-rw-r--r-- | lib/basic_op.cc | 35 |
1 files changed, 3 insertions, 32 deletions
diff --git a/lib/basic_op.cc b/lib/basic_op.cc index f7573aa..11ffb48 100644 --- a/lib/basic_op.cc +++ b/lib/basic_op.cc | |||
@@ -1,356 +1,327 @@ | |||
1 | #include <time.h> | 1 | #include <time.h> |
2 | #include <cassert> | 2 | #include <cassert> |
3 | #include <algorithm> | ||
4 | #include <openssl/sha.h> | 3 | #include <openssl/sha.h> |
5 | #include <openssl/hmac.h> | 4 | #include <openssl/hmac.h> |
6 | #include <opkele/data.h> | 5 | #include <opkele/data.h> |
7 | #include <opkele/basic_op.h> | 6 | #include <opkele/basic_op.h> |
8 | #include <opkele/exception.h> | 7 | #include <opkele/exception.h> |
9 | #include <opkele/util.h> | 8 | #include <opkele/util.h> |
10 | #include <opkele/uris.h> | 9 | #include <opkele/uris.h> |
11 | 10 | ||
12 | namespace opkele { | 11 | namespace opkele { |
13 | using std::pair; | ||
14 | using std::mismatch; | ||
15 | 12 | ||
16 | void basic_op::reset_vars() { | 13 | void basic_op::reset_vars() { |
17 | assoc.reset(); | 14 | assoc.reset(); |
18 | return_to.clear(); realm.clear(); | 15 | return_to.clear(); realm.clear(); |
19 | claimed_id.clear(); identity.clear(); | 16 | claimed_id.clear(); identity.clear(); |
20 | invalidate_handle.clear(); | 17 | invalidate_handle.clear(); |
21 | } | 18 | } |
22 | 19 | ||
23 | bool basic_op::has_return_to() const { | 20 | bool basic_op::has_return_to() const { |
24 | return !return_to.empty(); | 21 | return !return_to.empty(); |
25 | } | 22 | } |
26 | const string& basic_op::get_return_to() const { | 23 | const string& basic_op::get_return_to() const { |
27 | if(return_to.empty()) | 24 | if(return_to.empty()) |
28 | throw no_return_to(OPKELE_CP_ "No return_to URL provided with request"); | 25 | throw no_return_to(OPKELE_CP_ "No return_to URL provided with request"); |
29 | return return_to; | 26 | return return_to; |
30 | } | 27 | } |
31 | 28 | ||
32 | const string& basic_op::get_realm() const { | 29 | const string& basic_op::get_realm() const { |
33 | assert(!realm.empty()); | 30 | assert(!realm.empty()); |
34 | return realm; | 31 | return realm; |
35 | } | 32 | } |
36 | 33 | ||
37 | bool basic_op::has_identity() const { | 34 | bool basic_op::has_identity() const { |
38 | return !identity.empty(); | 35 | return !identity.empty(); |
39 | } | 36 | } |
40 | const string& basic_op::get_claimed_id() const { | 37 | const string& basic_op::get_claimed_id() const { |
41 | if(claimed_id.empty()) | 38 | if(claimed_id.empty()) |
42 | throw non_identity(OPKELE_CP_ "attempting to retrieve claimed_id of non-identity related request"); | 39 | throw non_identity(OPKELE_CP_ "attempting to retrieve claimed_id of non-identity related request"); |
43 | assert(!identity.empty()); | 40 | assert(!identity.empty()); |
44 | return claimed_id; | 41 | return claimed_id; |
45 | } | 42 | } |
46 | const string& basic_op::get_identity() const { | 43 | const string& basic_op::get_identity() const { |
47 | if(identity.empty()) | 44 | if(identity.empty()) |
48 | throw non_identity(OPKELE_CP_ "attempting to retrieve identity of non-identity related request"); | 45 | throw non_identity(OPKELE_CP_ "attempting to retrieve identity of non-identity related request"); |
49 | assert(!claimed_id.empty()); | 46 | assert(!claimed_id.empty()); |
50 | return identity; | 47 | return identity; |
51 | } | 48 | } |
52 | 49 | ||
53 | bool basic_op::is_id_select() const { | 50 | bool basic_op::is_id_select() const { |
54 | return identity==IDURI_SELECT20; | 51 | return identity==IDURI_SELECT20; |
55 | } | 52 | } |
56 | 53 | ||
57 | void basic_op::select_identity(const string& c,const string& i) { | 54 | void basic_op::select_identity(const string& c,const string& i) { |
58 | claimed_id = c; identity = i; | 55 | claimed_id = c; identity = i; |
59 | } | 56 | } |
60 | void basic_op::set_claimed_id(const string& c) { | 57 | void basic_op::set_claimed_id(const string& c) { |
61 | claimed_id = c; | 58 | claimed_id = c; |
62 | } | 59 | } |
63 | 60 | ||
64 | basic_openid_message& basic_op::associate( | 61 | basic_openid_message& basic_op::associate( |
65 | basic_openid_message& oum, | 62 | basic_openid_message& oum, |
66 | const basic_openid_message& inm) try { | 63 | const basic_openid_message& inm) try { |
67 | assert(inm.get_field("mode")=="associate"); | 64 | assert(inm.get_field("mode")=="associate"); |
68 | util::dh_t dh; | 65 | util::dh_t dh; |
69 | util::bignum_t c_pub; | 66 | util::bignum_t c_pub; |
70 | unsigned char key_digest[SHA256_DIGEST_LENGTH]; | 67 | unsigned char key_digest[SHA256_DIGEST_LENGTH]; |
71 | size_t d_len = 0; | 68 | size_t d_len = 0; |
72 | enum { | 69 | enum { |
73 | sess_cleartext, sess_dh_sha1, sess_dh_sha256 | 70 | sess_cleartext, sess_dh_sha1, sess_dh_sha256 |
74 | } st = sess_cleartext; | 71 | } st = sess_cleartext; |
75 | string sts = inm.get_field("session_type"); | 72 | string sts = inm.get_field("session_type"); |
76 | string ats = inm.get_field("assoc_type"); | 73 | string ats = inm.get_field("assoc_type"); |
77 | if(sts=="DH-SHA1" || sts=="DH-SHA256") { | 74 | if(sts=="DH-SHA1" || sts=="DH-SHA256") { |
78 | if(!(dh = DH_new())) | 75 | if(!(dh = DH_new())) |
79 | throw exception_openssl(OPKELE_CP_ "failed to DH_new()"); | 76 | throw exception_openssl(OPKELE_CP_ "failed to DH_new()"); |
80 | c_pub = util::base64_to_bignum(inm.get_field("dh_consumer_public")); | 77 | c_pub = util::base64_to_bignum(inm.get_field("dh_consumer_public")); |
81 | try { dh->p = util::base64_to_bignum(inm.get_field("dh_modulus")); | 78 | try { dh->p = util::base64_to_bignum(inm.get_field("dh_modulus")); |
82 | }catch(failed_lookup&) { | 79 | }catch(failed_lookup&) { |
83 | dh->p = util::dec_to_bignum(data::_default_p); } | 80 | dh->p = util::dec_to_bignum(data::_default_p); } |
84 | try { dh->g = util::base64_to_bignum(inm.get_field("dh_gen")); | 81 | try { dh->g = util::base64_to_bignum(inm.get_field("dh_gen")); |
85 | }catch(failed_lookup&) { | 82 | }catch(failed_lookup&) { |
86 | dh->g = util::dec_to_bignum(data::_default_g); } | 83 | dh->g = util::dec_to_bignum(data::_default_g); } |
87 | if(!DH_generate_key(dh)) | 84 | if(!DH_generate_key(dh)) |
88 | throw exception_openssl(OPKELE_CP_ "failed to DH_generate_key()"); | 85 | throw exception_openssl(OPKELE_CP_ "failed to DH_generate_key()"); |
89 | vector<unsigned char> ck(DH_size(dh)+1); | 86 | vector<unsigned char> ck(DH_size(dh)+1); |
90 | unsigned char *ckptr = &(ck.front())+1; | 87 | unsigned char *ckptr = &(ck.front())+1; |
91 | int cklen = DH_compute_key(ckptr,c_pub,dh); | 88 | int cklen = DH_compute_key(ckptr,c_pub,dh); |
92 | if(cklen<0) | 89 | if(cklen<0) |
93 | throw exception_openssl(OPKELE_CP_ "failed to DH_compute_key()"); | 90 | throw exception_openssl(OPKELE_CP_ "failed to DH_compute_key()"); |
94 | if(cklen && (*ckptr)&0x80) { | 91 | if(cklen && (*ckptr)&0x80) { |
95 | (*(--ckptr)) = 0; ++cklen; } | 92 | (*(--ckptr)) = 0; ++cklen; } |
96 | if(sts=="DH-SHA1") { | 93 | if(sts=="DH-SHA1") { |
97 | SHA1(ckptr,cklen,key_digest); d_len = SHA_DIGEST_LENGTH; | 94 | SHA1(ckptr,cklen,key_digest); d_len = SHA_DIGEST_LENGTH; |
98 | }else if(sts=="DH-SHA256") { | 95 | }else if(sts=="DH-SHA256") { |
99 | SHA256(ckptr,cklen,key_digest); d_len = SHA256_DIGEST_LENGTH; | 96 | SHA256(ckptr,cklen,key_digest); d_len = SHA256_DIGEST_LENGTH; |
100 | }else | 97 | }else |
101 | throw internal_error(OPKELE_CP_ "I thought I knew the session type"); | 98 | throw internal_error(OPKELE_CP_ "I thought I knew the session type"); |
102 | }else | 99 | }else |
103 | throw unsupported(OPKELE_CP_ "Unsupported session_type"); | 100 | throw unsupported(OPKELE_CP_ "Unsupported session_type"); |
104 | assoc_t assoc; | 101 | assoc_t assoc; |
105 | if(ats=="HMAC-SHA1") | 102 | if(ats=="HMAC-SHA1") |
106 | assoc = alloc_assoc(ats,SHA_DIGEST_LENGTH,true); | 103 | assoc = alloc_assoc(ats,SHA_DIGEST_LENGTH,true); |
107 | else if(ats=="HMAC-SHA256") | 104 | else if(ats=="HMAC-SHA256") |
108 | assoc = alloc_assoc(ats,SHA256_DIGEST_LENGTH,true); | 105 | assoc = alloc_assoc(ats,SHA256_DIGEST_LENGTH,true); |
109 | else | 106 | else |
110 | throw unsupported(OPKELE_CP_ "Unsupported assoc_type"); | 107 | throw unsupported(OPKELE_CP_ "Unsupported assoc_type"); |
111 | oum.reset_fields(); | 108 | oum.reset_fields(); |
112 | oum.set_field("ns",OIURI_OPENID20); | 109 | oum.set_field("ns",OIURI_OPENID20); |
113 | oum.set_field("assoc_type",assoc->assoc_type()); | 110 | oum.set_field("assoc_type",assoc->assoc_type()); |
114 | oum.set_field("assoc_handle",assoc->handle()); | 111 | oum.set_field("assoc_handle",assoc->handle()); |
115 | oum.set_field("expires_in",util::long_to_string(assoc->expires_in())); | 112 | oum.set_field("expires_in",util::long_to_string(assoc->expires_in())); |
116 | secret_t secret = assoc->secret(); | 113 | secret_t secret = assoc->secret(); |
117 | if(sts=="DH-SHA1" || sts=="DH-SHA256") { | 114 | if(sts=="DH-SHA1" || sts=="DH-SHA256") { |
118 | if(d_len != secret.size()) | 115 | if(d_len != secret.size()) |
119 | throw bad_input(OPKELE_CP_ "Association secret and session MAC are not of the same size"); | 116 | throw bad_input(OPKELE_CP_ "Association secret and session MAC are not of the same size"); |
120 | oum.set_field("session_type",sts); | 117 | oum.set_field("session_type",sts); |
121 | oum.set_field("dh_server_public",util::bignum_to_base64(dh->pub_key)); | 118 | oum.set_field("dh_server_public",util::bignum_to_base64(dh->pub_key)); |
122 | string b64; secret.enxor_to_base64(key_digest,b64); | 119 | string b64; secret.enxor_to_base64(key_digest,b64); |
123 | oum.set_field("enc_mac_key",b64); | 120 | oum.set_field("enc_mac_key",b64); |
124 | }else /* TODO: support cleartext over encrypted connection */ | 121 | }else /* TODO: support cleartext over encrypted connection */ |
125 | throw unsupported(OPKELE_CP_ "Unsupported session type"); | 122 | throw unsupported(OPKELE_CP_ "Unsupported session type"); |
126 | return oum; | 123 | return oum; |
127 | } catch(unsupported& u) { | 124 | } catch(unsupported& u) { |
128 | oum.reset_fields(); | 125 | oum.reset_fields(); |
129 | oum.set_field("ns",OIURI_OPENID20); | 126 | oum.set_field("ns",OIURI_OPENID20); |
130 | oum.set_field("error",u.what()); | 127 | oum.set_field("error",u.what()); |
131 | oum.set_field("error_code","unsupported-type"); | 128 | oum.set_field("error_code","unsupported-type"); |
132 | oum.set_field("session_type","DH-SHA256"); | 129 | oum.set_field("session_type","DH-SHA256"); |
133 | oum.set_field("assoc_type","HMAC-SHA256"); | 130 | oum.set_field("assoc_type","HMAC-SHA256"); |
134 | return oum; | 131 | return oum; |
135 | } | 132 | } |
136 | 133 | ||
137 | void basic_op::checkid_(const basic_openid_message& inm, | 134 | void basic_op::checkid_(const basic_openid_message& inm, |
138 | extension_t *ext) { | 135 | extension_t *ext) { |
139 | reset_vars(); | 136 | reset_vars(); |
140 | string mode = inm.get_field("mode"); | 137 | string mode = inm.get_field("mode"); |
141 | if(mode=="checkid_setup") | 138 | if(mode=="checkid_setup") |
142 | mode = mode_checkid_setup; | 139 | mode = mode_checkid_setup; |
143 | else if(mode=="checkid_immediate") | 140 | else if(mode=="checkid_immediate") |
144 | mode = mode_checkid_immediate; | 141 | mode = mode_checkid_immediate; |
145 | else | 142 | else |
146 | throw bad_input(OPKELE_CP_ "Invalid checkid_* mode"); | 143 | throw bad_input(OPKELE_CP_ "Invalid checkid_* mode"); |
147 | try { | 144 | try { |
148 | assoc = retrieve_assoc(invalidate_handle=inm.get_field("assoc_handle")); | 145 | assoc = retrieve_assoc(invalidate_handle=inm.get_field("assoc_handle")); |
149 | invalidate_handle.clear(); | 146 | invalidate_handle.clear(); |
150 | }catch(failed_lookup&) { | 147 | }catch(failed_lookup&) { |
151 | // no handle specified or no valid assoc found, go dumb | 148 | // no handle specified or no valid assoc found, go dumb |
152 | assoc = alloc_assoc("HMAC-SHA256",SHA256_DIGEST_LENGTH,true); | 149 | assoc = alloc_assoc("HMAC-SHA256",SHA256_DIGEST_LENGTH,true); |
153 | } | 150 | } |
154 | try { | 151 | try { |
155 | openid2 = (inm.get_field("ns")==OIURI_OPENID20); | 152 | openid2 = (inm.get_field("ns")==OIURI_OPENID20); |
156 | }catch(failed_lookup&) { openid2 = false; } | 153 | }catch(failed_lookup&) { openid2 = false; } |
157 | try { | 154 | try { |
158 | return_to = inm.get_field("return_to"); | 155 | return_to = inm.get_field("return_to"); |
159 | }catch(failed_lookup&) { } | 156 | }catch(failed_lookup&) { } |
160 | if(openid2) { | 157 | if(openid2) { |
161 | try { | 158 | try { |
162 | realm = inm.get_field("realm"); | 159 | realm = inm.get_field("realm"); |
163 | }catch(failed_lookup&) { | 160 | }catch(failed_lookup&) { |
164 | try { | 161 | try { |
165 | realm = inm.get_field("trust_root"); | 162 | realm = inm.get_field("trust_root"); |
166 | }catch(failed_lookup&) { | 163 | }catch(failed_lookup&) { |
167 | if(return_to.empty()) | 164 | if(return_to.empty()) |
168 | throw bad_input(OPKELE_CP_ | 165 | throw bad_input(OPKELE_CP_ |
169 | "Both realm and return_to are unset"); | 166 | "Both realm and return_to are unset"); |
170 | realm = return_to; | 167 | realm = return_to; |
171 | } | 168 | } |
172 | } | 169 | } |
173 | }else{ | 170 | }else{ |
174 | try { | 171 | try { |
175 | realm = inm.get_field("trust_root"); | 172 | realm = inm.get_field("trust_root"); |
176 | }catch(failed_lookup&) { | 173 | }catch(failed_lookup&) { |
177 | if(return_to.empty()) | 174 | if(return_to.empty()) |
178 | throw bad_input(OPKELE_CP_ | 175 | throw bad_input(OPKELE_CP_ |
179 | "Both realm and return_to are unset"); | 176 | "Both realm and return_to are unset"); |
180 | realm = return_to; | 177 | realm = return_to; |
181 | } | 178 | } |
182 | } | 179 | } |
183 | try { | 180 | try { |
184 | identity = inm.get_field("identity"); | 181 | identity = inm.get_field("identity"); |
185 | try { | 182 | try { |
186 | claimed_id = inm.get_field("claimed_id"); | 183 | claimed_id = inm.get_field("claimed_id"); |
187 | }catch(failed_lookup&) { | 184 | }catch(failed_lookup&) { |
188 | if(openid2) | 185 | if(openid2) |
189 | throw bad_input(OPKELE_CP_ | 186 | throw bad_input(OPKELE_CP_ |
190 | "claimed_id and identity must be either both present or both absent"); | 187 | "claimed_id and identity must be either both present or both absent"); |
191 | } | 188 | } |
192 | }catch(failed_lookup&) { | 189 | }catch(failed_lookup&) { |
193 | if(openid2 && inm.has_field("claimed_id")) | 190 | if(openid2 && inm.has_field("claimed_id")) |
194 | throw bad_input(OPKELE_CP_ | 191 | throw bad_input(OPKELE_CP_ |
195 | "claimed_id and identity must be either both present or both absent"); | 192 | "claimed_id and identity must be either both present or both absent"); |
196 | } | 193 | } |
197 | verify_return_to(); | 194 | verify_return_to(); |
198 | } | 195 | } |
199 | 196 | ||
200 | basic_openid_message& basic_op::id_res(basic_openid_message& om) { | 197 | basic_openid_message& basic_op::id_res(basic_openid_message& om) { |
201 | assert(assoc); | 198 | assert(assoc); |
202 | assert(!return_to.empty()); | 199 | assert(!return_to.empty()); |
203 | assert(!is_id_select()); | 200 | assert(!is_id_select()); |
204 | time_t now = time(0); | 201 | time_t now = time(0); |
205 | struct tm gmt; gmtime_r(&now,&gmt); | 202 | struct tm gmt; gmtime_r(&now,&gmt); |
206 | char w3timestr[24]; | 203 | char w3timestr[24]; |
207 | if(!strftime(w3timestr,sizeof(w3timestr),"%Y-%m-%dT%H:%M:%SZ",&gmt)) | 204 | if(!strftime(w3timestr,sizeof(w3timestr),"%Y-%m-%dT%H:%M:%SZ",&gmt)) |
208 | throw failed_conversion(OPKELE_CP_ | 205 | throw failed_conversion(OPKELE_CP_ |
209 | "Failed to build time string for nonce" ); | 206 | "Failed to build time string for nonce" ); |
210 | om.set_field("ns",OIURI_OPENID20); | 207 | om.set_field("ns",OIURI_OPENID20); |
211 | om.set_field("mode","id_res"); | 208 | om.set_field("mode","id_res"); |
212 | om.set_field("op_endpoint",get_op_endpoint()); | 209 | om.set_field("op_endpoint",get_op_endpoint()); |
213 | string ats = "ns,mode,op_endpoint,return_to,response_nonce," | 210 | string ats = "ns,mode,op_endpoint,return_to,response_nonce," |
214 | "assoc_handle,signed"; | 211 | "assoc_handle,signed"; |
215 | if(!identity.empty()) { | 212 | if(!identity.empty()) { |
216 | om.set_field("identity",identity); | 213 | om.set_field("identity",identity); |
217 | om.set_field("claimed_id",claimed_id); | 214 | om.set_field("claimed_id",claimed_id); |
218 | ats += ",identity,claimed_id"; | 215 | ats += ",identity,claimed_id"; |
219 | } | 216 | } |
220 | om.set_field("return_to",return_to); | 217 | om.set_field("return_to",return_to); |
221 | string nonce = w3timestr; | 218 | string nonce = w3timestr; |
222 | om.set_field("response_nonce",alloc_nonce(nonce,assoc->stateless())); | 219 | om.set_field("response_nonce",alloc_nonce(nonce,assoc->stateless())); |
223 | if(!invalidate_handle.empty()) { | 220 | if(!invalidate_handle.empty()) { |
224 | om.set_field("invalidate_handle",invalidate_handle); | 221 | om.set_field("invalidate_handle",invalidate_handle); |
225 | ats += ",invalidate_handle"; | 222 | ats += ",invalidate_handle"; |
226 | } | 223 | } |
227 | om.set_field("assoc_handle",assoc->handle()); | 224 | om.set_field("assoc_handle",assoc->handle()); |
228 | om.add_to_signed(ats); | 225 | om.add_to_signed(ats); |
229 | om.set_field("sig",util::base64_signature(assoc,om)); | 226 | om.set_field("sig",util::base64_signature(assoc,om)); |
230 | return om; | 227 | return om; |
231 | } | 228 | } |
232 | 229 | ||
233 | basic_openid_message& basic_op::cancel(basic_openid_message& om) { | 230 | basic_openid_message& basic_op::cancel(basic_openid_message& om) { |
234 | assert(!return_to.empty()); | 231 | assert(!return_to.empty()); |
235 | om.set_field("ns",OIURI_OPENID20); | 232 | om.set_field("ns",OIURI_OPENID20); |
236 | om.set_field("mode","cancel"); | 233 | om.set_field("mode","cancel"); |
237 | return om; | 234 | return om; |
238 | } | 235 | } |
239 | 236 | ||
240 | basic_openid_message& basic_op::error(basic_openid_message& om, | 237 | basic_openid_message& basic_op::error(basic_openid_message& om, |
241 | const string& error,const string& contact, | 238 | const string& error,const string& contact, |
242 | const string& reference ) { | 239 | const string& reference ) { |
243 | assert(!return_to.empty()); | 240 | assert(!return_to.empty()); |
244 | om.set_field("ns",OIURI_OPENID20); | 241 | om.set_field("ns",OIURI_OPENID20); |
245 | om.set_field("mode","error"); | 242 | om.set_field("mode","error"); |
246 | om.set_field("error",error); | 243 | om.set_field("error",error); |
247 | om.set_field("contact",contact); | 244 | om.set_field("contact",contact); |
248 | om.set_field("reference",reference); | 245 | om.set_field("reference",reference); |
249 | return om; | 246 | return om; |
250 | } | 247 | } |
251 | 248 | ||
252 | basic_openid_message& basic_op::setup_needed( | 249 | basic_openid_message& basic_op::setup_needed( |
253 | basic_openid_message& oum,const basic_openid_message& inm) { | 250 | basic_openid_message& oum,const basic_openid_message& inm) { |
254 | assert(mode==mode_checkid_immediate); | 251 | assert(mode==mode_checkid_immediate); |
255 | assert(!return_to.empty()); | 252 | assert(!return_to.empty()); |
256 | if(openid2) { | 253 | if(openid2) { |
257 | oum.set_field("ns",OIURI_OPENID20); | 254 | oum.set_field("ns",OIURI_OPENID20); |
258 | oum.set_field("mode","setup_needed"); | 255 | oum.set_field("mode","setup_needed"); |
259 | }else{ | 256 | }else{ |
260 | oum.set_field("mode","id_res"); | 257 | oum.set_field("mode","id_res"); |
261 | static const string setupmode = "checkid_setup"; | 258 | static const string setupmode = "checkid_setup"; |
262 | oum.set_field("user_setup_url", | 259 | oum.set_field("user_setup_url", |
263 | util::change_mode_message_proxy(inm,setupmode) | 260 | util::change_mode_message_proxy(inm,setupmode) |
264 | .append_query(get_op_endpoint())); | 261 | .append_query(get_op_endpoint())); |
265 | } | 262 | } |
266 | return oum; | 263 | return oum; |
267 | } | 264 | } |
268 | 265 | ||
269 | basic_openid_message& basic_op::check_authentication( | 266 | basic_openid_message& basic_op::check_authentication( |
270 | basic_openid_message& oum, | 267 | basic_openid_message& oum, |
271 | const basic_openid_message& inm) try { | 268 | const basic_openid_message& inm) try { |
272 | assert(inm.get_field("mode")=="check_authentication"); | 269 | assert(inm.get_field("mode")=="check_authentication"); |
273 | oum.reset_fields(); | 270 | oum.reset_fields(); |
274 | oum.set_field("ns",OIURI_OPENID20); | 271 | oum.set_field("ns",OIURI_OPENID20); |
275 | bool o2; | 272 | bool o2; |
276 | try { | 273 | try { |
277 | o2 = (inm.get_field("ns")==OIURI_OPENID20); | 274 | o2 = (inm.get_field("ns")==OIURI_OPENID20); |
278 | }catch(failed_lookup&) { o2 = false; } | 275 | }catch(failed_lookup&) { o2 = false; } |
279 | string nonce; | 276 | string nonce; |
280 | if(o2) { | 277 | if(o2) { |
281 | try { | 278 | try { |
282 | if(!check_nonce(nonce = inm.get_field("response_nonce"))) | 279 | if(!check_nonce(nonce = inm.get_field("response_nonce"))) |
283 | throw failed_check_authentication(OPKELE_CP_ "Invalid nonce"); | 280 | throw failed_check_authentication(OPKELE_CP_ "Invalid nonce"); |
284 | }catch(failed_lookup&) { | 281 | }catch(failed_lookup&) { |
285 | throw failed_check_authentication(OPKELE_CP_ "No nonce provided with check_authentication request"); | 282 | throw failed_check_authentication(OPKELE_CP_ "No nonce provided with check_authentication request"); |
286 | } | 283 | } |
287 | } | 284 | } |
288 | try { | 285 | try { |
289 | assoc = retrieve_assoc(inm.get_field("assoc_handle")); | 286 | assoc = retrieve_assoc(inm.get_field("assoc_handle")); |
290 | if(!assoc->stateless()) | 287 | if(!assoc->stateless()) |
291 | throw failed_check_authentication(OPKELE_CP_ "Will not do check_authentication on a stateful handle"); | 288 | throw failed_check_authentication(OPKELE_CP_ "Will not do check_authentication on a stateful handle"); |
292 | }catch(failed_lookup&) { | 289 | }catch(failed_lookup&) { |
293 | throw failed_check_authentication(OPKELE_CP_ "No assoc_handle or invalid assoc_handle specified with check_authentication request"); | 290 | throw failed_check_authentication(OPKELE_CP_ "No assoc_handle or invalid assoc_handle specified with check_authentication request"); |
294 | } | 291 | } |
295 | static const string idresmode = "id_res"; | 292 | static const string idresmode = "id_res"; |
296 | try { | 293 | try { |
297 | if(util::base64_signature(assoc,util::change_mode_message_proxy(inm,idresmode))!=inm.get_field("sig")) | 294 | if(util::base64_signature(assoc,util::change_mode_message_proxy(inm,idresmode))!=inm.get_field("sig")) |
298 | throw failed_check_authentication(OPKELE_CP_ "Signature mismatch"); | 295 | throw failed_check_authentication(OPKELE_CP_ "Signature mismatch"); |
299 | }catch(failed_lookup&) { | 296 | }catch(failed_lookup&) { |
300 | throw failed_check_authentication(OPKELE_CP_ "failed to calculate signature"); | 297 | throw failed_check_authentication(OPKELE_CP_ "failed to calculate signature"); |
301 | } | 298 | } |
302 | oum.set_field("is_valid","true"); | 299 | oum.set_field("is_valid","true"); |
303 | try { | 300 | try { |
304 | string h = inm.get_field("invalidate_handle"); | 301 | string h = inm.get_field("invalidate_handle"); |
305 | try { | 302 | try { |
306 | assoc_t ih = retrieve_assoc(h); | 303 | assoc_t ih = retrieve_assoc(h); |
307 | }catch(invalid_handle& ih) { | 304 | }catch(invalid_handle& ih) { |
308 | oum.set_field("invalidate_handle",h); | 305 | oum.set_field("invalidate_handle",h); |
309 | }catch(failed_lookup& ih) { | 306 | }catch(failed_lookup& ih) { |
310 | oum.set_field("invalidate_handle",h); | 307 | oum.set_field("invalidate_handle",h); |
311 | } | 308 | } |
312 | }catch(failed_lookup&) { } | 309 | }catch(failed_lookup&) { } |
313 | if(o2) { | 310 | if(o2) { |
314 | assert(!nonce.empty()); | 311 | assert(!nonce.empty()); |
315 | invalidate_nonce(nonce); | 312 | invalidate_nonce(nonce); |
316 | } | 313 | } |
317 | return oum; | 314 | return oum; |
318 | }catch(failed_check_authentication& ) { | 315 | }catch(failed_check_authentication& ) { |
319 | oum.set_field("is_valid","false"); | 316 | oum.set_field("is_valid","false"); |
320 | return oum; | 317 | return oum; |
321 | } | 318 | } |
322 | 319 | ||
323 | void basic_op::verify_return_to() { | 320 | void basic_op::verify_return_to() { |
324 | string nrealm = opkele::util::rfc_3986_normalize_uri(realm); | 321 | if(realm.find('#')!=string::npos) |
325 | if(nrealm.find('#')!=string::npos) | ||
326 | throw opkele::bad_realm(OPKELE_CP_ "authentication realm contains URI fragment"); | 322 | throw opkele::bad_realm(OPKELE_CP_ "authentication realm contains URI fragment"); |
327 | string nrt = opkele::util::rfc_3986_normalize_uri(return_to); | 323 | if(!util::uri_matches_realm(return_to,realm)) |
328 | string::size_type pr = nrealm.find("://"); | 324 | throw bad_return_to(OPKELE_CP_ "return_to URL doesn't match realm"); |
329 | string::size_type prt = nrt.find("://"); | ||
330 | assert(!(pr==string::npos || prt==string::npos)); | ||
331 | pr += sizeof("://")-1; | ||
332 | prt += sizeof("://")-1; | ||
333 | if(!strncmp(nrealm.c_str()+pr,"*.",2)) { | ||
334 | pr = nrealm.find('.',pr); | ||
335 | prt = nrt.find('.',prt); | ||
336 | assert(pr!=string::npos); | ||
337 | if(prt==string::npos) | ||
338 | throw bad_return_to( | ||
339 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
340 | // TODO: check for overgeneralized realm | ||
341 | } | ||
342 | string::size_type lr = nrealm.length(); | ||
343 | string::size_type lrt = nrt.length(); | ||
344 | if( (lrt-prt) < (lr-pr) ) | ||
345 | throw bad_return_to( | ||
346 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
347 | pair<const char*,const char*> mp = mismatch( | ||
348 | nrealm.c_str()+pr,nrealm.c_str()+lr, | ||
349 | nrt.c_str()+prt); | ||
350 | if( (*(mp.first-1))!='/' | ||
351 | && !strchr("/?#",*mp.second) ) | ||
352 | throw bad_return_to( | ||
353 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
354 | } | 325 | } |
355 | 326 | ||
356 | } | 327 | } |