blob: 87cd7ff3205ad0f94555529ae82c08ee9a9bab44 [file] [log] [blame]
/*
* Copyright (C) 2007 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE COMPUTER, INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "Credential.h"
namespace WebCore {
// Need to enforce empty, non-null strings due to the pickiness of the String == String operator
// combined with the semantics of the String(NSString*) constructor
Credential::Credential()
: m_user("")
, m_password("")
, m_persistence(CredentialPersistenceNone)
#if CERTIFICATE_CREDENTIALS_SUPPORTED
, m_type(CredentialTypePassword)
#endif
{
}
// Need to enforce empty, non-null strings due to the pickiness of the String == String operator
// combined with the semantics of the String(NSString*) constructor
Credential::Credential(const String& user, const String& password, CredentialPersistence persistence)
: m_user(user.length() ? user : "")
, m_password(password.length() ? password : "")
, m_persistence(persistence)
#if CERTIFICATE_CREDENTIALS_SUPPORTED
, m_type(CredentialTypePassword)
#endif
{
}
Credential::Credential(const Credential& original, CredentialPersistence persistence)
: m_user(original.user())
, m_password(original.password())
, m_persistence(persistence)
#if CERTIFICATE_CREDENTIALS_SUPPORTED
, m_identity(original.identity())
, m_certificates(original.certificates())
, m_type(original.type())
#endif
{
}
bool Credential::isEmpty() const
{
#if CERTIFICATE_CREDENTIALS_SUPPORTED
if (m_type == CredentialTypeClientCertificate && (m_identity || m_certificates))
return false;
#endif
return m_user.isEmpty() && m_password.isEmpty();
}
const String& Credential::user() const
{
return m_user;
}
const String& Credential::password() const
{
return m_password;
}
bool Credential::hasPassword() const
{
return !m_password.isEmpty();
}
CredentialPersistence Credential::persistence() const
{
return m_persistence;
}
#if CERTIFICATE_CREDENTIALS_SUPPORTED
Credential::Credential(SecIdentityRef identity, CFArrayRef certificates, CredentialPersistence persistence)
: m_user("")
, m_password("")
, m_persistence(persistence)
, m_identity(identity)
, m_certificates(certificates)
, m_type(CredentialTypeClientCertificate)
{
}
SecIdentityRef Credential::identity() const
{
return m_identity.get();
}
CFArrayRef Credential::certificates() const
{
return m_certificates.get();
}
const CredentialType Credential::type() const
{
return m_type;
}
#endif
bool operator==(const Credential& a, const Credential& b)
{
// Check persistence first since all credential types
// have the persistence property.
if (a.persistence() != b.persistence())
return false;
#if CERTIFICATE_CREDENTIALS_SUPPORTED
CredentialType aType = a.type();
if (aType != b.type())
return false;
// Comparing identity and certificate chain pointers is valid only
// for client certificate type credentials.
//
// FIXME: Is pointer comparison of the identity and certificates properties sufficient?
if (aType == CredentialTypeClientCertificate) {
if (a.identity() != b.identity())
return false;
if (a.certificates() != b.certificates())
return false;
// We only need to check identity and certificates to compare
// client certificate based credentials.
return true;
}
ASSERT(a.type() == CredentialTypePassword && b.type() == CredentialTypePassword);
#endif
if (a.user() != b.user())
return false;
if (a.password() != b.password())
return false;
return true;
}
}