author | Michael Krelin <hacker@klever.net> | 2007-12-04 19:02:15 (UTC) |
---|---|---|
committer | Michael Krelin <hacker@klever.net> | 2007-12-04 19:02:15 (UTC) |
commit | 7a6a6fbcf7e20f0d7da5f625a73c865b361f16aa (patch) (unidiff) | |
tree | 42a2983bd4fdbba0b49d9a5329e5f819ad73d5ec /lib | |
parent | 206de587733c5dbde280fb6e9f1eab2f02de7f54 (diff) | |
download | libopkele-7a6a6fbcf7e20f0d7da5f625a73c865b361f16aa.zip libopkele-7a6a6fbcf7e20f0d7da5f625a73c865b361f16aa.tar.gz libopkele-7a6a6fbcf7e20f0d7da5f625a73c865b361f16aa.tar.bz2 |
Minor improvements
- almost irrelevant documentation updates
- introduced id_res_expired_on_delivery exception to be thrown if the
association has expired right before it could've been used for signature
verification.
Signed-off-by: Michael Krelin <hacker@klever.net>
-rw-r--r-- | lib/consumer.cc | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/consumer.cc b/lib/consumer.cc index 66db7dd..9f7530f 100644 --- a/lib/consumer.cc +++ b/lib/consumer.cc | |||
@@ -163,79 +163,79 @@ namespace opkele { | |||
163 | retrieve_links(iurl,server,delegate); | 163 | retrieve_links(iurl,server,delegate); |
164 | p["identity"] = delegate.empty()?iurl:delegate; | 164 | p["identity"] = delegate.empty()?iurl:delegate; |
165 | if(!trust_root.empty()) | 165 | if(!trust_root.empty()) |
166 | p["trust_root"] = trust_root; | 166 | p["trust_root"] = trust_root; |
167 | p["return_to"] = return_to; | 167 | p["return_to"] = return_to; |
168 | try { | 168 | try { |
169 | string ah = find_assoc(server)->handle(); | 169 | string ah = find_assoc(server)->handle(); |
170 | p["assoc_handle"] = ah; | 170 | p["assoc_handle"] = ah; |
171 | }catch(failed_lookup& fl) { | 171 | }catch(failed_lookup& fl) { |
172 | string ah = associate(server)->handle(); | 172 | string ah = associate(server)->handle(); |
173 | p["assoc_handle"] = ah; | 173 | p["assoc_handle"] = ah; |
174 | } | 174 | } |
175 | if(ext) ext->checkid_hook(p,identity); | 175 | if(ext) ext->checkid_hook(p,identity); |
176 | return p.append_query(server); | 176 | return p.append_query(server); |
177 | } | 177 | } |
178 | 178 | ||
179 | void consumer_t::id_res(const params_t& pin,const string& identity,extension_t *ext) { | 179 | void consumer_t::id_res(const params_t& pin,const string& identity,extension_t *ext) { |
180 | if(pin.has_param("openid.user_setup_url")) | 180 | if(pin.has_param("openid.user_setup_url")) |
181 | throw id_res_setup(OPKELE_CP_ "assertion failed, setup url provided",pin.get_param("openid.user_setup_url")); | 181 | throw id_res_setup(OPKELE_CP_ "assertion failed, setup url provided",pin.get_param("openid.user_setup_url")); |
182 | string server,delegate; | 182 | string server,delegate; |
183 | retrieve_links(identity.empty()?pin.get_param("openid.identity"):canonicalize(identity),server,delegate); | 183 | retrieve_links(identity.empty()?pin.get_param("openid.identity"):canonicalize(identity),server,delegate); |
184 | params_t ps; | 184 | params_t ps; |
185 | try { | 185 | try { |
186 | assoc_t assoc = retrieve_assoc(server,pin.get_param("openid.assoc_handle")); | 186 | assoc_t assoc = retrieve_assoc(server,pin.get_param("openid.assoc_handle")); |
187 | if(assoc->is_expired()) /* TODO: or should I throw some other exception to force programmer fix his implementation? */ | 187 | if(assoc->is_expired()) |
188 | throw failed_lookup(OPKELE_CP_ "retrieve_assoc() has returned expired handle"); | 188 | throw id_res_expired_on_delivery(OPKELE_CP_ "retrieve_assoc() has returned expired handle"); |
189 | const string& sigenc = pin.get_param("openid.sig"); | 189 | const string& sigenc = pin.get_param("openid.sig"); |
190 | vector<unsigned char> sig; | 190 | vector<unsigned char> sig; |
191 | util::decode_base64(sigenc,sig); | 191 | util::decode_base64(sigenc,sig); |
192 | const string& slist = pin.get_param("openid.signed"); | 192 | const string& slist = pin.get_param("openid.signed"); |
193 | string kv; | 193 | string kv; |
194 | string::size_type p = 0; | 194 | string::size_type p = 0; |
195 | while(true) { | 195 | while(true) { |
196 | string::size_type co = slist.find(',',p); | 196 | string::size_type co = slist.find(',',p); |
197 | string f = (co==string::npos)?slist.substr(p):slist.substr(p,co-p); | 197 | string f = (co==string::npos)?slist.substr(p):slist.substr(p,co-p); |
198 | kv += f; | 198 | kv += f; |
199 | kv += ':'; | 199 | kv += ':'; |
200 | f.insert(0,"openid."); | 200 | f.insert(0,"openid."); |
201 | kv += pin.get_param(f); | 201 | kv += pin.get_param(f); |
202 | kv += '\n'; | 202 | kv += '\n'; |
203 | if(ext) ps[f.substr(sizeof("openid.")-1)] = pin.get_param(f); | 203 | if(ext) ps[f.substr(sizeof("openid.")-1)] = pin.get_param(f); |
204 | if(co==string::npos) | 204 | if(co==string::npos) |
205 | break; | 205 | break; |
206 | p = co+1; | 206 | p = co+1; |
207 | } | 207 | } |
208 | secret_t secret = assoc->secret(); | 208 | secret_t secret = assoc->secret(); |
209 | unsigned int md_len = 0; | 209 | unsigned int md_len = 0; |
210 | unsigned char *md = HMAC( | 210 | unsigned char *md = HMAC( |
211 | EVP_sha1(), | 211 | EVP_sha1(), |
212 | &(secret.front()),secret.size(), | 212 | &(secret.front()),secret.size(), |
213 | (const unsigned char *)kv.data(),kv.length(), | 213 | (const unsigned char *)kv.data(),kv.length(), |
214 | 0,&md_len); | 214 | 0,&md_len); |
215 | if(sig.size()!=md_len || memcmp(&(sig.front()),md,md_len)) | 215 | if(sig.size()!=md_len || memcmp(&(sig.front()),md,md_len)) |
216 | throw id_res_mismatch(OPKELE_CP_ "signature mismatch"); | 216 | throw id_res_mismatch(OPKELE_CP_ "signature mismatch"); |
217 | }catch(failed_lookup& e) { /* XXX: more specific? */ | 217 | }catch(failed_lookup& e) { |
218 | const string& slist = pin.get_param("openid.signed"); | 218 | const string& slist = pin.get_param("openid.signed"); |
219 | string::size_type pp = 0; | 219 | string::size_type pp = 0; |
220 | params_t p; | 220 | params_t p; |
221 | while(true) { | 221 | while(true) { |
222 | string::size_type co = slist.find(',',pp); | 222 | string::size_type co = slist.find(',',pp); |
223 | string f = "openid."; | 223 | string f = "openid."; |
224 | f += (co==string::npos)?slist.substr(pp):slist.substr(pp,co-pp); | 224 | f += (co==string::npos)?slist.substr(pp):slist.substr(pp,co-pp); |
225 | p[f] = pin.get_param(f); | 225 | p[f] = pin.get_param(f); |
226 | if(co==string::npos) | 226 | if(co==string::npos) |
227 | break; | 227 | break; |
228 | pp = co+1; | 228 | pp = co+1; |
229 | } | 229 | } |
230 | p["openid.assoc_handle"] = pin.get_param("openid.assoc_handle"); | 230 | p["openid.assoc_handle"] = pin.get_param("openid.assoc_handle"); |
231 | p["openid.sig"] = pin.get_param("openid.sig"); | 231 | p["openid.sig"] = pin.get_param("openid.sig"); |
232 | p["openid.signed"] = pin.get_param("openid.signed"); | 232 | p["openid.signed"] = pin.get_param("openid.signed"); |
233 | try { | 233 | try { |
234 | string ih = pin.get_param("openid.invalidate_handle"); | 234 | string ih = pin.get_param("openid.invalidate_handle"); |
235 | p["openid.invalidate_handle"] = ih; | 235 | p["openid.invalidate_handle"] = ih; |
236 | }catch(failed_lookup& fl) { } | 236 | }catch(failed_lookup& fl) { } |
237 | try { | 237 | try { |
238 | check_authentication(server,p); | 238 | check_authentication(server,p); |
239 | }catch(failed_check_authentication& fca) { | 239 | }catch(failed_check_authentication& fca) { |
240 | throw id_res_failed(OPKELE_CP_ "failed to check_authentication()"); | 240 | throw id_res_failed(OPKELE_CP_ "failed to check_authentication()"); |
241 | } | 241 | } |