summaryrefslogtreecommitdiffabout
path: root/lib/basic_op.cc
Unidiff
Diffstat (limited to 'lib/basic_op.cc') (more/less context) (ignore whitespace changes)
-rw-r--r--lib/basic_op.cc35
1 files changed, 3 insertions, 32 deletions
diff --git a/lib/basic_op.cc b/lib/basic_op.cc
index f7573aa..11ffb48 100644
--- a/lib/basic_op.cc
+++ b/lib/basic_op.cc
@@ -1,356 +1,327 @@
1#include <time.h> 1#include <time.h>
2#include <cassert> 2#include <cassert>
3#include <algorithm>
4#include <openssl/sha.h> 3#include <openssl/sha.h>
5#include <openssl/hmac.h> 4#include <openssl/hmac.h>
6#include <opkele/data.h> 5#include <opkele/data.h>
7#include <opkele/basic_op.h> 6#include <opkele/basic_op.h>
8#include <opkele/exception.h> 7#include <opkele/exception.h>
9#include <opkele/util.h> 8#include <opkele/util.h>
10#include <opkele/uris.h> 9#include <opkele/uris.h>
11 10
12namespace opkele { 11namespace opkele {
13 using std::pair;
14 using std::mismatch;
15 12
16 void basic_op::reset_vars() { 13 void basic_op::reset_vars() {
17 assoc.reset(); 14 assoc.reset();
18 return_to.clear(); realm.clear(); 15 return_to.clear(); realm.clear();
19 claimed_id.clear(); identity.clear(); 16 claimed_id.clear(); identity.clear();
20 invalidate_handle.clear(); 17 invalidate_handle.clear();
21 } 18 }
22 19
23 bool basic_op::has_return_to() const { 20 bool basic_op::has_return_to() const {
24 return !return_to.empty(); 21 return !return_to.empty();
25 } 22 }
26 const string& basic_op::get_return_to() const { 23 const string& basic_op::get_return_to() const {
27 if(return_to.empty()) 24 if(return_to.empty())
28 throw no_return_to(OPKELE_CP_ "No return_to URL provided with request"); 25 throw no_return_to(OPKELE_CP_ "No return_to URL provided with request");
29 return return_to; 26 return return_to;
30 } 27 }
31 28
32 const string& basic_op::get_realm() const { 29 const string& basic_op::get_realm() const {
33 assert(!realm.empty()); 30 assert(!realm.empty());
34 return realm; 31 return realm;
35 } 32 }
36 33
37 bool basic_op::has_identity() const { 34 bool basic_op::has_identity() const {
38 return !identity.empty(); 35 return !identity.empty();
39 } 36 }
40 const string& basic_op::get_claimed_id() const { 37 const string& basic_op::get_claimed_id() const {
41 if(claimed_id.empty()) 38 if(claimed_id.empty())
42 throw non_identity(OPKELE_CP_ "attempting to retrieve claimed_id of non-identity related request"); 39 throw non_identity(OPKELE_CP_ "attempting to retrieve claimed_id of non-identity related request");
43 assert(!identity.empty()); 40 assert(!identity.empty());
44 return claimed_id; 41 return claimed_id;
45 } 42 }
46 const string& basic_op::get_identity() const { 43 const string& basic_op::get_identity() const {
47 if(identity.empty()) 44 if(identity.empty())
48 throw non_identity(OPKELE_CP_ "attempting to retrieve identity of non-identity related request"); 45 throw non_identity(OPKELE_CP_ "attempting to retrieve identity of non-identity related request");
49 assert(!claimed_id.empty()); 46 assert(!claimed_id.empty());
50 return identity; 47 return identity;
51 } 48 }
52 49
53 bool basic_op::is_id_select() const { 50 bool basic_op::is_id_select() const {
54 return identity==IDURI_SELECT20; 51 return identity==IDURI_SELECT20;
55 } 52 }
56 53
57 void basic_op::select_identity(const string& c,const string& i) { 54 void basic_op::select_identity(const string& c,const string& i) {
58 claimed_id = c; identity = i; 55 claimed_id = c; identity = i;
59 } 56 }
60 void basic_op::set_claimed_id(const string& c) { 57 void basic_op::set_claimed_id(const string& c) {
61 claimed_id = c; 58 claimed_id = c;
62 } 59 }
63 60
64 basic_openid_message& basic_op::associate( 61 basic_openid_message& basic_op::associate(
65 basic_openid_message& oum, 62 basic_openid_message& oum,
66 const basic_openid_message& inm) try { 63 const basic_openid_message& inm) try {
67 assert(inm.get_field("mode")=="associate"); 64 assert(inm.get_field("mode")=="associate");
68 util::dh_t dh; 65 util::dh_t dh;
69 util::bignum_t c_pub; 66 util::bignum_t c_pub;
70 unsigned char key_digest[SHA256_DIGEST_LENGTH]; 67 unsigned char key_digest[SHA256_DIGEST_LENGTH];
71 size_t d_len = 0; 68 size_t d_len = 0;
72 enum { 69 enum {
73 sess_cleartext, sess_dh_sha1, sess_dh_sha256 70 sess_cleartext, sess_dh_sha1, sess_dh_sha256
74 } st = sess_cleartext; 71 } st = sess_cleartext;
75 string sts = inm.get_field("session_type"); 72 string sts = inm.get_field("session_type");
76 string ats = inm.get_field("assoc_type"); 73 string ats = inm.get_field("assoc_type");
77 if(sts=="DH-SHA1" || sts=="DH-SHA256") { 74 if(sts=="DH-SHA1" || sts=="DH-SHA256") {
78 if(!(dh = DH_new())) 75 if(!(dh = DH_new()))
79 throw exception_openssl(OPKELE_CP_ "failed to DH_new()"); 76 throw exception_openssl(OPKELE_CP_ "failed to DH_new()");
80 c_pub = util::base64_to_bignum(inm.get_field("dh_consumer_public")); 77 c_pub = util::base64_to_bignum(inm.get_field("dh_consumer_public"));
81 try { dh->p = util::base64_to_bignum(inm.get_field("dh_modulus")); 78 try { dh->p = util::base64_to_bignum(inm.get_field("dh_modulus"));
82 }catch(failed_lookup&) { 79 }catch(failed_lookup&) {
83 dh->p = util::dec_to_bignum(data::_default_p); } 80 dh->p = util::dec_to_bignum(data::_default_p); }
84 try { dh->g = util::base64_to_bignum(inm.get_field("dh_gen")); 81 try { dh->g = util::base64_to_bignum(inm.get_field("dh_gen"));
85 }catch(failed_lookup&) { 82 }catch(failed_lookup&) {
86 dh->g = util::dec_to_bignum(data::_default_g); } 83 dh->g = util::dec_to_bignum(data::_default_g); }
87 if(!DH_generate_key(dh)) 84 if(!DH_generate_key(dh))
88 throw exception_openssl(OPKELE_CP_ "failed to DH_generate_key()"); 85 throw exception_openssl(OPKELE_CP_ "failed to DH_generate_key()");
89 vector<unsigned char> ck(DH_size(dh)+1); 86 vector<unsigned char> ck(DH_size(dh)+1);
90 unsigned char *ckptr = &(ck.front())+1; 87 unsigned char *ckptr = &(ck.front())+1;
91 int cklen = DH_compute_key(ckptr,c_pub,dh); 88 int cklen = DH_compute_key(ckptr,c_pub,dh);
92 if(cklen<0) 89 if(cklen<0)
93 throw exception_openssl(OPKELE_CP_ "failed to DH_compute_key()"); 90 throw exception_openssl(OPKELE_CP_ "failed to DH_compute_key()");
94 if(cklen && (*ckptr)&0x80) { 91 if(cklen && (*ckptr)&0x80) {
95 (*(--ckptr)) = 0; ++cklen; } 92 (*(--ckptr)) = 0; ++cklen; }
96 if(sts=="DH-SHA1") { 93 if(sts=="DH-SHA1") {
97 SHA1(ckptr,cklen,key_digest); d_len = SHA_DIGEST_LENGTH; 94 SHA1(ckptr,cklen,key_digest); d_len = SHA_DIGEST_LENGTH;
98 }else if(sts=="DH-SHA256") { 95 }else if(sts=="DH-SHA256") {
99 SHA256(ckptr,cklen,key_digest); d_len = SHA256_DIGEST_LENGTH; 96 SHA256(ckptr,cklen,key_digest); d_len = SHA256_DIGEST_LENGTH;
100 }else 97 }else
101 throw internal_error(OPKELE_CP_ "I thought I knew the session type"); 98 throw internal_error(OPKELE_CP_ "I thought I knew the session type");
102 }else 99 }else
103 throw unsupported(OPKELE_CP_ "Unsupported session_type"); 100 throw unsupported(OPKELE_CP_ "Unsupported session_type");
104 assoc_t assoc; 101 assoc_t assoc;
105 if(ats=="HMAC-SHA1") 102 if(ats=="HMAC-SHA1")
106 assoc = alloc_assoc(ats,SHA_DIGEST_LENGTH,true); 103 assoc = alloc_assoc(ats,SHA_DIGEST_LENGTH,true);
107 else if(ats=="HMAC-SHA256") 104 else if(ats=="HMAC-SHA256")
108 assoc = alloc_assoc(ats,SHA256_DIGEST_LENGTH,true); 105 assoc = alloc_assoc(ats,SHA256_DIGEST_LENGTH,true);
109 else 106 else
110 throw unsupported(OPKELE_CP_ "Unsupported assoc_type"); 107 throw unsupported(OPKELE_CP_ "Unsupported assoc_type");
111 oum.reset_fields(); 108 oum.reset_fields();
112 oum.set_field("ns",OIURI_OPENID20); 109 oum.set_field("ns",OIURI_OPENID20);
113 oum.set_field("assoc_type",assoc->assoc_type()); 110 oum.set_field("assoc_type",assoc->assoc_type());
114 oum.set_field("assoc_handle",assoc->handle()); 111 oum.set_field("assoc_handle",assoc->handle());
115 oum.set_field("expires_in",util::long_to_string(assoc->expires_in())); 112 oum.set_field("expires_in",util::long_to_string(assoc->expires_in()));
116 secret_t secret = assoc->secret(); 113 secret_t secret = assoc->secret();
117 if(sts=="DH-SHA1" || sts=="DH-SHA256") { 114 if(sts=="DH-SHA1" || sts=="DH-SHA256") {
118 if(d_len != secret.size()) 115 if(d_len != secret.size())
119 throw bad_input(OPKELE_CP_ "Association secret and session MAC are not of the same size"); 116 throw bad_input(OPKELE_CP_ "Association secret and session MAC are not of the same size");
120 oum.set_field("session_type",sts); 117 oum.set_field("session_type",sts);
121 oum.set_field("dh_server_public",util::bignum_to_base64(dh->pub_key)); 118 oum.set_field("dh_server_public",util::bignum_to_base64(dh->pub_key));
122 string b64; secret.enxor_to_base64(key_digest,b64); 119 string b64; secret.enxor_to_base64(key_digest,b64);
123 oum.set_field("enc_mac_key",b64); 120 oum.set_field("enc_mac_key",b64);
124 }else /* TODO: support cleartext over encrypted connection */ 121 }else /* TODO: support cleartext over encrypted connection */
125 throw unsupported(OPKELE_CP_ "Unsupported session type"); 122 throw unsupported(OPKELE_CP_ "Unsupported session type");
126 return oum; 123 return oum;
127 } catch(unsupported& u) { 124 } catch(unsupported& u) {
128 oum.reset_fields(); 125 oum.reset_fields();
129 oum.set_field("ns",OIURI_OPENID20); 126 oum.set_field("ns",OIURI_OPENID20);
130 oum.set_field("error",u.what()); 127 oum.set_field("error",u.what());
131 oum.set_field("error_code","unsupported-type"); 128 oum.set_field("error_code","unsupported-type");
132 oum.set_field("session_type","DH-SHA256"); 129 oum.set_field("session_type","DH-SHA256");
133 oum.set_field("assoc_type","HMAC-SHA256"); 130 oum.set_field("assoc_type","HMAC-SHA256");
134 return oum; 131 return oum;
135 } 132 }
136 133
137 void basic_op::checkid_(const basic_openid_message& inm, 134 void basic_op::checkid_(const basic_openid_message& inm,
138 extension_t *ext) { 135 extension_t *ext) {
139 reset_vars(); 136 reset_vars();
140 string mode = inm.get_field("mode"); 137 string mode = inm.get_field("mode");
141 if(mode=="checkid_setup") 138 if(mode=="checkid_setup")
142 mode = mode_checkid_setup; 139 mode = mode_checkid_setup;
143 else if(mode=="checkid_immediate") 140 else if(mode=="checkid_immediate")
144 mode = mode_checkid_immediate; 141 mode = mode_checkid_immediate;
145 else 142 else
146 throw bad_input(OPKELE_CP_ "Invalid checkid_* mode"); 143 throw bad_input(OPKELE_CP_ "Invalid checkid_* mode");
147 try { 144 try {
148 assoc = retrieve_assoc(invalidate_handle=inm.get_field("assoc_handle")); 145 assoc = retrieve_assoc(invalidate_handle=inm.get_field("assoc_handle"));
149 invalidate_handle.clear(); 146 invalidate_handle.clear();
150 }catch(failed_lookup&) { 147 }catch(failed_lookup&) {
151 // no handle specified or no valid assoc found, go dumb 148 // no handle specified or no valid assoc found, go dumb
152 assoc = alloc_assoc("HMAC-SHA256",SHA256_DIGEST_LENGTH,true); 149 assoc = alloc_assoc("HMAC-SHA256",SHA256_DIGEST_LENGTH,true);
153 } 150 }
154 try { 151 try {
155 openid2 = (inm.get_field("ns")==OIURI_OPENID20); 152 openid2 = (inm.get_field("ns")==OIURI_OPENID20);
156 }catch(failed_lookup&) { openid2 = false; } 153 }catch(failed_lookup&) { openid2 = false; }
157 try { 154 try {
158 return_to = inm.get_field("return_to"); 155 return_to = inm.get_field("return_to");
159 }catch(failed_lookup&) { } 156 }catch(failed_lookup&) { }
160 if(openid2) { 157 if(openid2) {
161 try { 158 try {
162 realm = inm.get_field("realm"); 159 realm = inm.get_field("realm");
163 }catch(failed_lookup&) { 160 }catch(failed_lookup&) {
164 try { 161 try {
165 realm = inm.get_field("trust_root"); 162 realm = inm.get_field("trust_root");
166 }catch(failed_lookup&) { 163 }catch(failed_lookup&) {
167 if(return_to.empty()) 164 if(return_to.empty())
168 throw bad_input(OPKELE_CP_ 165 throw bad_input(OPKELE_CP_
169 "Both realm and return_to are unset"); 166 "Both realm and return_to are unset");
170 realm = return_to; 167 realm = return_to;
171 } 168 }
172 } 169 }
173 }else{ 170 }else{
174 try { 171 try {
175 realm = inm.get_field("trust_root"); 172 realm = inm.get_field("trust_root");
176 }catch(failed_lookup&) { 173 }catch(failed_lookup&) {
177 if(return_to.empty()) 174 if(return_to.empty())
178 throw bad_input(OPKELE_CP_ 175 throw bad_input(OPKELE_CP_
179 "Both realm and return_to are unset"); 176 "Both realm and return_to are unset");
180 realm = return_to; 177 realm = return_to;
181 } 178 }
182 } 179 }
183 try { 180 try {
184 identity = inm.get_field("identity"); 181 identity = inm.get_field("identity");
185 try { 182 try {
186 claimed_id = inm.get_field("claimed_id"); 183 claimed_id = inm.get_field("claimed_id");
187 }catch(failed_lookup&) { 184 }catch(failed_lookup&) {
188 if(openid2) 185 if(openid2)
189 throw bad_input(OPKELE_CP_ 186 throw bad_input(OPKELE_CP_
190 "claimed_id and identity must be either both present or both absent"); 187 "claimed_id and identity must be either both present or both absent");
191 } 188 }
192 }catch(failed_lookup&) { 189 }catch(failed_lookup&) {
193 if(openid2 && inm.has_field("claimed_id")) 190 if(openid2 && inm.has_field("claimed_id"))
194 throw bad_input(OPKELE_CP_ 191 throw bad_input(OPKELE_CP_
195 "claimed_id and identity must be either both present or both absent"); 192 "claimed_id and identity must be either both present or both absent");
196 } 193 }
197 verify_return_to(); 194 verify_return_to();
198 } 195 }
199 196
200 basic_openid_message& basic_op::id_res(basic_openid_message& om) { 197 basic_openid_message& basic_op::id_res(basic_openid_message& om) {
201 assert(assoc); 198 assert(assoc);
202 assert(!return_to.empty()); 199 assert(!return_to.empty());
203 assert(!is_id_select()); 200 assert(!is_id_select());
204 time_t now = time(0); 201 time_t now = time(0);
205 struct tm gmt; gmtime_r(&now,&gmt); 202 struct tm gmt; gmtime_r(&now,&gmt);
206 char w3timestr[24]; 203 char w3timestr[24];
207 if(!strftime(w3timestr,sizeof(w3timestr),"%Y-%m-%dT%H:%M:%SZ",&gmt)) 204 if(!strftime(w3timestr,sizeof(w3timestr),"%Y-%m-%dT%H:%M:%SZ",&gmt))
208 throw failed_conversion(OPKELE_CP_ 205 throw failed_conversion(OPKELE_CP_
209 "Failed to build time string for nonce" ); 206 "Failed to build time string for nonce" );
210 om.set_field("ns",OIURI_OPENID20); 207 om.set_field("ns",OIURI_OPENID20);
211 om.set_field("mode","id_res"); 208 om.set_field("mode","id_res");
212 om.set_field("op_endpoint",get_op_endpoint()); 209 om.set_field("op_endpoint",get_op_endpoint());
213 string ats = "ns,mode,op_endpoint,return_to,response_nonce," 210 string ats = "ns,mode,op_endpoint,return_to,response_nonce,"
214 "assoc_handle,signed"; 211 "assoc_handle,signed";
215 if(!identity.empty()) { 212 if(!identity.empty()) {
216 om.set_field("identity",identity); 213 om.set_field("identity",identity);
217 om.set_field("claimed_id",claimed_id); 214 om.set_field("claimed_id",claimed_id);
218 ats += ",identity,claimed_id"; 215 ats += ",identity,claimed_id";
219 } 216 }
220 om.set_field("return_to",return_to); 217 om.set_field("return_to",return_to);
221 string nonce = w3timestr; 218 string nonce = w3timestr;
222 om.set_field("response_nonce",alloc_nonce(nonce,assoc->stateless())); 219 om.set_field("response_nonce",alloc_nonce(nonce,assoc->stateless()));
223 if(!invalidate_handle.empty()) { 220 if(!invalidate_handle.empty()) {
224 om.set_field("invalidate_handle",invalidate_handle); 221 om.set_field("invalidate_handle",invalidate_handle);
225 ats += ",invalidate_handle"; 222 ats += ",invalidate_handle";
226 } 223 }
227 om.set_field("assoc_handle",assoc->handle()); 224 om.set_field("assoc_handle",assoc->handle());
228 om.add_to_signed(ats); 225 om.add_to_signed(ats);
229 om.set_field("sig",util::base64_signature(assoc,om)); 226 om.set_field("sig",util::base64_signature(assoc,om));
230 return om; 227 return om;
231 } 228 }
232 229
233 basic_openid_message& basic_op::cancel(basic_openid_message& om) { 230 basic_openid_message& basic_op::cancel(basic_openid_message& om) {
234 assert(!return_to.empty()); 231 assert(!return_to.empty());
235 om.set_field("ns",OIURI_OPENID20); 232 om.set_field("ns",OIURI_OPENID20);
236 om.set_field("mode","cancel"); 233 om.set_field("mode","cancel");
237 return om; 234 return om;
238 } 235 }
239 236
240 basic_openid_message& basic_op::error(basic_openid_message& om, 237 basic_openid_message& basic_op::error(basic_openid_message& om,
241 const string& error,const string& contact, 238 const string& error,const string& contact,
242 const string& reference ) { 239 const string& reference ) {
243 assert(!return_to.empty()); 240 assert(!return_to.empty());
244 om.set_field("ns",OIURI_OPENID20); 241 om.set_field("ns",OIURI_OPENID20);
245 om.set_field("mode","error"); 242 om.set_field("mode","error");
246 om.set_field("error",error); 243 om.set_field("error",error);
247 om.set_field("contact",contact); 244 om.set_field("contact",contact);
248 om.set_field("reference",reference); 245 om.set_field("reference",reference);
249 return om; 246 return om;
250 } 247 }
251 248
252 basic_openid_message& basic_op::setup_needed( 249 basic_openid_message& basic_op::setup_needed(
253 basic_openid_message& oum,const basic_openid_message& inm) { 250 basic_openid_message& oum,const basic_openid_message& inm) {
254 assert(mode==mode_checkid_immediate); 251 assert(mode==mode_checkid_immediate);
255 assert(!return_to.empty()); 252 assert(!return_to.empty());
256 if(openid2) { 253 if(openid2) {
257 oum.set_field("ns",OIURI_OPENID20); 254 oum.set_field("ns",OIURI_OPENID20);
258 oum.set_field("mode","setup_needed"); 255 oum.set_field("mode","setup_needed");
259 }else{ 256 }else{
260 oum.set_field("mode","id_res"); 257 oum.set_field("mode","id_res");
261 static const string setupmode = "checkid_setup"; 258 static const string setupmode = "checkid_setup";
262 oum.set_field("user_setup_url", 259 oum.set_field("user_setup_url",
263 util::change_mode_message_proxy(inm,setupmode) 260 util::change_mode_message_proxy(inm,setupmode)
264 .append_query(get_op_endpoint())); 261 .append_query(get_op_endpoint()));
265 } 262 }
266 return oum; 263 return oum;
267 } 264 }
268 265
269 basic_openid_message& basic_op::check_authentication( 266 basic_openid_message& basic_op::check_authentication(
270 basic_openid_message& oum, 267 basic_openid_message& oum,
271 const basic_openid_message& inm) try { 268 const basic_openid_message& inm) try {
272 assert(inm.get_field("mode")=="check_authentication"); 269 assert(inm.get_field("mode")=="check_authentication");
273 oum.reset_fields(); 270 oum.reset_fields();
274 oum.set_field("ns",OIURI_OPENID20); 271 oum.set_field("ns",OIURI_OPENID20);
275 bool o2; 272 bool o2;
276 try { 273 try {
277 o2 = (inm.get_field("ns")==OIURI_OPENID20); 274 o2 = (inm.get_field("ns")==OIURI_OPENID20);
278 }catch(failed_lookup&) { o2 = false; } 275 }catch(failed_lookup&) { o2 = false; }
279 string nonce; 276 string nonce;
280 if(o2) { 277 if(o2) {
281 try { 278 try {
282 if(!check_nonce(nonce = inm.get_field("response_nonce"))) 279 if(!check_nonce(nonce = inm.get_field("response_nonce")))
283 throw failed_check_authentication(OPKELE_CP_ "Invalid nonce"); 280 throw failed_check_authentication(OPKELE_CP_ "Invalid nonce");
284 }catch(failed_lookup&) { 281 }catch(failed_lookup&) {
285 throw failed_check_authentication(OPKELE_CP_ "No nonce provided with check_authentication request"); 282 throw failed_check_authentication(OPKELE_CP_ "No nonce provided with check_authentication request");
286 } 283 }
287 } 284 }
288 try { 285 try {
289 assoc = retrieve_assoc(inm.get_field("assoc_handle")); 286 assoc = retrieve_assoc(inm.get_field("assoc_handle"));
290 if(!assoc->stateless()) 287 if(!assoc->stateless())
291 throw failed_check_authentication(OPKELE_CP_ "Will not do check_authentication on a stateful handle"); 288 throw failed_check_authentication(OPKELE_CP_ "Will not do check_authentication on a stateful handle");
292 }catch(failed_lookup&) { 289 }catch(failed_lookup&) {
293 throw failed_check_authentication(OPKELE_CP_ "No assoc_handle or invalid assoc_handle specified with check_authentication request"); 290 throw failed_check_authentication(OPKELE_CP_ "No assoc_handle or invalid assoc_handle specified with check_authentication request");
294 } 291 }
295 static const string idresmode = "id_res"; 292 static const string idresmode = "id_res";
296 try { 293 try {
297 if(util::base64_signature(assoc,util::change_mode_message_proxy(inm,idresmode))!=inm.get_field("sig")) 294 if(util::base64_signature(assoc,util::change_mode_message_proxy(inm,idresmode))!=inm.get_field("sig"))
298 throw failed_check_authentication(OPKELE_CP_ "Signature mismatch"); 295 throw failed_check_authentication(OPKELE_CP_ "Signature mismatch");
299 }catch(failed_lookup&) { 296 }catch(failed_lookup&) {
300 throw failed_check_authentication(OPKELE_CP_ "failed to calculate signature"); 297 throw failed_check_authentication(OPKELE_CP_ "failed to calculate signature");
301 } 298 }
302 oum.set_field("is_valid","true"); 299 oum.set_field("is_valid","true");
303 try { 300 try {
304 string h = inm.get_field("invalidate_handle"); 301 string h = inm.get_field("invalidate_handle");
305 try { 302 try {
306 assoc_t ih = retrieve_assoc(h); 303 assoc_t ih = retrieve_assoc(h);
307 }catch(invalid_handle& ih) { 304 }catch(invalid_handle& ih) {
308 oum.set_field("invalidate_handle",h); 305 oum.set_field("invalidate_handle",h);
309 }catch(failed_lookup& ih) { 306 }catch(failed_lookup& ih) {
310 oum.set_field("invalidate_handle",h); 307 oum.set_field("invalidate_handle",h);
311 } 308 }
312 }catch(failed_lookup&) { } 309 }catch(failed_lookup&) { }
313 if(o2) { 310 if(o2) {
314 assert(!nonce.empty()); 311 assert(!nonce.empty());
315 invalidate_nonce(nonce); 312 invalidate_nonce(nonce);
316 } 313 }
317 return oum; 314 return oum;
318 }catch(failed_check_authentication& ) { 315 }catch(failed_check_authentication& ) {
319 oum.set_field("is_valid","false"); 316 oum.set_field("is_valid","false");
320 return oum; 317 return oum;
321 } 318 }
322 319
323 void basic_op::verify_return_to() { 320 void basic_op::verify_return_to() {
324 string nrealm = opkele::util::rfc_3986_normalize_uri(realm); 321 if(realm.find('#')!=string::npos)
325 if(nrealm.find('#')!=string::npos)
326 throw opkele::bad_realm(OPKELE_CP_ "authentication realm contains URI fragment"); 322 throw opkele::bad_realm(OPKELE_CP_ "authentication realm contains URI fragment");
327 string nrt = opkele::util::rfc_3986_normalize_uri(return_to); 323 if(!util::uri_matches_realm(return_to,realm))
328 string::size_type pr = nrealm.find("://"); 324 throw bad_return_to(OPKELE_CP_ "return_to URL doesn't match realm");
329 string::size_type prt = nrt.find("://");
330 assert(!(pr==string::npos || prt==string::npos));
331 pr += sizeof("://")-1;
332 prt += sizeof("://")-1;
333 if(!strncmp(nrealm.c_str()+pr,"*.",2)) {
334 pr = nrealm.find('.',pr);
335 prt = nrt.find('.',prt);
336 assert(pr!=string::npos);
337 if(prt==string::npos)
338 throw bad_return_to(
339 OPKELE_CP_ "return_to URL doesn't match realm");
340 // TODO: check for overgeneralized realm
341 }
342 string::size_type lr = nrealm.length();
343 string::size_type lrt = nrt.length();
344 if( (lrt-prt) < (lr-pr) )
345 throw bad_return_to(
346 OPKELE_CP_ "return_to URL doesn't match realm");
347 pair<const char*,const char*> mp = mismatch(
348 nrealm.c_str()+pr,nrealm.c_str()+lr,
349 nrt.c_str()+prt);
350 if( (*(mp.first-1))!='/'
351 && !strchr("/?#",*mp.second) )
352 throw bad_return_to(
353 OPKELE_CP_ "return_to URL doesn't match realm");
354 } 325 }
355 326
356} 327}