1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef NET_HTTP_HTTP_AUTH_HANDLER_H_
6 #define NET_HTTP_HTTP_AUTH_HANDLER_H_
10 #include "net/base/completion_callback.h"
11 #include "net/base/net_export.h"
12 #include "net/http/http_auth.h"
13 #include "net/log/net_log.h"
17 class HttpAuthChallengeTokenizer
;
18 struct HttpRequestInfo
;
20 // HttpAuthHandler is the interface for the authentication schemes
21 // (basic, digest, NTLM, Negotiate).
22 // HttpAuthHandler objects are typically created by an HttpAuthHandlerFactory.
23 class NET_EXPORT_PRIVATE HttpAuthHandler
{
26 virtual ~HttpAuthHandler();
28 // Initializes the handler using a challenge issued by a server.
29 // |challenge| must be non-NULL and have already tokenized the
30 // authentication scheme, but none of the tokens occurring after the
31 // authentication scheme. |target| and |origin| are both stored
32 // for later use, and are not part of the initial challenge.
33 bool InitFromChallenge(HttpAuthChallengeTokenizer
* challenge
,
34 HttpAuth::Target target
,
36 const BoundNetLog
& net_log
);
38 // Determines how the previous authorization attempt was received.
40 // This is called when the server/proxy responds with a 401/407 after an
41 // earlier authorization attempt. Although this normally means that the
42 // previous attempt was rejected, in multi-round schemes such as
43 // NTLM+Negotiate it may indicate that another round of challenge+response
44 // is required. For Digest authentication it may also mean that the previous
45 // attempt used a stale nonce (and nonce-count) and that a new attempt should
46 // be made with a different nonce provided in the challenge.
48 // |challenge| must be non-NULL and have already tokenized the
49 // authentication scheme, but none of the tokens occurring after the
50 // authentication scheme.
51 virtual HttpAuth::AuthorizationResult
HandleAnotherChallenge(
52 HttpAuthChallengeTokenizer
* challenge
) = 0;
54 // Generates an authentication token, potentially asynchronously.
56 // When |credentials| is NULL, the default credentials for the currently
57 // logged in user are used. |AllowsDefaultCredentials()| MUST be true in this
60 // |request|, |callback|, and |auth_token| must be non-NULL.
62 // The return value is a net error code.
64 // If |OK| is returned, |*auth_token| is filled in with an authentication
65 // token which can be inserted in the HTTP request.
67 // If |ERR_IO_PENDING| is returned, |*auth_token| will be filled in
68 // asynchronously and |callback| will be invoked. The lifetime of
69 // |request|, |callback|, and |auth_token| must last until |callback| is
70 // invoked, but |credentials| is only used during the initial call.
72 // All other return codes indicate that there was a problem generating a
73 // token, and the value of |*auth_token| is unspecified.
74 int GenerateAuthToken(const AuthCredentials
* credentials
,
75 const HttpRequestInfo
* request
,
76 const CompletionCallback
& callback
,
77 std::string
* auth_token
);
79 // The authentication scheme as an enumerated value.
80 HttpAuth::Scheme
auth_scheme() const {
84 // The realm, encoded as UTF-8. This may be empty.
85 const std::string
& realm() const {
89 // The challenge which was issued when creating the handler.
90 const std::string
challenge() const {
91 return auth_challenge_
;
94 // Numeric rank based on the challenge's security level. Higher
95 // numbers are better. Used by HttpAuth::ChooseBestChallenge().
100 HttpAuth::Target
target() const {
104 // Returns the proxy or server which issued the authentication challenge
105 // that this HttpAuthHandler is handling. The URL includes scheme, host, and
106 // port, but does not include path.
107 const GURL
& origin() const {
111 // Returns true if the authentication scheme does not send the username and
112 // password in the clear.
113 bool encrypts_identity() const {
114 return (properties_
& ENCRYPTS_IDENTITY
) != 0;
117 // Returns true if the authentication scheme is connection-based, for
118 // example, NTLM. A connection-based authentication scheme does not support
119 // preemptive authentication, and must use the same handler object
120 // throughout the life of an HTTP transaction.
121 bool is_connection_based() const {
122 return (properties_
& IS_CONNECTION_BASED
) != 0;
125 // Returns true if the response to the current authentication challenge
126 // requires an identity.
127 // TODO(wtc): Find a better way to handle a multi-round challenge-response
128 // sequence used by a connection-based authentication scheme.
129 virtual bool NeedsIdentity();
131 // Returns whether the default credentials may be used for the |origin| passed
132 // into |InitFromChallenge|. If true, the user does not need to be prompted
133 // for username and password to establish credentials.
134 // NOTE: SSO is a potential security risk.
135 // TODO(cbentzel): Add a pointer to Firefox documentation about risk.
136 virtual bool AllowsDefaultCredentials();
138 // Returns whether explicit credentials can be used with this handler. If
139 // true the user may be prompted for credentials if an implicit identity
140 // cannot be determined.
141 virtual bool AllowsExplicitCredentials();
145 ENCRYPTS_IDENTITY
= 1 << 0,
146 IS_CONNECTION_BASED
= 1 << 1,
149 // Initializes the handler using a challenge issued by a server.
150 // |challenge| must be non-NULL and have already tokenized the
151 // authentication scheme, but none of the tokens occurring after the
152 // authentication scheme.
153 // Implementations are expected to initialize the following members:
154 // scheme_, realm_, score_, properties_
155 virtual bool Init(HttpAuthChallengeTokenizer
* challenge
) = 0;
157 // |GenerateAuthTokenImpl()} is the auth-scheme specific implementation
158 // of generating the next auth token. Callers should use |GenerateAuthToken()|
159 // which will in turn call |GenerateAuthTokenImpl()|
160 virtual int GenerateAuthTokenImpl(const AuthCredentials
* credentials
,
161 const HttpRequestInfo
* request
,
162 const CompletionCallback
& callback
,
163 std::string
* auth_token
) = 0;
165 // The auth-scheme as an enumerated value.
166 HttpAuth::Scheme auth_scheme_
;
168 // The realm, encoded as UTF-8. Used by "basic" and "digest".
171 // The auth challenge.
172 std::string auth_challenge_
;
174 // The {scheme, host, port} for the authentication target. Used by "ntlm"
175 // and "negotiate" to construct the service principal name.
178 // The score for this challenge. Higher numbers are better.
181 // Whether this authentication request is for a proxy server, or an
183 HttpAuth::Target target_
;
185 // A bitmask of the properties of the authentication scheme.
188 BoundNetLog net_log_
;
191 void OnGenerateAuthTokenComplete(int rv
);
192 void FinishGenerateAuthToken();
194 CompletionCallback callback_
;
199 #endif // NET_HTTP_HTTP_AUTH_HANDLER_H_