summaryrefslogtreecommitdiffabout
path: root/lib/verify_op.cc
authorMichael Krelin <hacker@klever.net>2008-02-03 16:17:47 (UTC)
committer Michael Krelin <hacker@klever.net>2008-02-03 16:17:47 (UTC)
commit434d42b37ecab09fc91ac8e6c752d3292c10a3b1 (patch) (side-by-side diff)
treeec069e72e22cc2861e681e912d6f9e3ef4a65a2b /lib/verify_op.cc
parent23a6d48436e24d3d145b742984ef68ec3bae2bfd (diff)
downloadlibopkele-434d42b37ecab09fc91ac8e6c752d3292c10a3b1.zip
libopkele-434d42b37ecab09fc91ac8e6c752d3292c10a3b1.tar.gz
libopkele-434d42b37ecab09fc91ac8e6c752d3292c10a3b1.tar.bz2
added verify_op that performs discovery on the relying party
Signed-off-by: Michael Krelin <hacker@klever.net>
Diffstat (limited to 'lib/verify_op.cc') (more/less context) (ignore whitespace changes)
-rw-r--r--lib/verify_op.cc53
1 files changed, 53 insertions, 0 deletions
diff --git a/lib/verify_op.cc b/lib/verify_op.cc
new file mode 100644
index 0000000..e7c26b5
--- a/dev/null
+++ b/lib/verify_op.cc
@@ -0,0 +1,53 @@
+#include <opkele/verify_op.h>
+#include <opkele/discovery.h>
+#include <opkele/exception.h>
+#include <opkele/util.h>
+#include <opkele/uris.h>
+
+namespace opkele {
+ using std::output_iterator_tag;
+
+ class __RP_verifier_good_input : public exception {
+ public:
+ __RP_verifier_good_input(OPKELE_E_PARS)
+ : exception(OPKELE_E_CONS) { }
+ };
+
+ class RP_verifier : public iterator<output_iterator_tag,openid_endpoint_t,void> {
+ public:
+ int seen;
+ const string& return_to;
+
+ RP_verifier(const string& rt)
+ : return_to(rt), seen(0) { }
+
+ RP_verifier& operator*() { return *this; }
+ RP_verifier& operator=(const openid_endpoint_t& oep) {
+ if(util::uri_matches_realm(return_to,oep.uri))
+ throw __RP_verifier_good_input(OPKELE_CP_ "Found matching realm");
+ return *this;
+ }
+
+ RP_verifier& operator++() { ++seen; return *this; }
+ RP_verifier& operator++(int) { +seen; return *this; }
+ };
+
+ void verify_op::verify_return_to() {
+ basic_op::verify_return_to();
+ try {
+ RP_verifier rpv(return_to);
+ string drealm = realm;
+ string::size_type csss = drealm.find("://*.");
+ if(csss==4 || csss==5)
+ drealm.replace(csss+3,1,"www");
+ const char *rtt[] = { STURI_OPENID20_RT, 0 };
+ yadiscover(rpv,drealm,rtt,false);
+ if(rpv.seen)
+ throw bad_return_to(OPKELE_CP_ "return_to URL doesn't match any found while doing discovery on RP");
+ }catch(__RP_verifier_good_input&) {
+ }catch(bad_return_to& brt) {
+ throw;
+ }catch(exception_network&) { }
+ }
+
+}