author | Michael Krelin <hacker@klever.net> | 2008-02-03 16:17:47 (UTC) |
---|---|---|
committer | Michael Krelin <hacker@klever.net> | 2008-02-03 16:17:47 (UTC) |
commit | 434d42b37ecab09fc91ac8e6c752d3292c10a3b1 (patch) (side-by-side diff) | |
tree | ec069e72e22cc2861e681e912d6f9e3ef4a65a2b /lib/verify_op.cc | |
parent | 23a6d48436e24d3d145b742984ef68ec3bae2bfd (diff) | |
download | libopkele-434d42b37ecab09fc91ac8e6c752d3292c10a3b1.zip libopkele-434d42b37ecab09fc91ac8e6c752d3292c10a3b1.tar.gz libopkele-434d42b37ecab09fc91ac8e6c752d3292c10a3b1.tar.bz2 |
added verify_op that performs discovery on the relying party
Signed-off-by: Michael Krelin <hacker@klever.net>
-rw-r--r-- | lib/verify_op.cc | 53 |
1 files changed, 53 insertions, 0 deletions
diff --git a/lib/verify_op.cc b/lib/verify_op.cc new file mode 100644 index 0000000..e7c26b5 --- a/dev/null +++ b/lib/verify_op.cc @@ -0,0 +1,53 @@ +#include <opkele/verify_op.h> +#include <opkele/discovery.h> +#include <opkele/exception.h> +#include <opkele/util.h> +#include <opkele/uris.h> + +namespace opkele { + using std::output_iterator_tag; + + class __RP_verifier_good_input : public exception { + public: + __RP_verifier_good_input(OPKELE_E_PARS) + : exception(OPKELE_E_CONS) { } + }; + + class RP_verifier : public iterator<output_iterator_tag,openid_endpoint_t,void> { + public: + int seen; + const string& return_to; + + RP_verifier(const string& rt) + : return_to(rt), seen(0) { } + + RP_verifier& operator*() { return *this; } + RP_verifier& operator=(const openid_endpoint_t& oep) { + if(util::uri_matches_realm(return_to,oep.uri)) + throw __RP_verifier_good_input(OPKELE_CP_ "Found matching realm"); + return *this; + } + + RP_verifier& operator++() { ++seen; return *this; } + RP_verifier& operator++(int) { +seen; return *this; } + }; + + void verify_op::verify_return_to() { + basic_op::verify_return_to(); + try { + RP_verifier rpv(return_to); + string drealm = realm; + string::size_type csss = drealm.find("://*."); + if(csss==4 || csss==5) + drealm.replace(csss+3,1,"www"); + const char *rtt[] = { STURI_OPENID20_RT, 0 }; + yadiscover(rpv,drealm,rtt,false); + if(rpv.seen) + throw bad_return_to(OPKELE_CP_ "return_to URL doesn't match any found while doing discovery on RP"); + }catch(__RP_verifier_good_input&) { + }catch(bad_return_to& brt) { + throw; + }catch(exception_network&) { } + } + +} |