summaryrefslogtreecommitdiffabout
path: root/lib/basic_op.cc
Unidiff
Diffstat (limited to 'lib/basic_op.cc') (more/less context) (show whitespace changes)
-rw-r--r--lib/basic_op.cc1
1 files changed, 1 insertions, 0 deletions
diff --git a/lib/basic_op.cc b/lib/basic_op.cc
index 11ffb48..c89d1d7 100644
--- a/lib/basic_op.cc
+++ b/lib/basic_op.cc
@@ -140,96 +140,97 @@ namespace opkele {
140 else if(mode=="checkid_immediate") 140 else if(mode=="checkid_immediate")
141 mode = mode_checkid_immediate; 141 mode = mode_checkid_immediate;
142 else 142 else
143 throw bad_input(OPKELE_CP_ "Invalid checkid_* mode"); 143 throw bad_input(OPKELE_CP_ "Invalid checkid_* mode");
144 try { 144 try {
145 assoc = retrieve_assoc(invalidate_handle=inm.get_field("assoc_handle")); 145 assoc = retrieve_assoc(invalidate_handle=inm.get_field("assoc_handle"));
146 invalidate_handle.clear(); 146 invalidate_handle.clear();
147 }catch(failed_lookup&) { 147 }catch(failed_lookup&) {
148 // no handle specified or no valid assoc found, go dumb 148 // no handle specified or no valid assoc found, go dumb
149 assoc = alloc_assoc("HMAC-SHA256",SHA256_DIGEST_LENGTH,true); 149 assoc = alloc_assoc("HMAC-SHA256",SHA256_DIGEST_LENGTH,true);
150 } 150 }
151 try { 151 try {
152 openid2 = (inm.get_field("ns")==OIURI_OPENID20); 152 openid2 = (inm.get_field("ns")==OIURI_OPENID20);
153 }catch(failed_lookup&) { openid2 = false; } 153 }catch(failed_lookup&) { openid2 = false; }
154 try { 154 try {
155 return_to = inm.get_field("return_to"); 155 return_to = inm.get_field("return_to");
156 }catch(failed_lookup&) { } 156 }catch(failed_lookup&) { }
157 if(openid2) { 157 if(openid2) {
158 try { 158 try {
159 realm = inm.get_field("realm"); 159 realm = inm.get_field("realm");
160 }catch(failed_lookup&) { 160 }catch(failed_lookup&) {
161 try { 161 try {
162 realm = inm.get_field("trust_root"); 162 realm = inm.get_field("trust_root");
163 }catch(failed_lookup&) { 163 }catch(failed_lookup&) {
164 if(return_to.empty()) 164 if(return_to.empty())
165 throw bad_input(OPKELE_CP_ 165 throw bad_input(OPKELE_CP_
166 "Both realm and return_to are unset"); 166 "Both realm and return_to are unset");
167 realm = return_to; 167 realm = return_to;
168 } 168 }
169 } 169 }
170 }else{ 170 }else{
171 try { 171 try {
172 realm = inm.get_field("trust_root"); 172 realm = inm.get_field("trust_root");
173 }catch(failed_lookup&) { 173 }catch(failed_lookup&) {
174 if(return_to.empty()) 174 if(return_to.empty())
175 throw bad_input(OPKELE_CP_ 175 throw bad_input(OPKELE_CP_
176 "Both realm and return_to are unset"); 176 "Both realm and return_to are unset");
177 realm = return_to; 177 realm = return_to;
178 } 178 }
179 } 179 }
180 try { 180 try {
181 identity = inm.get_field("identity"); 181 identity = inm.get_field("identity");
182 try { 182 try {
183 claimed_id = inm.get_field("claimed_id"); 183 claimed_id = inm.get_field("claimed_id");
184 }catch(failed_lookup&) { 184 }catch(failed_lookup&) {
185 if(openid2) 185 if(openid2)
186 throw bad_input(OPKELE_CP_ 186 throw bad_input(OPKELE_CP_
187 "claimed_id and identity must be either both present or both absent"); 187 "claimed_id and identity must be either both present or both absent");
188 claimed_id = identity;
188 } 189 }
189 }catch(failed_lookup&) { 190 }catch(failed_lookup&) {
190 if(openid2 && inm.has_field("claimed_id")) 191 if(openid2 && inm.has_field("claimed_id"))
191 throw bad_input(OPKELE_CP_ 192 throw bad_input(OPKELE_CP_
192 "claimed_id and identity must be either both present or both absent"); 193 "claimed_id and identity must be either both present or both absent");
193 } 194 }
194 verify_return_to(); 195 verify_return_to();
195 } 196 }
196 197
197 basic_openid_message& basic_op::id_res(basic_openid_message& om) { 198 basic_openid_message& basic_op::id_res(basic_openid_message& om) {
198 assert(assoc); 199 assert(assoc);
199 assert(!return_to.empty()); 200 assert(!return_to.empty());
200 assert(!is_id_select()); 201 assert(!is_id_select());
201 time_t now = time(0); 202 time_t now = time(0);
202 struct tm gmt; gmtime_r(&now,&gmt); 203 struct tm gmt; gmtime_r(&now,&gmt);
203 char w3timestr[24]; 204 char w3timestr[24];
204 if(!strftime(w3timestr,sizeof(w3timestr),"%Y-%m-%dT%H:%M:%SZ",&gmt)) 205 if(!strftime(w3timestr,sizeof(w3timestr),"%Y-%m-%dT%H:%M:%SZ",&gmt))
205 throw failed_conversion(OPKELE_CP_ 206 throw failed_conversion(OPKELE_CP_
206 "Failed to build time string for nonce" ); 207 "Failed to build time string for nonce" );
207 om.set_field("ns",OIURI_OPENID20); 208 om.set_field("ns",OIURI_OPENID20);
208 om.set_field("mode","id_res"); 209 om.set_field("mode","id_res");
209 om.set_field("op_endpoint",get_op_endpoint()); 210 om.set_field("op_endpoint",get_op_endpoint());
210 string ats = "ns,mode,op_endpoint,return_to,response_nonce," 211 string ats = "ns,mode,op_endpoint,return_to,response_nonce,"
211 "assoc_handle,signed"; 212 "assoc_handle,signed";
212 if(!identity.empty()) { 213 if(!identity.empty()) {
213 om.set_field("identity",identity); 214 om.set_field("identity",identity);
214 om.set_field("claimed_id",claimed_id); 215 om.set_field("claimed_id",claimed_id);
215 ats += ",identity,claimed_id"; 216 ats += ",identity,claimed_id";
216 } 217 }
217 om.set_field("return_to",return_to); 218 om.set_field("return_to",return_to);
218 string nonce = w3timestr; 219 string nonce = w3timestr;
219 om.set_field("response_nonce",alloc_nonce(nonce,assoc->stateless())); 220 om.set_field("response_nonce",alloc_nonce(nonce,assoc->stateless()));
220 if(!invalidate_handle.empty()) { 221 if(!invalidate_handle.empty()) {
221 om.set_field("invalidate_handle",invalidate_handle); 222 om.set_field("invalidate_handle",invalidate_handle);
222 ats += ",invalidate_handle"; 223 ats += ",invalidate_handle";
223 } 224 }
224 om.set_field("assoc_handle",assoc->handle()); 225 om.set_field("assoc_handle",assoc->handle());
225 om.add_to_signed(ats); 226 om.add_to_signed(ats);
226 om.set_field("sig",util::base64_signature(assoc,om)); 227 om.set_field("sig",util::base64_signature(assoc,om));
227 return om; 228 return om;
228 } 229 }
229 230
230 basic_openid_message& basic_op::cancel(basic_openid_message& om) { 231 basic_openid_message& basic_op::cancel(basic_openid_message& om) {
231 assert(!return_to.empty()); 232 assert(!return_to.empty());
232 om.set_field("ns",OIURI_OPENID20); 233 om.set_field("ns",OIURI_OPENID20);
233 om.set_field("mode","cancel"); 234 om.set_field("mode","cancel");
234 return om; 235 return om;
235 } 236 }