebKit d9c6159:8139f33 (svn 201974:201975)
[chromium-blink-merge.git] / net / http / http_auth_handler_ntlm_win.cc
blobf471ea97206d1d54c6e356333b25b1b933d60d7e
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 // See "SSPI Sample Application" at
6 // http://msdn.microsoft.com/en-us/library/aa918273.aspx
7 // and "NTLM Security Support Provider" at
8 // http://msdn.microsoft.com/en-us/library/aa923611.aspx.
10 #include "net/http/http_auth_handler_ntlm.h"
12 #include "base/strings/string_util.h"
13 #include "net/base/net_errors.h"
14 #include "net/base/net_util.h"
15 #include "net/http/http_auth_sspi_win.h"
16 #include "net/http/url_security_manager.h"
18 #pragma comment(lib, "secur32.lib")
20 namespace net {
22 HttpAuthHandlerNTLM::HttpAuthHandlerNTLM(
23 SSPILibrary* sspi_library, ULONG max_token_length,
24 URLSecurityManager* url_security_manager)
25 : auth_sspi_(sspi_library, "NTLM", NTLMSP_NAME, max_token_length),
26 url_security_manager_(url_security_manager) {
29 HttpAuthHandlerNTLM::~HttpAuthHandlerNTLM() {
32 // Require identity on first pass instead of second.
33 bool HttpAuthHandlerNTLM::NeedsIdentity() {
34 return auth_sspi_.NeedsIdentity();
37 bool HttpAuthHandlerNTLM::AllowsDefaultCredentials() {
38 if (target_ == HttpAuth::AUTH_PROXY)
39 return true;
40 if (!url_security_manager_)
41 return false;
42 return url_security_manager_->CanUseDefaultCredentials(origin_);
45 HttpAuthHandlerNTLM::Factory::Factory()
46 : max_token_length_(0),
47 is_unsupported_(false) {
50 HttpAuthHandlerNTLM::Factory::~Factory() {
53 int HttpAuthHandlerNTLM::Factory::CreateAuthHandler(
54 HttpAuthChallengeTokenizer* challenge,
55 HttpAuth::Target target,
56 const GURL& origin,
57 CreateReason reason,
58 int digest_nonce_count,
59 const BoundNetLog& net_log,
60 scoped_ptr<HttpAuthHandler>* handler) {
61 if (is_unsupported_ || reason == CREATE_PREEMPTIVE)
62 return ERR_UNSUPPORTED_AUTH_SCHEME;
63 if (max_token_length_ == 0) {
64 int rv = DetermineMaxTokenLength(sspi_library_.get(), NTLMSP_NAME,
65 &max_token_length_);
66 if (rv == ERR_UNSUPPORTED_AUTH_SCHEME)
67 is_unsupported_ = true;
68 if (rv != OK)
69 return rv;
71 // TODO(cbentzel): Move towards model of parsing in the factory
72 // method and only constructing when valid.
73 scoped_ptr<HttpAuthHandler> tmp_handler(
74 new HttpAuthHandlerNTLM(sspi_library_.get(), max_token_length_,
75 url_security_manager()));
76 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
77 return ERR_INVALID_RESPONSE;
78 handler->swap(tmp_handler);
79 return OK;
82 } // namespace net