summaryrefslogtreecommitdiff
authorMichael Krelin <hacker@klever.net>2013-11-25 18:57:57 (UTC)
committer Michael Krelin <hacker@klever.net>2013-11-25 18:57:57 (UTC)
commit706ed5b980c48ad807923d36741f19b21f2911a6 (patch) (side-by-side diff)
treef749d44a744190eb626251dda7ee7e3d3d74ef40
parent2c9aa9d30d3b833954b4fa584293e6e5a817f102 (diff)
downloadclipperz-706ed5b980c48ad807923d36741f19b21f2911a6.zip
clipperz-706ed5b980c48ad807923d36741f19b21f2911a6.tar.gz
clipperz-706ed5b980c48ad807923d36741f19b21f2911a6.tar.bz2
typo fix
Diffstat (more/less context) (ignore whitespace changes)
-rw-r--r--backend/node/src/clipperz.js2
1 files changed, 1 insertions, 1 deletions
diff --git a/backend/node/src/clipperz.js b/backend/node/src/clipperz.js
index 6bf56bb..c6d776a 100644
--- a/backend/node/src/clipperz.js
+++ b/backend/node/src/clipperz.js
@@ -136,49 +136,49 @@ var CLIPPERZ = module.exports = function(CONFIG) {
});
}]
},function(e,r) {
if(e) return cb(e);
req.session.C = ppp.C; req.session.A = ppp.A;
req.session.s = r.u.u_srp_s; req.session.v = r.u.u_srp_v;
req.session.u = r.u.u_id;
req.session.b = clipperz_random();
req.session.B = BIGNUM(req.session.v,16).add(srp_g.powm(BIGNUM(req.session.b,16),srp_n)).toString(16);
var rv = {s:req.session.s,B:req.session.B}
if(r.otp && r.otp.otp_ref) rv.oneTimePassword=r.otp.otp_ref;
res.res(rv);
});
case 'credentialCheck':
var u = clipperz_hash(BIGNUM(req.session.B,16).toString(10));
var A = BIGNUM(req.session.A,16);
var S = A.mul(BIGNUM(req.session.v,16).powm(BIGNUM(u,16),srp_n)).powm(
BIGNUM(req.session.b,16), srp_n);
var K = clipperz_hash(S.toString(10));
var M1 = clipperz_hash(A.toString(10)+BIGNUM(req.session.B,16).toString(10)+K.toString(16));
if(M1!=ppp.M1) return res.res({error:'?'});
req.session.K = K;
var M2 = clipperz_hash(A.toString(10)+M1+K.toString(16));
- return res.res({M2:M2,connectionId:'',loginInfo:{latest:{},current:{}},offlineCopyNeededd:false,lock:'----'});
+ return res.res({M2:M2,connectionId:'',loginInfo:{latest:{},current:{}},offlineCopyNeeded:false,lock:'----'});
case 'oneTimePassword': return PG.Q(
"UPDATE clipperz.theotp AS otp"
+" SET"
+" otps_id = CASE WHEN s.otps_code!='ACTIVE' THEN s.otps_id ELSE ("
+" SELECT ss.otps_id FROM clipperz.otpstatus AS ss WHERE ss.otps_code=CASE"
+" WHEN otp.otp_key_checksum=$2 THEN 'REQUESTED'"
+" ELSE 'DISABLED' END"
+" ) END,"
+" otp_data = CASE WHEN s.otps_code='ACTIVE' THEN '' ELSE otp.otp_data END,"
+" otp_utime = current_timestamp,"
+" otp_rtime = CASE WHEN otp.otp_key_checksum=$2 THEN current_timestamp ELSE otp.otp_rtime END"
+" FROM clipperz.otpstatus AS s, clipperz.theotp AS o"
+" WHERE"
+" o.otp_id=otp.otp_id AND otp.otps_id=s.otps_id AND otp.otp_key=$1"
+" RETURNING otp.u_id, s.otps_code, otp.otp_id, otp.otp_key_checksum, o.otp_data, otp.otp_version",
[ ppp.oneTimePasswordKey, ppp.oneTimePasswordKeyChecksum ],
function(e,r) {
if(e) return cb(e);
if(!r.rowCount) return cb(new Error('OTP not found'));
r=r.rows[0];
if(r.otp_key_checksum!=ppp.oneTimePasswordKeyChecksum)
return cb(new Error('OTP was disabled because of checksum mismatch'));
if(r.otps_code!='ACTIVE')