author | Michael Krelin <hacker@klever.net> | 2008-02-02 21:10:12 (UTC) |
---|---|---|
committer | Michael Krelin <hacker@klever.net> | 2008-02-02 21:10:12 (UTC) |
commit | 3658759966cbadb7b50457d446f3436b6f7987da (patch) (unidiff) | |
tree | b215da5b5212b60aa1ec965df28070b4bff587bc /lib | |
parent | a8f733c88d87abe422ecaa405df385bad562e60f (diff) | |
download | libopkele-3658759966cbadb7b50457d446f3436b6f7987da.zip libopkele-3658759966cbadb7b50457d446f3436b6f7987da.tar.gz libopkele-3658759966cbadb7b50457d446f3436b6f7987da.tar.bz2 |
moved uri matching into separate procedure
Signed-off-by: Michael Krelin <hacker@klever.net>
-rw-r--r-- | lib/basic_op.cc | 35 | ||||
-rw-r--r-- | lib/util.cc | 30 |
2 files changed, 33 insertions, 32 deletions
diff --git a/lib/basic_op.cc b/lib/basic_op.cc index f7573aa..11ffb48 100644 --- a/lib/basic_op.cc +++ b/lib/basic_op.cc | |||
@@ -1,62 +1,59 @@ | |||
1 | #include <time.h> | 1 | #include <time.h> |
2 | #include <cassert> | 2 | #include <cassert> |
3 | #include <algorithm> | ||
4 | #include <openssl/sha.h> | 3 | #include <openssl/sha.h> |
5 | #include <openssl/hmac.h> | 4 | #include <openssl/hmac.h> |
6 | #include <opkele/data.h> | 5 | #include <opkele/data.h> |
7 | #include <opkele/basic_op.h> | 6 | #include <opkele/basic_op.h> |
8 | #include <opkele/exception.h> | 7 | #include <opkele/exception.h> |
9 | #include <opkele/util.h> | 8 | #include <opkele/util.h> |
10 | #include <opkele/uris.h> | 9 | #include <opkele/uris.h> |
11 | 10 | ||
12 | namespace opkele { | 11 | namespace opkele { |
13 | using std::pair; | ||
14 | using std::mismatch; | ||
15 | 12 | ||
16 | void basic_op::reset_vars() { | 13 | void basic_op::reset_vars() { |
17 | assoc.reset(); | 14 | assoc.reset(); |
18 | return_to.clear(); realm.clear(); | 15 | return_to.clear(); realm.clear(); |
19 | claimed_id.clear(); identity.clear(); | 16 | claimed_id.clear(); identity.clear(); |
20 | invalidate_handle.clear(); | 17 | invalidate_handle.clear(); |
21 | } | 18 | } |
22 | 19 | ||
23 | bool basic_op::has_return_to() const { | 20 | bool basic_op::has_return_to() const { |
24 | return !return_to.empty(); | 21 | return !return_to.empty(); |
25 | } | 22 | } |
26 | const string& basic_op::get_return_to() const { | 23 | const string& basic_op::get_return_to() const { |
27 | if(return_to.empty()) | 24 | if(return_to.empty()) |
28 | throw no_return_to(OPKELE_CP_ "No return_to URL provided with request"); | 25 | throw no_return_to(OPKELE_CP_ "No return_to URL provided with request"); |
29 | return return_to; | 26 | return return_to; |
30 | } | 27 | } |
31 | 28 | ||
32 | const string& basic_op::get_realm() const { | 29 | const string& basic_op::get_realm() const { |
33 | assert(!realm.empty()); | 30 | assert(!realm.empty()); |
34 | return realm; | 31 | return realm; |
35 | } | 32 | } |
36 | 33 | ||
37 | bool basic_op::has_identity() const { | 34 | bool basic_op::has_identity() const { |
38 | return !identity.empty(); | 35 | return !identity.empty(); |
39 | } | 36 | } |
40 | const string& basic_op::get_claimed_id() const { | 37 | const string& basic_op::get_claimed_id() const { |
41 | if(claimed_id.empty()) | 38 | if(claimed_id.empty()) |
42 | throw non_identity(OPKELE_CP_ "attempting to retrieve claimed_id of non-identity related request"); | 39 | throw non_identity(OPKELE_CP_ "attempting to retrieve claimed_id of non-identity related request"); |
43 | assert(!identity.empty()); | 40 | assert(!identity.empty()); |
44 | return claimed_id; | 41 | return claimed_id; |
45 | } | 42 | } |
46 | const string& basic_op::get_identity() const { | 43 | const string& basic_op::get_identity() const { |
47 | if(identity.empty()) | 44 | if(identity.empty()) |
48 | throw non_identity(OPKELE_CP_ "attempting to retrieve identity of non-identity related request"); | 45 | throw non_identity(OPKELE_CP_ "attempting to retrieve identity of non-identity related request"); |
49 | assert(!claimed_id.empty()); | 46 | assert(!claimed_id.empty()); |
50 | return identity; | 47 | return identity; |
51 | } | 48 | } |
52 | 49 | ||
53 | bool basic_op::is_id_select() const { | 50 | bool basic_op::is_id_select() const { |
54 | return identity==IDURI_SELECT20; | 51 | return identity==IDURI_SELECT20; |
55 | } | 52 | } |
56 | 53 | ||
57 | void basic_op::select_identity(const string& c,const string& i) { | 54 | void basic_op::select_identity(const string& c,const string& i) { |
58 | claimed_id = c; identity = i; | 55 | claimed_id = c; identity = i; |
59 | } | 56 | } |
60 | void basic_op::set_claimed_id(const string& c) { | 57 | void basic_op::set_claimed_id(const string& c) { |
61 | claimed_id = c; | 58 | claimed_id = c; |
62 | } | 59 | } |
@@ -276,81 +273,55 @@ namespace opkele { | |||
276 | try { | 273 | try { |
277 | o2 = (inm.get_field("ns")==OIURI_OPENID20); | 274 | o2 = (inm.get_field("ns")==OIURI_OPENID20); |
278 | }catch(failed_lookup&) { o2 = false; } | 275 | }catch(failed_lookup&) { o2 = false; } |
279 | string nonce; | 276 | string nonce; |
280 | if(o2) { | 277 | if(o2) { |
281 | try { | 278 | try { |
282 | if(!check_nonce(nonce = inm.get_field("response_nonce"))) | 279 | if(!check_nonce(nonce = inm.get_field("response_nonce"))) |
283 | throw failed_check_authentication(OPKELE_CP_ "Invalid nonce"); | 280 | throw failed_check_authentication(OPKELE_CP_ "Invalid nonce"); |
284 | }catch(failed_lookup&) { | 281 | }catch(failed_lookup&) { |
285 | throw failed_check_authentication(OPKELE_CP_ "No nonce provided with check_authentication request"); | 282 | throw failed_check_authentication(OPKELE_CP_ "No nonce provided with check_authentication request"); |
286 | } | 283 | } |
287 | } | 284 | } |
288 | try { | 285 | try { |
289 | assoc = retrieve_assoc(inm.get_field("assoc_handle")); | 286 | assoc = retrieve_assoc(inm.get_field("assoc_handle")); |
290 | if(!assoc->stateless()) | 287 | if(!assoc->stateless()) |
291 | throw failed_check_authentication(OPKELE_CP_ "Will not do check_authentication on a stateful handle"); | 288 | throw failed_check_authentication(OPKELE_CP_ "Will not do check_authentication on a stateful handle"); |
292 | }catch(failed_lookup&) { | 289 | }catch(failed_lookup&) { |
293 | throw failed_check_authentication(OPKELE_CP_ "No assoc_handle or invalid assoc_handle specified with check_authentication request"); | 290 | throw failed_check_authentication(OPKELE_CP_ "No assoc_handle or invalid assoc_handle specified with check_authentication request"); |
294 | } | 291 | } |
295 | static const string idresmode = "id_res"; | 292 | static const string idresmode = "id_res"; |
296 | try { | 293 | try { |
297 | if(util::base64_signature(assoc,util::change_mode_message_proxy(inm,idresmode))!=inm.get_field("sig")) | 294 | if(util::base64_signature(assoc,util::change_mode_message_proxy(inm,idresmode))!=inm.get_field("sig")) |
298 | throw failed_check_authentication(OPKELE_CP_ "Signature mismatch"); | 295 | throw failed_check_authentication(OPKELE_CP_ "Signature mismatch"); |
299 | }catch(failed_lookup&) { | 296 | }catch(failed_lookup&) { |
300 | throw failed_check_authentication(OPKELE_CP_ "failed to calculate signature"); | 297 | throw failed_check_authentication(OPKELE_CP_ "failed to calculate signature"); |
301 | } | 298 | } |
302 | oum.set_field("is_valid","true"); | 299 | oum.set_field("is_valid","true"); |
303 | try { | 300 | try { |
304 | string h = inm.get_field("invalidate_handle"); | 301 | string h = inm.get_field("invalidate_handle"); |
305 | try { | 302 | try { |
306 | assoc_t ih = retrieve_assoc(h); | 303 | assoc_t ih = retrieve_assoc(h); |
307 | }catch(invalid_handle& ih) { | 304 | }catch(invalid_handle& ih) { |
308 | oum.set_field("invalidate_handle",h); | 305 | oum.set_field("invalidate_handle",h); |
309 | }catch(failed_lookup& ih) { | 306 | }catch(failed_lookup& ih) { |
310 | oum.set_field("invalidate_handle",h); | 307 | oum.set_field("invalidate_handle",h); |
311 | } | 308 | } |
312 | }catch(failed_lookup&) { } | 309 | }catch(failed_lookup&) { } |
313 | if(o2) { | 310 | if(o2) { |
314 | assert(!nonce.empty()); | 311 | assert(!nonce.empty()); |
315 | invalidate_nonce(nonce); | 312 | invalidate_nonce(nonce); |
316 | } | 313 | } |
317 | return oum; | 314 | return oum; |
318 | }catch(failed_check_authentication& ) { | 315 | }catch(failed_check_authentication& ) { |
319 | oum.set_field("is_valid","false"); | 316 | oum.set_field("is_valid","false"); |
320 | return oum; | 317 | return oum; |
321 | } | 318 | } |
322 | 319 | ||
323 | void basic_op::verify_return_to() { | 320 | void basic_op::verify_return_to() { |
324 | string nrealm = opkele::util::rfc_3986_normalize_uri(realm); | 321 | if(realm.find('#')!=string::npos) |
325 | if(nrealm.find('#')!=string::npos) | ||
326 | throw opkele::bad_realm(OPKELE_CP_ "authentication realm contains URI fragment"); | 322 | throw opkele::bad_realm(OPKELE_CP_ "authentication realm contains URI fragment"); |
327 | string nrt = opkele::util::rfc_3986_normalize_uri(return_to); | 323 | if(!util::uri_matches_realm(return_to,realm)) |
328 | string::size_type pr = nrealm.find("://"); | 324 | throw bad_return_to(OPKELE_CP_ "return_to URL doesn't match realm"); |
329 | string::size_type prt = nrt.find("://"); | ||
330 | assert(!(pr==string::npos || prt==string::npos)); | ||
331 | pr += sizeof("://")-1; | ||
332 | prt += sizeof("://")-1; | ||
333 | if(!strncmp(nrealm.c_str()+pr,"*.",2)) { | ||
334 | pr = nrealm.find('.',pr); | ||
335 | prt = nrt.find('.',prt); | ||
336 | assert(pr!=string::npos); | ||
337 | if(prt==string::npos) | ||
338 | throw bad_return_to( | ||
339 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
340 | // TODO: check for overgeneralized realm | ||
341 | } | ||
342 | string::size_type lr = nrealm.length(); | ||
343 | string::size_type lrt = nrt.length(); | ||
344 | if( (lrt-prt) < (lr-pr) ) | ||
345 | throw bad_return_to( | ||
346 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
347 | pair<const char*,const char*> mp = mismatch( | ||
348 | nrealm.c_str()+pr,nrealm.c_str()+lr, | ||
349 | nrt.c_str()+prt); | ||
350 | if( (*(mp.first-1))!='/' | ||
351 | && !strchr("/?#",*mp.second) ) | ||
352 | throw bad_return_to( | ||
353 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
354 | } | 325 | } |
355 | 326 | ||
356 | } | 327 | } |
diff --git a/lib/util.cc b/lib/util.cc index b7bc437..b85a377 100644 --- a/lib/util.cc +++ b/lib/util.cc | |||
@@ -1,55 +1,56 @@ | |||
1 | #include <errno.h> | 1 | #include <errno.h> |
2 | #include <cassert> | 2 | #include <cassert> |
3 | #include <cctype> | 3 | #include <cctype> |
4 | #include <cstring> | 4 | #include <cstring> |
5 | #include <vector> | 5 | #include <vector> |
6 | #include <string> | 6 | #include <string> |
7 | #include <stack> | 7 | #include <stack> |
8 | #include <algorithm> | ||
8 | #include <openssl/bio.h> | 9 | #include <openssl/bio.h> |
9 | #include <openssl/evp.h> | 10 | #include <openssl/evp.h> |
10 | #include <openssl/hmac.h> | 11 | #include <openssl/hmac.h> |
11 | #include <curl/curl.h> | 12 | #include <curl/curl.h> |
12 | #include "opkele/util.h" | 13 | #include "opkele/util.h" |
13 | #include "opkele/exception.h" | 14 | #include "opkele/exception.h" |
14 | 15 | ||
15 | #include <config.h> | 16 | #include <config.h> |
16 | #ifdef HAVE_DEMANGLE | 17 | #ifdef HAVE_DEMANGLE |
17 | # include <cxxabi.h> | 18 | # include <cxxabi.h> |
18 | #endif | 19 | #endif |
19 | 20 | ||
20 | namespace opkele { | 21 | namespace opkele { |
21 | using namespace std; | 22 | using namespace std; |
22 | 23 | ||
23 | namespace util { | 24 | namespace util { |
24 | 25 | ||
25 | /* | 26 | /* |
26 | * base64 | 27 | * base64 |
27 | */ | 28 | */ |
28 | string encode_base64(const void *data,size_t length) { | 29 | string encode_base64(const void *data,size_t length) { |
29 | BIO *b64 = 0, *bmem = 0; | 30 | BIO *b64 = 0, *bmem = 0; |
30 | try { | 31 | try { |
31 | b64 = BIO_new(BIO_f_base64()); | 32 | b64 = BIO_new(BIO_f_base64()); |
32 | if(!b64) | 33 | if(!b64) |
33 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 encoder"); | 34 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 encoder"); |
34 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); | 35 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); |
35 | bmem = BIO_new(BIO_s_mem()); | 36 | bmem = BIO_new(BIO_s_mem()); |
36 | BIO_set_flags(b64,BIO_CLOSE); | 37 | BIO_set_flags(b64,BIO_CLOSE); |
37 | if(!bmem) | 38 | if(!bmem) |
38 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() memory buffer"); | 39 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() memory buffer"); |
39 | BIO_push(b64,bmem); | 40 | BIO_push(b64,bmem); |
40 | if(((size_t)BIO_write(b64,data,length))!=length) | 41 | if(((size_t)BIO_write(b64,data,length))!=length) |
41 | throw exception_openssl(OPKELE_CP_ "failed to BIO_write()"); | 42 | throw exception_openssl(OPKELE_CP_ "failed to BIO_write()"); |
42 | if(BIO_flush(b64)!=1) | 43 | if(BIO_flush(b64)!=1) |
43 | throw exception_openssl(OPKELE_CP_ "failed to BIO_flush()"); | 44 | throw exception_openssl(OPKELE_CP_ "failed to BIO_flush()"); |
44 | char *rvd; | 45 | char *rvd; |
45 | long rvl = BIO_get_mem_data(bmem,&rvd); | 46 | long rvl = BIO_get_mem_data(bmem,&rvd); |
46 | string rv(rvd,rvl); | 47 | string rv(rvd,rvl); |
47 | BIO_free_all(b64); | 48 | BIO_free_all(b64); |
48 | return rv; | 49 | return rv; |
49 | }catch(...) { | 50 | }catch(...) { |
50 | if(b64) BIO_free_all(b64); | 51 | if(b64) BIO_free_all(b64); |
51 | throw; | 52 | throw; |
52 | } | 53 | } |
53 | } | 54 | } |
54 | 55 | ||
55 | void decode_base64(const string& data,vector<unsigned char>& rv) { | 56 | void decode_base64(const string& data,vector<unsigned char>& rv) { |
@@ -306,96 +307,125 @@ namespace opkele { | |||
306 | } | 307 | } |
307 | }else{ | 308 | }else{ |
308 | psegs.push(rv.length()); | 309 | psegs.push(rv.length()); |
309 | if(c!='/') { | 310 | if(c!='/') { |
310 | pseg += c; | 311 | pseg += c; |
311 | qf = true; | 312 | qf = true; |
312 | } | 313 | } |
313 | rv += '/'; rv += pseg; | 314 | rv += '/'; rv += pseg; |
314 | } | 315 | } |
315 | if(c=='/' && (n>=ul || strchr("?#",uri[n])) ) { | 316 | if(c=='/' && (n>=ul || strchr("?#",uri[n])) ) { |
316 | rv += '/'; | 317 | rv += '/'; |
317 | if(n<ul) | 318 | if(n<ul) |
318 | qf = true; | 319 | qf = true; |
319 | }else if(strchr("?#",c)) { | 320 | }else if(strchr("?#",c)) { |
320 | if(psegs.size()==1 && psegs.top()==rv.length()) | 321 | if(psegs.size()==1 && psegs.top()==rv.length()) |
321 | rv += '/'; | 322 | rv += '/'; |
322 | if(pseg.empty()) | 323 | if(pseg.empty()) |
323 | rv += c; | 324 | rv += c; |
324 | qf = true; | 325 | qf = true; |
325 | } | 326 | } |
326 | pseg.clear(); | 327 | pseg.clear(); |
327 | }else{ | 328 | }else{ |
328 | pseg += c; | 329 | pseg += c; |
329 | } | 330 | } |
330 | } | 331 | } |
331 | if(!pseg.empty()) { | 332 | if(!pseg.empty()) { |
332 | if(!qf) rv += '/'; | 333 | if(!qf) rv += '/'; |
333 | rv += pseg; | 334 | rv += pseg; |
334 | } | 335 | } |
335 | return rv; | 336 | return rv; |
336 | } | 337 | } |
337 | 338 | ||
338 | string& strip_uri_fragment_part(string& u) { | 339 | string& strip_uri_fragment_part(string& u) { |
339 | string::size_type q = u.find('?'), f = u.find('#'); | 340 | string::size_type q = u.find('?'), f = u.find('#'); |
340 | if(q==string::npos) { | 341 | if(q==string::npos) { |
341 | if(f!=string::npos) | 342 | if(f!=string::npos) |
342 | u.erase(f); | 343 | u.erase(f); |
343 | }else{ | 344 | }else{ |
344 | if(f!=string::npos) { | 345 | if(f!=string::npos) { |
345 | if(f<q) | 346 | if(f<q) |
346 | u.erase(f,q-f); | 347 | u.erase(f,q-f); |
347 | else | 348 | else |
348 | u.erase(f); | 349 | u.erase(f); |
349 | } | 350 | } |
350 | } | 351 | } |
351 | return u; | 352 | return u; |
352 | } | 353 | } |
353 | 354 | ||
355 | bool uri_matches_realm(const string& uri,const string& realm) { | ||
356 | string nrealm = opkele::util::rfc_3986_normalize_uri(realm); | ||
357 | string nu = opkele::util::rfc_3986_normalize_uri(uri); | ||
358 | string::size_type pr = nrealm.find("://"); | ||
359 | string::size_type pu = nu.find("://"); | ||
360 | assert(!(pr==string::npos || pu==string::npos)); | ||
361 | pr += sizeof("://")-1; | ||
362 | pu += sizeof("://")-1; | ||
363 | if(!strncmp(nrealm.c_str()+pr,"*.",2)) { | ||
364 | pr = nrealm.find('.',pr); | ||
365 | pu = nu.find('.',pu); | ||
366 | assert(pr!=string::npos); | ||
367 | if(pu==string::npos) | ||
368 | return false; | ||
369 | // TODO: check for overgeneralized realm | ||
370 | } | ||
371 | string::size_type lr = nrealm.length(); | ||
372 | string::size_type lu = nu.length(); | ||
373 | if( (lu-pu) < (lr-pr) ) | ||
374 | return false; | ||
375 | pair<const char*,const char*> mp = mismatch( | ||
376 | nrealm.c_str()+pr,nrealm.c_str()+lr, | ||
377 | nu.c_str()+pu); | ||
378 | if( (*(mp.first-1))!='/' | ||
379 | && !strchr("/?#",*mp.second) ) | ||
380 | return false; | ||
381 | return true; | ||
382 | } | ||
383 | |||
354 | string abi_demangle(const char *mn) { | 384 | string abi_demangle(const char *mn) { |
355 | #ifndef HAVE_DEMANGLE | 385 | #ifndef HAVE_DEMANGLE |
356 | return mn; | 386 | return mn; |
357 | #else /* !HAVE_DEMANGLE */ | 387 | #else /* !HAVE_DEMANGLE */ |
358 | int dstat; | 388 | int dstat; |
359 | char *demangled = abi::__cxa_demangle(mn,0,0,&dstat); | 389 | char *demangled = abi::__cxa_demangle(mn,0,0,&dstat); |
360 | if(dstat) | 390 | if(dstat) |
361 | return mn; | 391 | return mn; |
362 | string rv = demangled; | 392 | string rv = demangled; |
363 | free(demangled); | 393 | free(demangled); |
364 | return rv; | 394 | return rv; |
365 | #endif /* !HAVE_DEMANGLE */ | 395 | #endif /* !HAVE_DEMANGLE */ |
366 | } | 396 | } |
367 | 397 | ||
368 | string base64_signature(const assoc_t& assoc,const basic_openid_message& om) { | 398 | string base64_signature(const assoc_t& assoc,const basic_openid_message& om) { |
369 | const string& slist = om.get_field("signed"); | 399 | const string& slist = om.get_field("signed"); |
370 | string kv; | 400 | string kv; |
371 | string::size_type p=0; | 401 | string::size_type p=0; |
372 | while(true) { | 402 | while(true) { |
373 | string::size_type co = slist.find(',',p); | 403 | string::size_type co = slist.find(',',p); |
374 | string f = (co==string::npos) | 404 | string f = (co==string::npos) |
375 | ?slist.substr(p):slist.substr(p,co-p); | 405 | ?slist.substr(p):slist.substr(p,co-p); |
376 | kv += f; | 406 | kv += f; |
377 | kv += ':'; | 407 | kv += ':'; |
378 | kv += om.get_field(f); | 408 | kv += om.get_field(f); |
379 | kv += '\n'; | 409 | kv += '\n'; |
380 | if(co==string::npos) break; | 410 | if(co==string::npos) break; |
381 | p = co+1; | 411 | p = co+1; |
382 | } | 412 | } |
383 | const secret_t& secret = assoc->secret(); | 413 | const secret_t& secret = assoc->secret(); |
384 | const EVP_MD *evpmd; | 414 | const EVP_MD *evpmd; |
385 | const string& at = assoc->assoc_type(); | 415 | const string& at = assoc->assoc_type(); |
386 | if(at=="HMAC-SHA256") | 416 | if(at=="HMAC-SHA256") |
387 | evpmd = EVP_sha256(); | 417 | evpmd = EVP_sha256(); |
388 | else if(at=="HMAC-SHA1") | 418 | else if(at=="HMAC-SHA1") |
389 | evpmd = EVP_sha1(); | 419 | evpmd = EVP_sha1(); |
390 | else | 420 | else |
391 | throw unsupported(OPKELE_CP_ "unknown association type"); | 421 | throw unsupported(OPKELE_CP_ "unknown association type"); |
392 | unsigned int md_len = 0; | 422 | unsigned int md_len = 0; |
393 | unsigned char *md = HMAC(evpmd, | 423 | unsigned char *md = HMAC(evpmd, |
394 | &(secret.front()),secret.size(), | 424 | &(secret.front()),secret.size(), |
395 | (const unsigned char*)kv.data(),kv.length(), | 425 | (const unsigned char*)kv.data(),kv.length(), |
396 | 0,&md_len); | 426 | 0,&md_len); |
397 | return encode_base64(md,md_len); | 427 | return encode_base64(md,md_len); |
398 | } | 428 | } |
399 | 429 | ||
400 | } | 430 | } |
401 | 431 | ||