author | Michael Krelin <hacker@klever.net> | 2005-07-20 09:56:34 (UTC) |
---|---|---|
committer | Michael Krelin <hacker@klever.net> | 2005-07-20 09:56:34 (UTC) |
commit | 9634a1491130ef24130454e951672301e805351f (patch) (side-by-side diff) | |
tree | f8239d1ee61742c5635694eae240c4b52937b6ea /lib | |
parent | 3c07e6e294c424d8aa869c10b6d25fd4fb2c639e (diff) | |
download | libopkele-9634a1491130ef24130454e951672301e805351f.zip libopkele-9634a1491130ef24130454e951672301e805351f.tar.gz libopkele-9634a1491130ef24130454e951672301e805351f.tar.bz2 |
invalidate invalid handles.
-rw-r--r-- | lib/server.cc | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/lib/server.cc b/lib/server.cc index 51d4554..5eee1f3 100644 --- a/lib/server.cc +++ b/lib/server.cc @@ -75,27 +75,29 @@ namespace opkele { checkid_(mode_checkid_setup,pin,return_to,pout); } void server_t::checkid_(mode_t mode,const params_t& pin,string& return_to,params_t& pout) { if(mode!=mode_checkid_immediate && mode!=mode_checkid_setup) throw bad_input(OPKELE_CP_ "invalid checkid_* mode"); + pout.clear(); assoc_t assoc; try { assoc = retrieve_assoc(pin.get_param("openid.assoc_handle")); }catch(failed_lookup& fl) { // no handle specified or no valid handle found, going dumb assoc = alloc_assoc(mode_checkid_setup); + if(pin.has_param("openid.assoc_handle")) + pout["invalidate_handle"]=pin.get_param("openid.assoc_handle"); } string trust_root; try { trust_root = pin.get_param("openid.trust_root"); }catch(failed_lookup& fl) { } string identity = pin.get_param("openid.identity"); return_to = pin.get_param("openid.return_to"); validate(*assoc,pin,identity,trust_root); - pout.clear(); pout["mode"] = "id_res"; pout["assoc_handle"] = assoc->handle(); if(pin.has_param("openid.assoc_handle") && assoc->stateless()) pout["invalidate_handle"] = pin.get_param("openid.assoc_handle"); pout["identity"] = identity; pout["return_to"] = return_to; |