/* | |
* Copyright (C) 2007 Apple Inc. All rights reserved. | |
* | |
* Redistribution and use in source and binary forms, with or without | |
* modification, are permitted provided that the following conditions | |
* are met: | |
* 1. Redistributions of source code must retain the above copyright | |
* notice, this list of conditions and the following disclaimer. | |
* 2. Redistributions in binary form must reproduce the above copyright | |
* notice, this list of conditions and the following disclaimer in the | |
* documentation and/or other materials provided with the distribution. | |
* | |
* THIS SOFTWARE IS PROVIDED BY APPLE COMPUTER, INC. ``AS IS'' AND ANY | |
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | |
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR | |
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, | |
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, | |
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR | |
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY | |
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | |
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | |
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
*/ | |
#include "config.h" | |
#include "Credential.h" | |
namespace WebCore { | |
// Need to enforce empty, non-null strings due to the pickiness of the String == String operator | |
// combined with the semantics of the String(NSString*) constructor | |
Credential::Credential() | |
: m_user("") | |
, m_password("") | |
, m_persistence(CredentialPersistenceNone) | |
#if CERTIFICATE_CREDENTIALS_SUPPORTED | |
, m_type(CredentialTypePassword) | |
#endif | |
{ | |
} | |
// Need to enforce empty, non-null strings due to the pickiness of the String == String operator | |
// combined with the semantics of the String(NSString*) constructor | |
Credential::Credential(const String& user, const String& password, CredentialPersistence persistence) | |
: m_user(user.length() ? user : "") | |
, m_password(password.length() ? password : "") | |
, m_persistence(persistence) | |
#if CERTIFICATE_CREDENTIALS_SUPPORTED | |
, m_type(CredentialTypePassword) | |
#endif | |
{ | |
} | |
Credential::Credential(const Credential& original, CredentialPersistence persistence) | |
: m_user(original.user()) | |
, m_password(original.password()) | |
, m_persistence(persistence) | |
#if CERTIFICATE_CREDENTIALS_SUPPORTED | |
, m_identity(original.identity()) | |
, m_certificates(original.certificates()) | |
, m_type(original.type()) | |
#endif | |
{ | |
} | |
bool Credential::isEmpty() const | |
{ | |
#if CERTIFICATE_CREDENTIALS_SUPPORTED | |
if (m_type == CredentialTypeClientCertificate && (m_identity || m_certificates)) | |
return false; | |
#endif | |
return m_user.isEmpty() && m_password.isEmpty(); | |
} | |
const String& Credential::user() const | |
{ | |
return m_user; | |
} | |
const String& Credential::password() const | |
{ | |
return m_password; | |
} | |
bool Credential::hasPassword() const | |
{ | |
return !m_password.isEmpty(); | |
} | |
CredentialPersistence Credential::persistence() const | |
{ | |
return m_persistence; | |
} | |
#if CERTIFICATE_CREDENTIALS_SUPPORTED | |
Credential::Credential(SecIdentityRef identity, CFArrayRef certificates, CredentialPersistence persistence) | |
: m_user("") | |
, m_password("") | |
, m_persistence(persistence) | |
, m_identity(identity) | |
, m_certificates(certificates) | |
, m_type(CredentialTypeClientCertificate) | |
{ | |
} | |
SecIdentityRef Credential::identity() const | |
{ | |
return m_identity.get(); | |
} | |
CFArrayRef Credential::certificates() const | |
{ | |
return m_certificates.get(); | |
} | |
const CredentialType Credential::type() const | |
{ | |
return m_type; | |
} | |
#endif | |
bool operator==(const Credential& a, const Credential& b) | |
{ | |
// Check persistence first since all credential types | |
// have the persistence property. | |
if (a.persistence() != b.persistence()) | |
return false; | |
#if CERTIFICATE_CREDENTIALS_SUPPORTED | |
CredentialType aType = a.type(); | |
if (aType != b.type()) | |
return false; | |
// Comparing identity and certificate chain pointers is valid only | |
// for client certificate type credentials. | |
// | |
// FIXME: Is pointer comparison of the identity and certificates properties sufficient? | |
if (aType == CredentialTypeClientCertificate) { | |
if (a.identity() != b.identity()) | |
return false; | |
if (a.certificates() != b.certificates()) | |
return false; | |
// We only need to check identity and certificates to compare | |
// client certificate based credentials. | |
return true; | |
} | |
ASSERT(a.type() == CredentialTypePassword && b.type() == CredentialTypePassword); | |
#endif | |
if (a.user() != b.user()) | |
return false; | |
if (a.password() != b.password()) | |
return false; | |
return true; | |
} | |
} | |