summaryrefslogtreecommitdiffabout
authorMichael Krelin <hacker@klever.net>2007-11-21 17:05:50 (UTC)
committer Michael Krelin <hacker@klever.net>2007-11-21 17:05:50 (UTC)
commitd9772d76607ad5b293e385df26cce4c87b8f6e54 (patch) (unidiff)
tree2839b510d90652a429af68c37970bed1d63970fd
parent55008364921771a74a1192411583a72cc05adfa6 (diff)
downloadlibopkele-d9772d76607ad5b293e385df26cce4c87b8f6e54.zip
libopkele-d9772d76607ad5b293e385df26cce4c87b8f6e54.tar.gz
libopkele-d9772d76607ad5b293e385df26cce4c87b8f6e54.tar.bz2
further calming compiler down
Signed-off-by: Michael Krelin <hacker@klever.net>
Diffstat (more/less context) (ignore whitespace changes)
-rw-r--r--lib/consumer.cc2
-rw-r--r--lib/extension.cc6
-rw-r--r--lib/sreg.cc6
-rw-r--r--test/test.cc6
4 files changed, 10 insertions, 10 deletions
diff --git a/lib/consumer.cc b/lib/consumer.cc
index d578546..7881f5f 100644
--- a/lib/consumer.cc
+++ b/lib/consumer.cc
@@ -1,440 +1,440 @@
1#include <algorithm> 1#include <algorithm>
2#include <cassert> 2#include <cassert>
3#include <cstring> 3#include <cstring>
4#include <opkele/util.h> 4#include <opkele/util.h>
5#include <opkele/exception.h> 5#include <opkele/exception.h>
6#include <opkele/data.h> 6#include <opkele/data.h>
7#include <opkele/consumer.h> 7#include <opkele/consumer.h>
8#include <openssl/sha.h> 8#include <openssl/sha.h>
9#include <openssl/hmac.h> 9#include <openssl/hmac.h>
10#include <curl/curl.h> 10#include <curl/curl.h>
11 11
12#include <iostream> 12#include <iostream>
13 13
14#include "config.h" 14#include "config.h"
15 15
16#include <pcre.h> 16#include <pcre.h>
17 17
18namespace opkele { 18namespace opkele {
19 using namespace std; 19 using namespace std;
20 20
21 class pcre_matches_t { 21 class pcre_matches_t {
22 public: 22 public:
23 int *_ov; 23 int *_ov;
24 int _s; 24 int _s;
25 25
26 pcre_matches_t() : _ov(0), _s(0) { } 26 pcre_matches_t() : _ov(0), _s(0) { }
27 pcre_matches_t(int s) : _ov(0), _s(s) { 27 pcre_matches_t(int s) : _ov(0), _s(s) {
28 if(_s&1) ++_s; 28 if(_s&1) ++_s;
29 _s += _s>>1; 29 _s += _s>>1;
30 _ov = new int[_s]; 30 _ov = new int[_s];
31 } 31 }
32 ~pcre_matches_t() throw() { if(_ov) delete[] _ov; } 32 ~pcre_matches_t() throw() { if(_ov) delete[] _ov; }
33 33
34 int begin(int i) const { return _ov[i<<1]; } 34 int begin(int i) const { return _ov[i<<1]; }
35 int end(int i) const { return _ov[(i<<1)+1]; } 35 int end(int i) const { return _ov[(i<<1)+1]; }
36 int length(int i) const { int t=i<<1; return _ov[t+1]-_ov[t]; } 36 int length(int i) const { int t=i<<1; return _ov[t+1]-_ov[t]; }
37 }; 37 };
38 38
39 class pcre_t { 39 class pcre_t {
40 public: 40 public:
41 pcre *_p; 41 pcre *_p;
42 42
43 pcre_t() : _p(0) { } 43 pcre_t() : _p(0) { }
44 pcre_t(pcre *p) : _p(p) { } 44 pcre_t(pcre *p) : _p(p) { }
45 pcre_t(const char *re,int opts) : _p(0) { 45 pcre_t(const char *re,int opts) : _p(0) {
46 static const char *errptr; static int erroffset; 46 static const char *errptr; static int erroffset;
47 _p = pcre_compile(re,opts,&errptr,&erroffset,NULL); 47 _p = pcre_compile(re,opts,&errptr,&erroffset,NULL);
48 if(!_p) 48 if(!_p)
49 throw internal_error(OPKELE_CP_ string("Failed to compile regexp: ")+errptr); 49 throw internal_error(OPKELE_CP_ string("Failed to compile regexp: ")+errptr);
50 } 50 }
51 ~pcre_t() throw() { if(_p) (*pcre_free)(_p); } 51 ~pcre_t() throw() { if(_p) (*pcre_free)(_p); }
52 52
53 pcre_t& operator=(pcre *p) { if(_p) (*pcre_free)(_p); _p=p; return *this; } 53 pcre_t& operator=(pcre *p) { if(_p) (*pcre_free)(_p); _p=p; return *this; }
54 54
55 operator const pcre*(void) const { return _p; } 55 operator const pcre*(void) const { return _p; }
56 operator pcre*(void) { return _p; } 56 operator pcre*(void) { return _p; }
57 57
58 int exec(const string& s,pcre_matches_t& m) { 58 int exec(const string& s,pcre_matches_t& m) {
59 if(!_p) 59 if(!_p)
60 throw internal_error(OPKELE_CP_ "Trying to execute absent regexp"); 60 throw internal_error(OPKELE_CP_ "Trying to execute absent regexp");
61 return pcre_exec(_p,NULL,s.c_str(),s.length(),0,0,m._ov,m._s); 61 return pcre_exec(_p,NULL,s.c_str(),s.length(),0,0,m._ov,m._s);
62 } 62 }
63 }; 63 };
64 64
65 class curl_t { 65 class curl_t {
66 public: 66 public:
67 CURL *_c; 67 CURL *_c;
68 68
69 curl_t() : _c(0) { } 69 curl_t() : _c(0) { }
70 curl_t(CURL *c) : _c(c) { } 70 curl_t(CURL *c) : _c(c) { }
71 ~curl_t() throw() { if(_c) curl_easy_cleanup(_c); } 71 ~curl_t() throw() { if(_c) curl_easy_cleanup(_c); }
72 72
73 curl_t& operator=(CURL *c) { if(_c) curl_easy_cleanup(_c); _c=c; return *this; } 73 curl_t& operator=(CURL *c) { if(_c) curl_easy_cleanup(_c); _c=c; return *this; }
74 74
75 operator const CURL*(void) const { return _c; } 75 operator const CURL*(void) const { return _c; }
76 operator CURL*(void) { return _c; } 76 operator CURL*(void) { return _c; }
77 }; 77 };
78 78
79 static CURLcode curl_misc_sets(CURL* c) { 79 static CURLcode curl_misc_sets(CURL* c) {
80 CURLcode r; 80 CURLcode r;
81 (r=curl_easy_setopt(c,CURLOPT_FOLLOWLOCATION,1)) 81 (r=curl_easy_setopt(c,CURLOPT_FOLLOWLOCATION,1))
82 || (r=curl_easy_setopt(c,CURLOPT_MAXREDIRS,5)) 82 || (r=curl_easy_setopt(c,CURLOPT_MAXREDIRS,5))
83 || (r=curl_easy_setopt(c,CURLOPT_DNS_CACHE_TIMEOUT,120)) 83 || (r=curl_easy_setopt(c,CURLOPT_DNS_CACHE_TIMEOUT,120))
84 || (r=curl_easy_setopt(c,CURLOPT_DNS_USE_GLOBAL_CACHE,1)) 84 || (r=curl_easy_setopt(c,CURLOPT_DNS_USE_GLOBAL_CACHE,1))
85 || (r=curl_easy_setopt(c,CURLOPT_USERAGENT,PACKAGE_NAME"/"PACKAGE_SRC_VERSION)) 85 || (r=curl_easy_setopt(c,CURLOPT_USERAGENT,PACKAGE_NAME"/"PACKAGE_SRC_VERSION))
86 || (r=curl_easy_setopt(c,CURLOPT_TIMEOUT,20)) 86 || (r=curl_easy_setopt(c,CURLOPT_TIMEOUT,20))
87 #ifdefDISABLE_CURL_SSL_VERIFYHOST 87 #ifdefDISABLE_CURL_SSL_VERIFYHOST
88 || (r=curl_easy_setopt(c,CURLOPT_SSL_VERIFYHOST,0)) 88 || (r=curl_easy_setopt(c,CURLOPT_SSL_VERIFYHOST,0))
89#endif 89#endif
90 #ifdefDISABLE_CURL_SSL_VERIFYPEER 90 #ifdefDISABLE_CURL_SSL_VERIFYPEER
91 || (r=curl_easy_setopt(c,CURLOPT_SSL_VERIFYPEER,0)) 91 || (r=curl_easy_setopt(c,CURLOPT_SSL_VERIFYPEER,0))
92#endif 92#endif
93 ; 93 ;
94 return r; 94 return r;
95 } 95 }
96 96
97 static size_t _curl_tostring(void *ptr,size_t size,size_t nmemb,void *stream) { 97 static size_t _curl_tostring(void *ptr,size_t size,size_t nmemb,void *stream) {
98 string *str = (string*)stream; 98 string *str = (string*)stream;
99 size_t bytes = size*nmemb; 99 size_t bytes = size*nmemb;
100 size_t get = min(16384-str->length(),bytes); 100 size_t get = min(16384-str->length(),bytes);
101 str->append((const char*)ptr,get); 101 str->append((const char*)ptr,get);
102 return get; 102 return get;
103 } 103 }
104 104
105 assoc_t consumer_t::associate(const string& server) { 105 assoc_t consumer_t::associate(const string& server) {
106 util::dh_t dh = DH_new(); 106 util::dh_t dh = DH_new();
107 if(!dh) 107 if(!dh)
108 throw exception_openssl(OPKELE_CP_ "failed to DH_new()"); 108 throw exception_openssl(OPKELE_CP_ "failed to DH_new()");
109 dh->p = util::dec_to_bignum(data::_default_p); 109 dh->p = util::dec_to_bignum(data::_default_p);
110 dh->g = util::dec_to_bignum(data::_default_g); 110 dh->g = util::dec_to_bignum(data::_default_g);
111 if(!DH_generate_key(dh)) 111 if(!DH_generate_key(dh))
112 throw exception_openssl(OPKELE_CP_ "failed to DH_generate_key()"); 112 throw exception_openssl(OPKELE_CP_ "failed to DH_generate_key()");
113 string request = 113 string request =
114 "openid.mode=associate" 114 "openid.mode=associate"
115 "&openid.assoc_type=HMAC-SHA1" 115 "&openid.assoc_type=HMAC-SHA1"
116 "&openid.session_type=DH-SHA1" 116 "&openid.session_type=DH-SHA1"
117 "&openid.dh_consumer_public="; 117 "&openid.dh_consumer_public=";
118 request += util::url_encode(util::bignum_to_base64(dh->pub_key)); 118 request += util::url_encode(util::bignum_to_base64(dh->pub_key));
119 curl_t curl = curl_easy_init(); 119 curl_t curl = curl_easy_init();
120 if(!curl) 120 if(!curl)
121 throw exception_curl(OPKELE_CP_ "failed to curl_easy_init()"); 121 throw exception_curl(OPKELE_CP_ "failed to curl_easy_init()");
122 string response; 122 string response;
123 CURLcode r; 123 CURLcode r;
124 (r=curl_misc_sets(curl)) 124 (r=curl_misc_sets(curl))
125 || (r=curl_easy_setopt(curl,CURLOPT_URL,server.c_str())) 125 || (r=curl_easy_setopt(curl,CURLOPT_URL,server.c_str()))
126 || (r=curl_easy_setopt(curl,CURLOPT_POST,1)) 126 || (r=curl_easy_setopt(curl,CURLOPT_POST,1))
127 || (r=curl_easy_setopt(curl,CURLOPT_POSTFIELDS,request.data())) 127 || (r=curl_easy_setopt(curl,CURLOPT_POSTFIELDS,request.data()))
128 || (r=curl_easy_setopt(curl,CURLOPT_POSTFIELDSIZE,request.length())) 128 || (r=curl_easy_setopt(curl,CURLOPT_POSTFIELDSIZE,request.length()))
129 || (r=curl_easy_setopt(curl,CURLOPT_WRITEFUNCTION,_curl_tostring)) 129 || (r=curl_easy_setopt(curl,CURLOPT_WRITEFUNCTION,_curl_tostring))
130 || (r=curl_easy_setopt(curl,CURLOPT_WRITEDATA,&response)) 130 || (r=curl_easy_setopt(curl,CURLOPT_WRITEDATA,&response))
131 ; 131 ;
132 if(r) 132 if(r)
133 throw exception_curl(OPKELE_CP_ "failed to curl_easy_setopt()",r); 133 throw exception_curl(OPKELE_CP_ "failed to curl_easy_setopt()",r);
134 if( (r=curl_easy_perform(curl)) ) 134 if( (r=curl_easy_perform(curl)) )
135 throw exception_curl(OPKELE_CP_ "failed to curl_easy_perform()",r); 135 throw exception_curl(OPKELE_CP_ "failed to curl_easy_perform()",r);
136 params_t p; p.parse_keyvalues(response); 136 params_t p; p.parse_keyvalues(response);
137 if(p.has_param("assoc_type") && p.get_param("assoc_type")!="HMAC-SHA1") 137 if(p.has_param("assoc_type") && p.get_param("assoc_type")!="HMAC-SHA1")
138 throw bad_input(OPKELE_CP_ "unsupported assoc_type"); 138 throw bad_input(OPKELE_CP_ "unsupported assoc_type");
139 string st; 139 string st;
140 if(p.has_param("session_type")) st = p.get_param("session_type"); 140 if(p.has_param("session_type")) st = p.get_param("session_type");
141 if((!st.empty()) && st!="DH-SHA1") 141 if((!st.empty()) && st!="DH-SHA1")
142 throw bad_input(OPKELE_CP_ "unsupported session_type"); 142 throw bad_input(OPKELE_CP_ "unsupported session_type");
143 secret_t secret; 143 secret_t secret;
144 if(st.empty()) { 144 if(st.empty()) {
145 secret.from_base64(p.get_param("mac_key")); 145 secret.from_base64(p.get_param("mac_key"));
146 }else{ 146 }else{
147 util::bignum_t s_pub = util::base64_to_bignum(p.get_param("dh_server_public")); 147 util::bignum_t s_pub = util::base64_to_bignum(p.get_param("dh_server_public"));
148 vector<unsigned char> ck(DH_size(dh)+1); 148 vector<unsigned char> ck(DH_size(dh)+1);
149 unsigned char *ckptr = &(ck.front())+1; 149 unsigned char *ckptr = &(ck.front())+1;
150 int cklen = DH_compute_key(ckptr,s_pub,dh); 150 int cklen = DH_compute_key(ckptr,s_pub,dh);
151 if(cklen<0) 151 if(cklen<0)
152 throw exception_openssl(OPKELE_CP_ "failed to DH_compute_key()"); 152 throw exception_openssl(OPKELE_CP_ "failed to DH_compute_key()");
153 if(cklen && (*ckptr)&0x80) { 153 if(cklen && (*ckptr)&0x80) {
154 (*(--ckptr)) = 0; ++cklen; 154 (*(--ckptr)) = 0; ++cklen;
155 } 155 }
156 unsigned char key_sha1[SHA_DIGEST_LENGTH]; 156 unsigned char key_sha1[SHA_DIGEST_LENGTH];
157 SHA1(ckptr,cklen,key_sha1); 157 SHA1(ckptr,cklen,key_sha1);
158 secret.enxor_from_base64(key_sha1,p.get_param("enc_mac_key")); 158 secret.enxor_from_base64(key_sha1,p.get_param("enc_mac_key"));
159 } 159 }
160 int expires_in = 0; 160 int expires_in = 0;
161 if(p.has_param("expires_in")) { 161 if(p.has_param("expires_in")) {
162 expires_in = util::string_to_long(p.get_param("expires_in")); 162 expires_in = util::string_to_long(p.get_param("expires_in"));
163 }else if(p.has_param("issued") && p.has_param("expiry")) { 163 }else if(p.has_param("issued") && p.has_param("expiry")) {
164 expires_in = util::w3c_to_time(p.get_param("expiry"))-util::w3c_to_time(p.get_param("issued")); 164 expires_in = util::w3c_to_time(p.get_param("expiry"))-util::w3c_to_time(p.get_param("issued"));
165 }else 165 }else
166 throw bad_input(OPKELE_CP_ "no expiration information"); 166 throw bad_input(OPKELE_CP_ "no expiration information");
167 return store_assoc(server,p.get_param("assoc_handle"),secret,expires_in); 167 return store_assoc(server,p.get_param("assoc_handle"),secret,expires_in);
168 } 168 }
169 169
170 string consumer_t::checkid_immediate(const string& identity,const string& return_to,const string& trust_root,extension_t *ext) { 170 string consumer_t::checkid_immediate(const string& identity,const string& return_to,const string& trust_root,extension_t *ext) {
171 return checkid_(mode_checkid_immediate,identity,return_to,trust_root,ext); 171 return checkid_(mode_checkid_immediate,identity,return_to,trust_root,ext);
172 } 172 }
173 string consumer_t::checkid_setup(const string& identity,const string& return_to,const string& trust_root,extension_t *ext) { 173 string consumer_t::checkid_setup(const string& identity,const string& return_to,const string& trust_root,extension_t *ext) {
174 return checkid_(mode_checkid_setup,identity,return_to,trust_root,ext); 174 return checkid_(mode_checkid_setup,identity,return_to,trust_root,ext);
175 } 175 }
176 string consumer_t::checkid_(mode_t mode,const string& identity,const string& return_to,const string& trust_root,extension_t *ext) { 176 string consumer_t::checkid_(mode_t mode,const string& identity,const string& return_to,const string& trust_root,extension_t *ext) {
177 params_t p; 177 params_t p;
178 if(mode==mode_checkid_immediate) 178 if(mode==mode_checkid_immediate)
179 p["mode"]="checkid_immediate"; 179 p["mode"]="checkid_immediate";
180 else if(mode==mode_checkid_setup) 180 else if(mode==mode_checkid_setup)
181 p["mode"]="checkid_setup"; 181 p["mode"]="checkid_setup";
182 else 182 else
183 throw bad_input(OPKELE_CP_ "unknown checkid_* mode"); 183 throw bad_input(OPKELE_CP_ "unknown checkid_* mode");
184 string iurl = canonicalize(identity); 184 string iurl = canonicalize(identity);
185 string server, delegate; 185 string server, delegate;
186 retrieve_links(iurl,server,delegate); 186 retrieve_links(iurl,server,delegate);
187 p["identity"] = delegate.empty()?iurl:delegate; 187 p["identity"] = delegate.empty()?iurl:delegate;
188 if(!trust_root.empty()) 188 if(!trust_root.empty())
189 p["trust_root"] = trust_root; 189 p["trust_root"] = trust_root;
190 p["return_to"] = return_to; 190 p["return_to"] = return_to;
191 try { 191 try {
192 string ah = find_assoc(server)->handle(); 192 string ah = find_assoc(server)->handle();
193 p["assoc_handle"] = ah; 193 p["assoc_handle"] = ah;
194 }catch(failed_lookup& fl) { 194 }catch(failed_lookup& fl) {
195 string ah = associate(server)->handle(); 195 string ah = associate(server)->handle();
196 p["assoc_handle"] = ah; 196 p["assoc_handle"] = ah;
197 } 197 }
198 if(ext) ext->checkid_hook(p,identity); 198 if(ext) ext->checkid_hook(p,identity);
199 return p.append_query(server); 199 return p.append_query(server);
200 } 200 }
201 201
202 void consumer_t::id_res(const params_t& pin,const string& identity,extension_t *ext) { 202 void consumer_t::id_res(const params_t& pin,const string& identity,extension_t *ext) {
203 if(pin.has_param("openid.user_setup_url")) 203 if(pin.has_param("openid.user_setup_url"))
204 throw id_res_setup(OPKELE_CP_ "assertion failed, setup url provided",pin.get_param("openid.user_setup_url")); 204 throw id_res_setup(OPKELE_CP_ "assertion failed, setup url provided",pin.get_param("openid.user_setup_url"));
205 string server,delegate; 205 string server,delegate;
206 retrieve_links(identity.empty()?pin.get_param("openid.identity"):canonicalize(identity),server,delegate); 206 retrieve_links(identity.empty()?pin.get_param("openid.identity"):canonicalize(identity),server,delegate);
207 params_t ps; 207 params_t ps;
208 try { 208 try {
209 assoc_t assoc = retrieve_assoc(server,pin.get_param("openid.assoc_handle")); 209 assoc_t assoc = retrieve_assoc(server,pin.get_param("openid.assoc_handle"));
210 if(assoc->is_expired()) /* TODO: or should I throw some other exception to force programmer fix his implementation? */ 210 if(assoc->is_expired()) /* TODO: or should I throw some other exception to force programmer fix his implementation? */
211 throw failed_lookup(OPKELE_CP_ "retrieve_assoc() has returned expired handle"); 211 throw failed_lookup(OPKELE_CP_ "retrieve_assoc() has returned expired handle");
212 const string& sigenc = pin.get_param("openid.sig"); 212 const string& sigenc = pin.get_param("openid.sig");
213 vector<unsigned char> sig; 213 vector<unsigned char> sig;
214 util::decode_base64(sigenc,sig); 214 util::decode_base64(sigenc,sig);
215 const string& slist = pin.get_param("openid.signed"); 215 const string& slist = pin.get_param("openid.signed");
216 string kv; 216 string kv;
217 string::size_type p = 0; 217 string::size_type p = 0;
218 while(true) { 218 while(true) {
219 string::size_type co = slist.find(',',p); 219 string::size_type co = slist.find(',',p);
220 string f = (co==string::npos)?slist.substr(p):slist.substr(p,co-p); 220 string f = (co==string::npos)?slist.substr(p):slist.substr(p,co-p);
221 kv += f; 221 kv += f;
222 kv += ':'; 222 kv += ':';
223 f.insert(0,"openid."); 223 f.insert(0,"openid.");
224 kv += pin.get_param(f); 224 kv += pin.get_param(f);
225 kv += '\n'; 225 kv += '\n';
226 if(ext) ps[f.substr(sizeof("openid.")-1)] = pin.get_param(f); 226 if(ext) ps[f.substr(sizeof("openid.")-1)] = pin.get_param(f);
227 if(co==string::npos) 227 if(co==string::npos)
228 break; 228 break;
229 p = co+1; 229 p = co+1;
230 } 230 }
231 secret_t secret = assoc->secret(); 231 secret_t secret = assoc->secret();
232 unsigned int md_len = 0; 232 unsigned int md_len = 0;
233 unsigned char *md = HMAC( 233 unsigned char *md = HMAC(
234 EVP_sha1(), 234 EVP_sha1(),
235 &(secret.front()),secret.size(), 235 &(secret.front()),secret.size(),
236 (const unsigned char *)kv.data(),kv.length(), 236 (const unsigned char *)kv.data(),kv.length(),
237 0,&md_len); 237 0,&md_len);
238 if(sig.size()!=md_len || memcmp(&(sig.front()),md,md_len)) 238 if(sig.size()!=md_len || memcmp(&(sig.front()),md,md_len))
239 throw id_res_mismatch(OPKELE_CP_ "signature mismatch"); 239 throw id_res_mismatch(OPKELE_CP_ "signature mismatch");
240 }catch(failed_lookup& e) { /* XXX: more specific? */ 240 }catch(failed_lookup& e) { /* XXX: more specific? */
241 const string& slist = pin.get_param("openid.signed"); 241 const string& slist = pin.get_param("openid.signed");
242 string::size_type pp = 0; 242 string::size_type pp = 0;
243 params_t p; 243 params_t p;
244 while(true) { 244 while(true) {
245 string::size_type co = slist.find(',',pp); 245 string::size_type co = slist.find(',',pp);
246 string f = "openid."; 246 string f = "openid.";
247 f += (co==string::npos)?slist.substr(pp):slist.substr(pp,co-pp); 247 f += (co==string::npos)?slist.substr(pp):slist.substr(pp,co-pp);
248 p[f] = pin.get_param(f); 248 p[f] = pin.get_param(f);
249 if(co==string::npos) 249 if(co==string::npos)
250 break; 250 break;
251 pp = co+1; 251 pp = co+1;
252 } 252 }
253 p["openid.assoc_handle"] = pin.get_param("openid.assoc_handle"); 253 p["openid.assoc_handle"] = pin.get_param("openid.assoc_handle");
254 p["openid.sig"] = pin.get_param("openid.sig"); 254 p["openid.sig"] = pin.get_param("openid.sig");
255 p["openid.signed"] = pin.get_param("openid.signed"); 255 p["openid.signed"] = pin.get_param("openid.signed");
256 try { 256 try {
257 string ih = pin.get_param("openid.invalidate_handle"); 257 string ih = pin.get_param("openid.invalidate_handle");
258 p["openid.invalidate_handle"] = ih; 258 p["openid.invalidate_handle"] = ih;
259 }catch(failed_lookup& fl) { } 259 }catch(failed_lookup& fl) { }
260 try { 260 try {
261 check_authentication(server,p); 261 check_authentication(server,p);
262 }catch(failed_check_authentication& fca) { 262 }catch(failed_check_authentication& fca) {
263 throw id_res_failed(OPKELE_CP_ "failed to check_authentication()"); 263 throw id_res_failed(OPKELE_CP_ "failed to check_authentication()");
264 } 264 }
265 } 265 }
266 if(ext) ext->id_res_hook(pin,ps,identity); 266 if(ext) ext->id_res_hook(pin,ps,identity);
267 } 267 }
268 268
269 void consumer_t::check_authentication(const string& server,const params_t& p) { 269 void consumer_t::check_authentication(const string& server,const params_t& p) {
270 string request = "openid.mode=check_authentication"; 270 string request = "openid.mode=check_authentication";
271 for(params_t::const_iterator i=p.begin();i!=p.end();++i) { 271 for(params_t::const_iterator i=p.begin();i!=p.end();++i) {
272 if(i->first!="openid.mode") { 272 if(i->first!="openid.mode") {
273 request += '&'; 273 request += '&';
274 request += i->first; 274 request += i->first;
275 request += '='; 275 request += '=';
276 request += util::url_encode(i->second); 276 request += util::url_encode(i->second);
277 } 277 }
278 } 278 }
279 curl_t curl = curl_easy_init(); 279 curl_t curl = curl_easy_init();
280 if(!curl) 280 if(!curl)
281 throw exception_curl(OPKELE_CP_ "failed to curl_easy_init()"); 281 throw exception_curl(OPKELE_CP_ "failed to curl_easy_init()");
282 string response; 282 string response;
283 CURLcode r; 283 CURLcode r;
284 (r=curl_misc_sets(curl)) 284 (r=curl_misc_sets(curl))
285 || (r=curl_easy_setopt(curl,CURLOPT_URL,server.c_str())) 285 || (r=curl_easy_setopt(curl,CURLOPT_URL,server.c_str()))
286 || (r=curl_easy_setopt(curl,CURLOPT_POST,1)) 286 || (r=curl_easy_setopt(curl,CURLOPT_POST,1))
287 || (r=curl_easy_setopt(curl,CURLOPT_POSTFIELDS,request.data())) 287 || (r=curl_easy_setopt(curl,CURLOPT_POSTFIELDS,request.data()))
288 || (r=curl_easy_setopt(curl,CURLOPT_POSTFIELDSIZE,request.length())) 288 || (r=curl_easy_setopt(curl,CURLOPT_POSTFIELDSIZE,request.length()))
289 || (r=curl_easy_setopt(curl,CURLOPT_WRITEFUNCTION,_curl_tostring)) 289 || (r=curl_easy_setopt(curl,CURLOPT_WRITEFUNCTION,_curl_tostring))
290 || (r=curl_easy_setopt(curl,CURLOPT_WRITEDATA,&response)) 290 || (r=curl_easy_setopt(curl,CURLOPT_WRITEDATA,&response))
291 ; 291 ;
292 if(r) 292 if(r)
293 throw exception_curl(OPKELE_CP_ "failed to curl_easy_setopt()",r); 293 throw exception_curl(OPKELE_CP_ "failed to curl_easy_setopt()",r);
294 if( (r=curl_easy_perform(curl)) ) 294 if( (r=curl_easy_perform(curl)) )
295 throw exception_curl(OPKELE_CP_ "failed to curl_easy_perform()",r); 295 throw exception_curl(OPKELE_CP_ "failed to curl_easy_perform()",r);
296 params_t pp; pp.parse_keyvalues(response); 296 params_t pp; pp.parse_keyvalues(response);
297 if(pp.has_param("invalidate_handle")) 297 if(pp.has_param("invalidate_handle"))
298 invalidate_assoc(server,pp.get_param("invalidate_handle")); 298 invalidate_assoc(server,pp.get_param("invalidate_handle"));
299 if(pp.has_param("is_valid")) { 299 if(pp.has_param("is_valid")) {
300 if(pp.get_param("is_valid")=="true") 300 if(pp.get_param("is_valid")=="true")
301 return; 301 return;
302 }else if(pp.has_param("lifetime")) { 302 }else if(pp.has_param("lifetime")) {
303 if(util::string_to_long(pp.get_param("lifetime"))) 303 if(util::string_to_long(pp.get_param("lifetime")))
304 return; 304 return;
305 } 305 }
306 throw failed_check_authentication(OPKELE_CP_ "failed to verify response"); 306 throw failed_check_authentication(OPKELE_CP_ "failed to verify response");
307 } 307 }
308 308
309 void consumer_t::retrieve_links(const string& url,string& server,string& delegate) { 309 void consumer_t::retrieve_links(const string& url,string& server,string& delegate) {
310 server.erase(); 310 server.erase();
311 delegate.erase(); 311 delegate.erase();
312 curl_t curl = curl_easy_init(); 312 curl_t curl = curl_easy_init();
313 if(!curl) 313 if(!curl)
314 throw exception_curl(OPKELE_CP_ "failed to curl_easy_init()"); 314 throw exception_curl(OPKELE_CP_ "failed to curl_easy_init()");
315 string html; 315 string html;
316 CURLcode r; 316 CURLcode r;
317 (r=curl_misc_sets(curl)) 317 (r=curl_misc_sets(curl))
318 || (r=curl_easy_setopt(curl,CURLOPT_URL,url.c_str())) 318 || (r=curl_easy_setopt(curl,CURLOPT_URL,url.c_str()))
319 || (r=curl_easy_setopt(curl,CURLOPT_WRITEFUNCTION,_curl_tostring)) 319 || (r=curl_easy_setopt(curl,CURLOPT_WRITEFUNCTION,_curl_tostring))
320 || (r=curl_easy_setopt(curl,CURLOPT_WRITEDATA,&html)) 320 || (r=curl_easy_setopt(curl,CURLOPT_WRITEDATA,&html))
321 ; 321 ;
322 if(r) 322 if(r)
323 throw exception_curl(OPKELE_CP_ "failed to curl_easy_setopt()",r); 323 throw exception_curl(OPKELE_CP_ "failed to curl_easy_setopt()",r);
324 r = curl_easy_perform(curl); 324 r = curl_easy_perform(curl);
325 if(r && r!=CURLE_WRITE_ERROR) 325 if(r && r!=CURLE_WRITE_ERROR)
326 throw exception_curl(OPKELE_CP_ "failed to curl_easy_perform()",r); 326 throw exception_curl(OPKELE_CP_ "failed to curl_easy_perform()",r);
327 static const char *re_bre = "<\\s*body\\b", *re_hdre = "<\\s*head[^>]*>", 327 static const char *re_bre = "<\\s*body\\b", *re_hdre = "<\\s*head[^>]*>",
328 *re_lre = "<\\s*link\\b([^>]+)>", 328 *re_lre = "<\\s*link\\b([^>]+)>",
329 *re_rre = "\\brel\\s*=\\s*['\"]([^'\"]+)['\"]", 329 *re_rre = "\\brel\\s*=\\s*['\"]([^'\"]+)['\"]",
330 *re_hre = "\\bhref\\s*=\\s*['\"]\\s*([^'\"\\s]+)\\s*['\"]"; 330 *re_hre = "\\bhref\\s*=\\s*['\"]\\s*([^'\"\\s]+)\\s*['\"]";
331 pcre_matches_t m1(3), m2(3); 331 pcre_matches_t m1(3), m2(3);
332 pcre_t bre(re_bre,PCRE_CASELESS); 332 pcre_t bre(re_bre,PCRE_CASELESS);
333 if(bre.exec(html,m1)>0) 333 if(bre.exec(html,m1)>0)
334 html.erase(m1.begin(0)); 334 html.erase(m1.begin(0));
335 pcre_t hdre(re_hdre,PCRE_CASELESS); 335 pcre_t hdre(re_hdre,PCRE_CASELESS);
336 if(hdre.exec(html,m1)<=0) 336 if(hdre.exec(html,m1)<=0)
337 throw bad_input(OPKELE_CP_ "failed to find <head>"); 337 throw bad_input(OPKELE_CP_ "failed to find <head>");
338 html.erase(0,m1.end(0)+1); 338 html.erase(0,m1.end(0)+1);
339 pcre_t lre(re_lre,PCRE_CASELESS), rre(re_rre,PCRE_CASELESS), hre(re_hre,PCRE_CASELESS); 339 pcre_t lre(re_lre,PCRE_CASELESS), rre(re_rre,PCRE_CASELESS), hre(re_hre,PCRE_CASELESS);
340 bool gotit = false; 340 bool gotit = false;
341 while( (!gotit) && lre.exec(html,m1)>=2 ) { 341 while( (!gotit) && lre.exec(html,m1)>=2 ) {
342 static const char *whitespace = " \t"; 342 static const char *whitespace = " \t";
343 string attrs(html,m1.begin(1),m1.length(1)); 343 string attrs(html,m1.begin(1),m1.length(1));
344 html.erase(0,m1.end(0)+1); 344 html.erase(0,m1.end(0)+1);
345 if(!( rre.exec(attrs,m1)>=2 && hre.exec(attrs,m2)>=2 )) 345 if(!( rre.exec(attrs,m1)>=2 && hre.exec(attrs,m2)>=2 ))
346 continue; 346 continue;
347 string rels(attrs,m1.begin(1),m1.length(1)); 347 string rels(attrs,m1.begin(1),m1.length(1));
348 for(string::size_type ns = rels.find_first_not_of(whitespace); 348 for(string::size_type ns = rels.find_first_not_of(whitespace);
349 ns!=string::npos; 349 ns!=string::npos;
350 ns=rels.find_first_not_of(whitespace,ns)) { 350 ns=rels.find_first_not_of(whitespace,ns)) {
351 string::size_type s = rels.find_first_of(whitespace,ns); 351 string::size_type s = rels.find_first_of(whitespace,ns);
352 string rel; 352 string rel;
353 if(s==string::npos) { 353 if(s==string::npos) {
354 rel.assign(rels,ns,string::npos); 354 rel.assign(rels,ns,string::npos);
355 ns=string::npos; 355 ns=string::npos;
356 }else{ 356 }else{
357 rel.assign(rels,ns,s-ns); 357 rel.assign(rels,ns,s-ns);
358 ns=s; 358 ns=s;
359 } 359 }
360 if(rel=="openid.server") { 360 if(rel=="openid.server") {
361 server.assign(attrs,m2.begin(1),m2.length(1)); 361 server.assign(attrs,m2.begin(1),m2.length(1));
362 if(!delegate.empty()) { 362 if(!delegate.empty()) {
363 gotit = true; 363 gotit = true;
364 break; 364 break;
365 } 365 }
366 }else if(rel=="openid.delegate") { 366 }else if(rel=="openid.delegate") {
367 delegate.assign(attrs,m2.begin(1),m2.length(1)); 367 delegate.assign(attrs,m2.begin(1),m2.length(1));
368 if(!server.empty()) { 368 if(!server.empty()) {
369 gotit = true; 369 gotit = true;
370 break; 370 break;
371 } 371 }
372 } 372 }
373 if(ns==string::npos) break; 373 if(ns==string::npos) break;
374 } 374 }
375 } 375 }
376 if(server.empty()) 376 if(server.empty())
377 throw failed_assertion(OPKELE_CP_ "The location has no openid.server declaration"); 377 throw failed_assertion(OPKELE_CP_ "The location has no openid.server declaration");
378 } 378 }
379 379
380 assoc_t consumer_t::find_assoc(const string& server) { 380 assoc_t consumer_t::find_assoc(const string& /* server */) {
381 throw failed_lookup(OPKELE_CP_ "no find_assoc() provided"); 381 throw failed_lookup(OPKELE_CP_ "no find_assoc() provided");
382 } 382 }
383 383
384 string consumer_t::normalize(const string& url) { 384 string consumer_t::normalize(const string& url) {
385 string rv = url; 385 string rv = url;
386 // strip leading and trailing spaces 386 // strip leading and trailing spaces
387 string::size_type i = rv.find_first_not_of(" \t\r\n"); 387 string::size_type i = rv.find_first_not_of(" \t\r\n");
388 if(i==string::npos) 388 if(i==string::npos)
389 throw bad_input(OPKELE_CP_ "empty URL"); 389 throw bad_input(OPKELE_CP_ "empty URL");
390 if(i) 390 if(i)
391 rv.erase(0,i); 391 rv.erase(0,i);
392 i = rv.find_last_not_of(" \t\r\n"); 392 i = rv.find_last_not_of(" \t\r\n");
393 assert(i!=string::npos); 393 assert(i!=string::npos);
394 if(i<(rv.length()-1)) 394 if(i<(rv.length()-1))
395 rv.erase(i+1); 395 rv.erase(i+1);
396 // add missing http:// 396 // add missing http://
397 i = rv.find("://"); 397 i = rv.find("://");
398 if(i==string::npos) { // primitive. but do we need more? 398 if(i==string::npos) { // primitive. but do we need more?
399 rv.insert(0,"http://"); 399 rv.insert(0,"http://");
400 i = sizeof("http://")-1; 400 i = sizeof("http://")-1;
401 }else{ 401 }else{
402 i += sizeof("://")-1; 402 i += sizeof("://")-1;
403 } 403 }
404 string::size_type qm = rv.find('?',i); 404 string::size_type qm = rv.find('?',i);
405 string::size_type sl = rv.find('/',i); 405 string::size_type sl = rv.find('/',i);
406 if(qm!=string::npos) { 406 if(qm!=string::npos) {
407 if(sl==string::npos || sl>qm) 407 if(sl==string::npos || sl>qm)
408 rv.insert(qm,1,'/'); 408 rv.insert(qm,1,'/');
409 }else{ 409 }else{
410 if(sl==string::npos) 410 if(sl==string::npos)
411 rv += '/'; 411 rv += '/';
412 } 412 }
413 return rv; 413 return rv;
414 } 414 }
415 415
416 string consumer_t::canonicalize(const string& url) { 416 string consumer_t::canonicalize(const string& url) {
417 string rv = normalize(url); 417 string rv = normalize(url);
418 curl_t curl = curl_easy_init(); 418 curl_t curl = curl_easy_init();
419 if(!curl) 419 if(!curl)
420 throw exception_curl(OPKELE_CP_ "failed to curl_easy_init()"); 420 throw exception_curl(OPKELE_CP_ "failed to curl_easy_init()");
421 string html; 421 string html;
422 CURLcode r; 422 CURLcode r;
423 (r=curl_misc_sets(curl)) 423 (r=curl_misc_sets(curl))
424 || (r=curl_easy_setopt(curl,CURLOPT_URL,rv.c_str())) 424 || (r=curl_easy_setopt(curl,CURLOPT_URL,rv.c_str()))
425 || (r=curl_easy_setopt(curl,CURLOPT_NOBODY,1)) 425 || (r=curl_easy_setopt(curl,CURLOPT_NOBODY,1))
426 ; 426 ;
427 if(r) 427 if(r)
428 throw exception_curl(OPKELE_CP_ "failed to curl_easy_setopt()",r); 428 throw exception_curl(OPKELE_CP_ "failed to curl_easy_setopt()",r);
429 r = curl_easy_perform(curl); 429 r = curl_easy_perform(curl);
430 if(r) 430 if(r)
431 throw exception_curl(OPKELE_CP_ "failed to curl_easy_perform()",r); 431 throw exception_curl(OPKELE_CP_ "failed to curl_easy_perform()",r);
432 const char *eu = 0; 432 const char *eu = 0;
433 r = curl_easy_getinfo(curl,CURLINFO_EFFECTIVE_URL,&eu); 433 r = curl_easy_getinfo(curl,CURLINFO_EFFECTIVE_URL,&eu);
434 if(r) 434 if(r)
435 throw exception_curl(OPKELE_CP_ "failed to curl_easy_getinfo(..CURLINFO_EFFECTIVE_URL..)",r); 435 throw exception_curl(OPKELE_CP_ "failed to curl_easy_getinfo(..CURLINFO_EFFECTIVE_URL..)",r);
436 rv = eu; 436 rv = eu;
437 return normalize(rv); 437 return normalize(rv);
438 } 438 }
439 439
440} 440}
diff --git a/lib/extension.cc b/lib/extension.cc
index 44cf0cb..8f22562 100644
--- a/lib/extension.cc
+++ b/lib/extension.cc
@@ -1,15 +1,15 @@
1#include <opkele/exception.h> 1#include <opkele/exception.h>
2#include <opkele/extension.h> 2#include <opkele/extension.h>
3 3
4namespace opkele { 4namespace opkele {
5 5
6 void extension_t::checkid_hook(params_t& p,const string& identity) { 6 void extension_t::checkid_hook(params_t& /* p */,const string& /* identity */ ) {
7 throw not_implemented(OPKELE_CP_ "Consumer checkid_hook not implemented"); 7 throw not_implemented(OPKELE_CP_ "Consumer checkid_hook not implemented");
8 } 8 }
9 void extension_t::id_res_hook(const params_t& p,const params_t& sp,const string& identity) { 9 void extension_t::id_res_hook(const params_t& /* p */,const params_t& /* sp */,const string& /* identity */) {
10 throw not_implemented(OPKELE_CP_ "Consumer id_res_hook not implemented"); 10 throw not_implemented(OPKELE_CP_ "Consumer id_res_hook not implemented");
11 } 11 }
12 void extension_t::checkid_hook(const params_t& pin,params_t& pout) { 12 void extension_t::checkid_hook(const params_t& /* pin */,params_t& /* pout */) {
13 throw not_implemented(OPKELE_CP_ "Server checkid_hook not implemented"); 13 throw not_implemented(OPKELE_CP_ "Server checkid_hook not implemented");
14 } 14 }
15} 15}
diff --git a/lib/sreg.cc b/lib/sreg.cc
index 08e66b7..60dc691 100644
--- a/lib/sreg.cc
+++ b/lib/sreg.cc
@@ -1,124 +1,124 @@
1#include <opkele/exception.h> 1#include <opkele/exception.h>
2#include <opkele/sreg.h> 2#include <opkele/sreg.h>
3#include <algorithm> 3#include <algorithm>
4 4
5namespace opkele { 5namespace opkele {
6 using std::find; 6 using std::find;
7 7
8 static const struct _sreg_field { 8 static const struct _sreg_field {
9 const char *fieldname; 9 const char *fieldname;
10 sreg_t::fieldbit_t fieldbit; 10 sreg_t::fieldbit_t fieldbit;
11 }fields[] = { 11 }fields[] = {
12 { "nickname", sreg_t::field_nickname }, 12 { "nickname", sreg_t::field_nickname },
13 { "email", sreg_t::field_email }, 13 { "email", sreg_t::field_email },
14 { "fullname", sreg_t::field_fullname }, 14 { "fullname", sreg_t::field_fullname },
15 { "dob", sreg_t::field_dob }, 15 { "dob", sreg_t::field_dob },
16 { "gender", sreg_t::field_gender }, 16 { "gender", sreg_t::field_gender },
17 { "postcode", sreg_t::field_postcode }, 17 { "postcode", sreg_t::field_postcode },
18 { "country", sreg_t::field_country }, 18 { "country", sreg_t::field_country },
19 { "language", sreg_t::field_language }, 19 { "language", sreg_t::field_language },
20 { "timezone", sreg_t::field_timezone } 20 { "timezone", sreg_t::field_timezone }
21 }; 21 };
22 # define fields_BEGINfields 22 # define fields_BEGINfields
23# define fields_END &fields[sizeof(fields)/sizeof(*fields)] 23# define fields_END &fields[sizeof(fields)/sizeof(*fields)]
24 typedef const struct _sreg_field *fields_iterator; 24 typedef const struct _sreg_field *fields_iterator;
25 25
26 bool operator==(const struct _sreg_field& fd,const string& fn) { 26 bool operator==(const struct _sreg_field& fd,const string& fn) {
27 return fd.fieldname==fn; 27 return fd.fieldname==fn;
28 } 28 }
29 29
30 void sreg_t::checkid_hook(params_t& p,const string& identity) { 30 void sreg_t::checkid_hook(params_t& p,const string& /* identity */) {
31 string fr, fo; 31 string fr, fo;
32 for(fields_iterator f=fields_BEGIN;f<fields_END;++f) { 32 for(fields_iterator f=fields_BEGIN;f<fields_END;++f) {
33 if(f->fieldbit&fields_required) { 33 if(f->fieldbit&fields_required) {
34 if(!fr.empty()) fr+=","; 34 if(!fr.empty()) fr+=",";
35 fr += f->fieldname; 35 fr += f->fieldname;
36 } 36 }
37 if(f->fieldbit&fields_optional) { 37 if(f->fieldbit&fields_optional) {
38 if(!fo.empty()) fo+=","; 38 if(!fo.empty()) fo+=",";
39 fo += f->fieldname; 39 fo += f->fieldname;
40 } 40 }
41 } 41 }
42 if(!fr.empty()) p["sreg.required"]=fr; 42 if(!fr.empty()) p["sreg.required"]=fr;
43 if(!fo.empty()) p["sreg.optional"]=fo; 43 if(!fo.empty()) p["sreg.optional"]=fo;
44 if(!policy_url.empty()) p["sreg.policy_url"]=policy_url; 44 if(!policy_url.empty()) p["sreg.policy_url"]=policy_url;
45 } 45 }
46 46
47 void sreg_t::id_res_hook(const params_t& p,const params_t& sp,const string& identity) { 47 void sreg_t::id_res_hook(const params_t& /* p */,const params_t& sp,const string& /* identity */) {
48 clear(); 48 clear();
49 for(fields_iterator f=fields_BEGIN;f<fields_END;++f) { 49 for(fields_iterator f=fields_BEGIN;f<fields_END;++f) {
50 string fn = "sreg."; fn+=f->fieldname; 50 string fn = "sreg."; fn+=f->fieldname;
51 if(!sp.has_param(fn)) continue; 51 if(!sp.has_param(fn)) continue;
52 has_fields |= f->fieldbit; 52 has_fields |= f->fieldbit;
53 response[f->fieldbit]=sp.get_param(fn); 53 response[f->fieldbit]=sp.get_param(fn);
54 } 54 }
55 } 55 }
56 56
57 const string& sreg_t::get_field(fieldbit_t fb) const { 57 const string& sreg_t::get_field(fieldbit_t fb) const {
58 response_t::const_iterator i = response.find(fb); 58 response_t::const_iterator i = response.find(fb);
59 if(i==response.end()) 59 if(i==response.end())
60 throw failed_lookup(OPKELE_CP_ "no field data available"); 60 throw failed_lookup(OPKELE_CP_ "no field data available");
61 return i->second; 61 return i->second;
62 } 62 }
63 63
64 void sreg_t::set_field(fieldbit_t fb,const string& fv) { 64 void sreg_t::set_field(fieldbit_t fb,const string& fv) {
65 response[fb] = fv; 65 response[fb] = fv;
66 has_fields |= fb; 66 has_fields |= fb;
67 } 67 }
68 68
69 void sreg_t::reset_field(fieldbit_t fb) { 69 void sreg_t::reset_field(fieldbit_t fb) {
70 has_fields &= ~fb; 70 has_fields &= ~fb;
71 response.erase(fb); 71 response.erase(fb);
72 } 72 }
73 73
74 void sreg_t::clear() { 74 void sreg_t::clear() {
75 has_fields = 0; response.clear(); 75 has_fields = 0; response.clear();
76 } 76 }
77 77
78 static long fields_list_to_bitmask(string& fl) { 78 static long fields_list_to_bitmask(string& fl) {
79 long rv = 0; 79 long rv = 0;
80 while(!fl.empty()) { 80 while(!fl.empty()) {
81 string::size_type co = fl.find(','); 81 string::size_type co = fl.find(',');
82 string fn; 82 string fn;
83 if(co==string::npos) { 83 if(co==string::npos) {
84 fn = fl; fl.erase(); 84 fn = fl; fl.erase();
85 }else{ 85 }else{
86 fn = fl.substr(0,co); fl.erase(0,co+1); 86 fn = fl.substr(0,co); fl.erase(0,co+1);
87 } 87 }
88 fields_iterator f = find(fields_BEGIN,fields_END,fn); 88 fields_iterator f = find(fields_BEGIN,fields_END,fn);
89 if(f!=fields_END) 89 if(f!=fields_END)
90 rv |= f->fieldbit; 90 rv |= f->fieldbit;
91 } 91 }
92 return rv; 92 return rv;
93 } 93 }
94 94
95 void sreg_t::checkid_hook(const params_t& pin,params_t& pout) { 95 void sreg_t::checkid_hook(const params_t& pin,params_t& pout) {
96 fields_optional = 0; fields_required = 0; policy_url.erase(); 96 fields_optional = 0; fields_required = 0; policy_url.erase();
97 fields_response = 0; 97 fields_response = 0;
98 try { 98 try {
99 string fl = pin.get_param("openid.sreg.required"); 99 string fl = pin.get_param("openid.sreg.required");
100 fields_required = fields_list_to_bitmask(fl); 100 fields_required = fields_list_to_bitmask(fl);
101 }catch(failed_lookup&) { } 101 }catch(failed_lookup&) { }
102 try { 102 try {
103 string fl = pin.get_param("openid.sreg.optional"); 103 string fl = pin.get_param("openid.sreg.optional");
104 fields_optional = fields_list_to_bitmask(fl); 104 fields_optional = fields_list_to_bitmask(fl);
105 }catch(failed_lookup&) { } 105 }catch(failed_lookup&) { }
106 try { 106 try {
107 policy_url = pin.get_param("openid.sreg.policy_url"); 107 policy_url = pin.get_param("openid.sreg.policy_url");
108 }catch(failed_lookup&) { } 108 }catch(failed_lookup&) { }
109 setup_response(pin,pout); 109 setup_response(pin,pout);
110 fields_response &= has_fields; 110 fields_response &= has_fields;
111 for(fields_iterator f=fields_BEGIN;f<fields_END;++f) { 111 for(fields_iterator f=fields_BEGIN;f<fields_END;++f) {
112 if(!(f->fieldbit&fields_response)) continue; 112 if(!(f->fieldbit&fields_response)) continue;
113 if(!pout["signed"].empty()) 113 if(!pout["signed"].empty())
114 pout["signed"] +=','; 114 pout["signed"] +=',';
115 string pn = "sreg."; pn += f->fieldname; 115 string pn = "sreg."; pn += f->fieldname;
116 pout["signed"] += pn; 116 pout["signed"] += pn;
117 pout[pn] = get_field(f->fieldbit); 117 pout[pn] = get_field(f->fieldbit);
118 } 118 }
119 } 119 }
120 120
121 void sreg_t::setup_response(const params_t& pin,params_t& pout) { 121 void sreg_t::setup_response(const params_t& /* pin */,params_t& /* pout */) {
122 fields_response = (fields_required|fields_optional)&has_fields; 122 fields_response = (fields_required|fields_optional)&has_fields;
123 } 123 }
124} 124}
diff --git a/test/test.cc b/test/test.cc
index 0010f2b..f92284c 100644
--- a/test/test.cc
+++ b/test/test.cc
@@ -1,72 +1,72 @@
1#include <iostream> 1#include <iostream>
2#include <stdexcept> 2#include <stdexcept>
3using namespace std; 3using namespace std;
4#include <opkele/exception.h> 4#include <opkele/exception.h>
5#include <opkele/consumer.h> 5#include <opkele/consumer.h>
6 6
7#include "config.h" 7#include "config.h"
8 8
9class failed_test : public opkele::exception { 9class failed_test : public opkele::exception {
10 public: 10 public:
11 failed_test(OPKELE_E_PARS) 11 failed_test(OPKELE_E_PARS)
12 : exception(OPKELE_E_CONS) { } 12 : exception(OPKELE_E_CONS) { }
13}; 13};
14 14
15class dummy_consumer_t : public opkele::consumer_t { 15class dummy_consumer_t : public opkele::consumer_t {
16 public: 16 public:
17 virtual opkele::assoc_t store_assoc(const string& server,const string& handle,const opkele::secret_t& secret,int expires_in) { 17 virtual opkele::assoc_t store_assoc(const string& /* server */,const string& /* handle */,const opkele::secret_t& /* secret */,int /* expires_in */) {
18 throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); 18 throw opkele::not_implemented(OPKELE_CP_ "Not implemented");
19 } 19 }
20 virtual opkele::assoc_t retrieve_assoc(const string& server,const string& handle) { 20 virtual opkele::assoc_t retrieve_assoc(const string& /* server */ ,const string& /* handle */) {
21 throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); 21 throw opkele::not_implemented(OPKELE_CP_ "Not implemented");
22 } 22 }
23 virtual void invalidate_assoc(const string& server,const string& handle) { 23 virtual void invalidate_assoc(const string& /* server */,const string& /* handle */) {
24 throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); 24 throw opkele::not_implemented(OPKELE_CP_ "Not implemented");
25 } 25 }
26}; 26};
27 27
28 28
29void test_retrieve_links(const string& f,bool success,const string& s="",const string& d="") { 29void test_retrieve_links(const string& f,bool success,const string& s="",const string& d="") {
30 dummy_consumer_t dc; 30 dummy_consumer_t dc;
31 string server, delegate; 31 string server, delegate;
32 try { 32 try {
33 dc.retrieve_links("file://" OPKELE_SRC_DIR "/test/html/"+f,server,delegate); 33 dc.retrieve_links("file://" OPKELE_SRC_DIR "/test/html/"+f,server,delegate);
34 if(!success) 34 if(!success)
35 throw failed_test(OPKELE_CP_ "Retrieved links when it shouldn't"); 35 throw failed_test(OPKELE_CP_ "Retrieved links when it shouldn't");
36 if(server!=s) 36 if(server!=s)
37 throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected server '"+s+"', got '"+server+"'"); 37 throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected server '"+s+"', got '"+server+"'");
38 if(delegate!=d) 38 if(delegate!=d)
39 throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected delegate '"+d+"', got '"+delegate+"'"); 39 throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected delegate '"+d+"', got '"+delegate+"'");
40 }catch(opkele::bad_input& obi) { 40 }catch(opkele::bad_input& obi) {
41 if(success) 41 if(success)
42 throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'bad_input'["+obi.what()+"]"); 42 throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'bad_input'["+obi.what()+"]");
43 }catch(opkele::failed_assertion& ofa) { 43 }catch(opkele::failed_assertion& ofa) {
44 if(success) 44 if(success)
45 throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'failed_assertion'["+ofa.what()+"]"); 45 throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'failed_assertion'["+ofa.what()+"]");
46 } 46 }
47} 47}
48 48
49void test_retrieve_links() { 49void test_retrieve_links() {
50 test_retrieve_links("empty.html",false); 50 test_retrieve_links("empty.html",false);
51 test_retrieve_links("in-body.html",false); 51 test_retrieve_links("in-body.html",false);
52 test_retrieve_links("head-in-body.html",false); 52 test_retrieve_links("head-in-body.html",false);
53 test_retrieve_links("hkn.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); 53 test_retrieve_links("hkn.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/");
54 test_retrieve_links("hkn-server.html",true,"http://www.klever.net/openid.server"); 54 test_retrieve_links("hkn-server.html",true,"http://www.klever.net/openid.server");
55 test_retrieve_links("hkn-delegate.html",false); 55 test_retrieve_links("hkn-delegate.html",false);
56 test_retrieve_links("unclosed-head.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); 56 test_retrieve_links("unclosed-head.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/");
57 test_retrieve_links("spaced-links.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); 57 test_retrieve_links("spaced-links.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/");
58 test_retrieve_links("spaced-link-attrs.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); 58 test_retrieve_links("spaced-link-attrs.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/");
59 test_retrieve_links("2rels.html",true,"http://www.klever.net/openid.server","http://www.klever.net/openid.server"); 59 test_retrieve_links("2rels.html",true,"http://www.klever.net/openid.server","http://www.klever.net/openid.server");
60} 60}
61 61
62int main() { 62int main() {
63 try { 63 try {
64 test_retrieve_links(); 64 test_retrieve_links();
65 }catch(failed_test& ft) { 65 }catch(failed_test& ft) {
66 cerr << "Test failed: " << ft.what() << endl; 66 cerr << "Test failed: " << ft.what() << endl;
67 }catch(exception& e) { 67 }catch(exception& e) {
68 cerr << "oops: " << e.what() << endl; 68 cerr << "oops: " << e.what() << endl;
69 _exit(1); 69 _exit(1);
70 } 70 }
71 _exit(0); 71 _exit(0);
72} 72}