-rw-r--r-- | include/opkele/exception.h | 9 | ||||
-rw-r--r-- | lib/basic_op.cc | 36 |
2 files changed, 45 insertions, 0 deletions
diff --git a/include/opkele/exception.h b/include/opkele/exception.h index 5c8418e..33f89cc 100644 --- a/include/opkele/exception.h +++ b/include/opkele/exception.h | |||
@@ -1,362 +1,371 @@ | |||
1 | #ifndef __OPKELE_EXCEPTION_H | 1 | #ifndef __OPKELE_EXCEPTION_H |
2 | #define __OPKELE_EXCEPTION_H | 2 | #define __OPKELE_EXCEPTION_H |
3 | 3 | ||
4 | /** | 4 | /** |
5 | * @file | 5 | * @file |
6 | * @brief opkele exceptions | 6 | * @brief opkele exceptions |
7 | */ | 7 | */ |
8 | 8 | ||
9 | #include <curl/curl.h> | 9 | #include <curl/curl.h> |
10 | 10 | ||
11 | #include <opkele/opkele-config.h> | 11 | #include <opkele/opkele-config.h> |
12 | #ifdef OPKELE_HAVE_KONFORKA | 12 | #ifdef OPKELE_HAVE_KONFORKA |
13 | # include <konforka/exception.h> | 13 | # include <konforka/exception.h> |
14 | /** | 14 | /** |
15 | * the exception parameters declaration | 15 | * the exception parameters declaration |
16 | */ | 16 | */ |
17 | # define OPKELE_E_PARS const string& fi,const string&fu,int l,const string& w | 17 | # define OPKELE_E_PARS const string& fi,const string&fu,int l,const string& w |
18 | /** | 18 | /** |
19 | * the exception parameters list to pass to constructor | 19 | * the exception parameters list to pass to constructor |
20 | */ | 20 | */ |
21 | # define OPKELE_E_CONS_ fi,fu,l, | 21 | # define OPKELE_E_CONS_ fi,fu,l, |
22 | /** | 22 | /** |
23 | * the exception codepoint specification | 23 | * the exception codepoint specification |
24 | */ | 24 | */ |
25 | # define OPKELE_CP_ CODEPOINT, | 25 | # define OPKELE_CP_ CODEPOINT, |
26 | /** | 26 | /** |
27 | * open function-try-block | 27 | * open function-try-block |
28 | */ | 28 | */ |
29 | # define OPKELE_FUNC_TRY try | 29 | # define OPKELE_FUNC_TRY try |
30 | /** | 30 | /** |
31 | * the simple rethrow of konforka-based exception | 31 | * the simple rethrow of konforka-based exception |
32 | */ | 32 | */ |
33 | # define OPKELE_RETHROW catch(konforka::exception& e) { e.see(CODEPOINT); throw; } | 33 | # define OPKELE_RETHROW catch(konforka::exception& e) { e.see(CODEPOINT); throw; } |
34 | #else /* OPKELE_HAVE_KONFORKA */ | 34 | #else /* OPKELE_HAVE_KONFORKA */ |
35 | # include <exception> | 35 | # include <exception> |
36 | # include <string> | 36 | # include <string> |
37 | /** | 37 | /** |
38 | * the exception parameter declaration | 38 | * the exception parameter declaration |
39 | */ | 39 | */ |
40 | # define OPKELE_E_PARS const string& w | 40 | # define OPKELE_E_PARS const string& w |
41 | /** | 41 | /** |
42 | * the dummy prefix for exception parameters list to prepend in the absence of | 42 | * the dummy prefix for exception parameters list to prepend in the absence of |
43 | * konforka library | 43 | * konforka library |
44 | */ | 44 | */ |
45 | # define OPKELE_E_CONS_ | 45 | # define OPKELE_E_CONS_ |
46 | /** | 46 | /** |
47 | * the dummy placeholder for konforka exception codepoint specification | 47 | * the dummy placeholder for konforka exception codepoint specification |
48 | */ | 48 | */ |
49 | # define OPKELE_CP_ | 49 | # define OPKELE_CP_ |
50 | /** | 50 | /** |
51 | * the dummy define for the opening function-try-block | 51 | * the dummy define for the opening function-try-block |
52 | */ | 52 | */ |
53 | # define OPKELE_FUNC_TRY | 53 | # define OPKELE_FUNC_TRY |
54 | /** | 54 | /** |
55 | * the dummy define for the konforka-based rethrow of exception | 55 | * the dummy define for the konforka-based rethrow of exception |
56 | */ | 56 | */ |
57 | # define OPKELE_RETHROW | 57 | # define OPKELE_RETHROW |
58 | #endif /* OPKELE_HAVE_KONFORKA */ | 58 | #endif /* OPKELE_HAVE_KONFORKA */ |
59 | /** | 59 | /** |
60 | * the exception parameters list to pass to constructor | 60 | * the exception parameters list to pass to constructor |
61 | */ | 61 | */ |
62 | # define OPKELE_E_CONS OPKELE_E_CONS_ w | 62 | # define OPKELE_E_CONS OPKELE_E_CONS_ w |
63 | 63 | ||
64 | namespace opkele { | 64 | namespace opkele { |
65 | using std::string; | 65 | using std::string; |
66 | 66 | ||
67 | /** | 67 | /** |
68 | * the base opkele exception class | 68 | * the base opkele exception class |
69 | */ | 69 | */ |
70 | class exception : public | 70 | class exception : public |
71 | # ifdef OPKELE_HAVE_KONFORKA | 71 | # ifdef OPKELE_HAVE_KONFORKA |
72 | konforka::exception | 72 | konforka::exception |
73 | # else | 73 | # else |
74 | std::exception | 74 | std::exception |
75 | # endif | 75 | # endif |
76 | { | 76 | { |
77 | public: | 77 | public: |
78 | # ifdef OPKELE_HAVE_KONFORKA | 78 | # ifdef OPKELE_HAVE_KONFORKA |
79 | explicit | 79 | explicit |
80 | exception(const string& fi,const string& fu,int l,const string& w); | 80 | exception(const string& fi,const string& fu,int l,const string& w); |
81 | # else /* OPKELE_HAVE_KONFORKA */ | 81 | # else /* OPKELE_HAVE_KONFORKA */ |
82 | string _what; | 82 | string _what; |
83 | explicit exception(const string& w); | 83 | explicit exception(const string& w); |
84 | virtual ~exception() throw(); | 84 | virtual ~exception() throw(); |
85 | virtual const char * what() const throw(); | 85 | virtual const char * what() const throw(); |
86 | # endif /* OPKELE_HAVE_KONFORKA */ | 86 | # endif /* OPKELE_HAVE_KONFORKA */ |
87 | }; | 87 | }; |
88 | 88 | ||
89 | /** | 89 | /** |
90 | * thrown in case of failed conversion | 90 | * thrown in case of failed conversion |
91 | */ | 91 | */ |
92 | class failed_conversion : public exception { | 92 | class failed_conversion : public exception { |
93 | public: | 93 | public: |
94 | failed_conversion(OPKELE_E_PARS) | 94 | failed_conversion(OPKELE_E_PARS) |
95 | : exception(OPKELE_E_CONS) { } | 95 | : exception(OPKELE_E_CONS) { } |
96 | }; | 96 | }; |
97 | /** | 97 | /** |
98 | * thrown in case of failed lookup (either parameter or persistent store) | 98 | * thrown in case of failed lookup (either parameter or persistent store) |
99 | */ | 99 | */ |
100 | class failed_lookup : public exception { | 100 | class failed_lookup : public exception { |
101 | public: | 101 | public: |
102 | failed_lookup(OPKELE_E_PARS) | 102 | failed_lookup(OPKELE_E_PARS) |
103 | : exception(OPKELE_E_CONS) { } | 103 | : exception(OPKELE_E_CONS) { } |
104 | }; | 104 | }; |
105 | /** | 105 | /** |
106 | * thrown in case of bad input (either local or network) | 106 | * thrown in case of bad input (either local or network) |
107 | */ | 107 | */ |
108 | class bad_input : public exception { | 108 | class bad_input : public exception { |
109 | public: | 109 | public: |
110 | bad_input(OPKELE_E_PARS) | 110 | bad_input(OPKELE_E_PARS) |
111 | : exception(OPKELE_E_CONS) { } | 111 | : exception(OPKELE_E_CONS) { } |
112 | }; | 112 | }; |
113 | 113 | ||
114 | /** | 114 | /** |
115 | * thrown on failed assertion | 115 | * thrown on failed assertion |
116 | */ | 116 | */ |
117 | class failed_assertion : public exception { | 117 | class failed_assertion : public exception { |
118 | public: | 118 | public: |
119 | failed_assertion(OPKELE_E_PARS) | 119 | failed_assertion(OPKELE_E_PARS) |
120 | : exception(OPKELE_E_CONS) { } | 120 | : exception(OPKELE_E_CONS) { } |
121 | }; | 121 | }; |
122 | 122 | ||
123 | /** | 123 | /** |
124 | * thrown if the handle being retrieved is invalid | 124 | * thrown if the handle being retrieved is invalid |
125 | */ | 125 | */ |
126 | class invalid_handle : public exception { | 126 | class invalid_handle : public exception { |
127 | public: | 127 | public: |
128 | invalid_handle(OPKELE_E_PARS) | 128 | invalid_handle(OPKELE_E_PARS) |
129 | : exception(OPKELE_E_CONS) { } | 129 | : exception(OPKELE_E_CONS) { } |
130 | }; | 130 | }; |
131 | /** | 131 | /** |
132 | * thrown if the handle passed to check_authentication request is not | 132 | * thrown if the handle passed to check_authentication request is not |
133 | * stateless | 133 | * stateless |
134 | */ | 134 | */ |
135 | class stateful_handle : public exception { | 135 | class stateful_handle : public exception { |
136 | public: | 136 | public: |
137 | stateful_handle(OPKELE_E_PARS) | 137 | stateful_handle(OPKELE_E_PARS) |
138 | : exception(OPKELE_E_CONS) { } | 138 | : exception(OPKELE_E_CONS) { } |
139 | }; | 139 | }; |
140 | 140 | ||
141 | /** | 141 | /** |
142 | * thrown if check_authentication request fails | 142 | * thrown if check_authentication request fails |
143 | */ | 143 | */ |
144 | class failed_check_authentication : public exception { | 144 | class failed_check_authentication : public exception { |
145 | public: | 145 | public: |
146 | failed_check_authentication(OPKELE_E_PARS) | 146 | failed_check_authentication(OPKELE_E_PARS) |
147 | : exception(OPKELE_E_CONS) { } | 147 | : exception(OPKELE_E_CONS) { } |
148 | }; | 148 | }; |
149 | 149 | ||
150 | /** | 150 | /** |
151 | * thrown if the id_res request result is negative | 151 | * thrown if the id_res request result is negative |
152 | */ | 152 | */ |
153 | class id_res_failed : public exception { | 153 | class id_res_failed : public exception { |
154 | public: | 154 | public: |
155 | id_res_failed(OPKELE_E_PARS) | 155 | id_res_failed(OPKELE_E_PARS) |
156 | : exception(OPKELE_E_CONS) { } | 156 | : exception(OPKELE_E_CONS) { } |
157 | }; | 157 | }; |
158 | /** | 158 | /** |
159 | * thrown if the user_setup_url is provided with negative response | 159 | * thrown if the user_setup_url is provided with negative response |
160 | */ | 160 | */ |
161 | class id_res_setup : public id_res_failed { | 161 | class id_res_setup : public id_res_failed { |
162 | public: | 162 | public: |
163 | string setup_url; | 163 | string setup_url; |
164 | id_res_setup(OPKELE_E_PARS,const string& su="") | 164 | id_res_setup(OPKELE_E_PARS,const string& su="") |
165 | : id_res_failed(OPKELE_E_CONS), setup_url(su) { } | 165 | : id_res_failed(OPKELE_E_CONS), setup_url(su) { } |
166 | ~id_res_setup() throw() { } | 166 | ~id_res_setup() throw() { } |
167 | }; | 167 | }; |
168 | /** | 168 | /** |
169 | * thrown in case of signature mismatch | 169 | * thrown in case of signature mismatch |
170 | */ | 170 | */ |
171 | class id_res_mismatch : public id_res_failed { | 171 | class id_res_mismatch : public id_res_failed { |
172 | public: | 172 | public: |
173 | id_res_mismatch(OPKELE_E_PARS) | 173 | id_res_mismatch(OPKELE_E_PARS) |
174 | : id_res_failed(OPKELE_E_CONS) { } | 174 | : id_res_failed(OPKELE_E_CONS) { } |
175 | }; | 175 | }; |
176 | 176 | ||
177 | /** | 177 | /** |
178 | * thrown if the association has expired before it could've been verified. | 178 | * thrown if the association has expired before it could've been verified. |
179 | */ | 179 | */ |
180 | class id_res_expired_on_delivery : public id_res_failed { | 180 | class id_res_expired_on_delivery : public id_res_failed { |
181 | public: | 181 | public: |
182 | id_res_expired_on_delivery(OPKELE_E_PARS) | 182 | id_res_expired_on_delivery(OPKELE_E_PARS) |
183 | : id_res_failed(OPKELE_E_CONS) { } | 183 | : id_res_failed(OPKELE_E_CONS) { } |
184 | }; | 184 | }; |
185 | 185 | ||
186 | /** | 186 | /** |
187 | * thown when the user cancelled authentication process. | 187 | * thown when the user cancelled authentication process. |
188 | */ | 188 | */ |
189 | class id_res_cancel : public id_res_failed { | 189 | class id_res_cancel : public id_res_failed { |
190 | public: | 190 | public: |
191 | id_res_cancel(OPKELE_E_PARS) | 191 | id_res_cancel(OPKELE_E_PARS) |
192 | : id_res_failed(OPKELE_E_CONS) { } | 192 | : id_res_failed(OPKELE_E_CONS) { } |
193 | }; | 193 | }; |
194 | 194 | ||
195 | /** | 195 | /** |
196 | * thrown in case of nonce reuse or otherwise imperfect nonce. | 196 | * thrown in case of nonce reuse or otherwise imperfect nonce. |
197 | */ | 197 | */ |
198 | class id_res_bad_nonce : public id_res_failed { | 198 | class id_res_bad_nonce : public id_res_failed { |
199 | public: | 199 | public: |
200 | id_res_bad_nonce(OPKELE_E_PARS) | 200 | id_res_bad_nonce(OPKELE_E_PARS) |
201 | : id_res_failed(OPKELE_E_CONS) { } | 201 | : id_res_failed(OPKELE_E_CONS) { } |
202 | }; | 202 | }; |
203 | 203 | ||
204 | /** | 204 | /** |
205 | * thrown if return_to didn't pass verification | 205 | * thrown if return_to didn't pass verification |
206 | */ | 206 | */ |
207 | class id_res_bad_return_to : public id_res_failed { | 207 | class id_res_bad_return_to : public id_res_failed { |
208 | public: | 208 | public: |
209 | id_res_bad_return_to(OPKELE_E_PARS) | 209 | id_res_bad_return_to(OPKELE_E_PARS) |
210 | : id_res_failed(OPKELE_E_CONS) { } | 210 | : id_res_failed(OPKELE_E_CONS) { } |
211 | }; | 211 | }; |
212 | 212 | ||
213 | /** | 213 | /** |
214 | * thrown if OP isn't authorized to make an assertion | 214 | * thrown if OP isn't authorized to make an assertion |
215 | */ | 215 | */ |
216 | class id_res_unauthorized : public id_res_failed { | 216 | class id_res_unauthorized : public id_res_failed { |
217 | public: | 217 | public: |
218 | id_res_unauthorized(OPKELE_E_PARS) | 218 | id_res_unauthorized(OPKELE_E_PARS) |
219 | : id_res_failed(OPKELE_E_CONS) { } | 219 | : id_res_failed(OPKELE_E_CONS) { } |
220 | }; | 220 | }; |
221 | 221 | ||
222 | /** | 222 | /** |
223 | * openssl malfunction occured | 223 | * openssl malfunction occured |
224 | */ | 224 | */ |
225 | class exception_openssl : public exception { | 225 | class exception_openssl : public exception { |
226 | public: | 226 | public: |
227 | unsigned long _error; | 227 | unsigned long _error; |
228 | string _ssl_string; | 228 | string _ssl_string; |
229 | exception_openssl(OPKELE_E_PARS); | 229 | exception_openssl(OPKELE_E_PARS); |
230 | ~exception_openssl() throw() { } | 230 | ~exception_openssl() throw() { } |
231 | }; | 231 | }; |
232 | 232 | ||
233 | /** | 233 | /** |
234 | * network operation related error occured | 234 | * network operation related error occured |
235 | */ | 235 | */ |
236 | class exception_network : public exception { | 236 | class exception_network : public exception { |
237 | public: | 237 | public: |
238 | exception_network(OPKELE_E_PARS) | 238 | exception_network(OPKELE_E_PARS) |
239 | : exception(OPKELE_E_CONS) { } | 239 | : exception(OPKELE_E_CONS) { } |
240 | }; | 240 | }; |
241 | 241 | ||
242 | /** | 242 | /** |
243 | * network operation related error occured, specifically, related to | 243 | * network operation related error occured, specifically, related to |
244 | * libcurl | 244 | * libcurl |
245 | */ | 245 | */ |
246 | class exception_curl : public exception_network { | 246 | class exception_curl : public exception_network { |
247 | public: | 247 | public: |
248 | CURLcode _error; | 248 | CURLcode _error; |
249 | string _curl_string; | 249 | string _curl_string; |
250 | exception_curl(OPKELE_E_PARS); | 250 | exception_curl(OPKELE_E_PARS); |
251 | exception_curl(OPKELE_E_PARS,CURLcode e); | 251 | exception_curl(OPKELE_E_PARS,CURLcode e); |
252 | ~exception_curl() throw() { } | 252 | ~exception_curl() throw() { } |
253 | }; | 253 | }; |
254 | 254 | ||
255 | /** | 255 | /** |
256 | * htmltidy related error occured | 256 | * htmltidy related error occured |
257 | */ | 257 | */ |
258 | class exception_tidy : public exception { | 258 | class exception_tidy : public exception { |
259 | public: | 259 | public: |
260 | int _rc; | 260 | int _rc; |
261 | exception_tidy(OPKELE_E_PARS); | 261 | exception_tidy(OPKELE_E_PARS); |
262 | exception_tidy(OPKELE_E_PARS,int r); | 262 | exception_tidy(OPKELE_E_PARS,int r); |
263 | ~exception_tidy() throw() { } | 263 | ~exception_tidy() throw() { } |
264 | }; | 264 | }; |
265 | 265 | ||
266 | /** | 266 | /** |
267 | * exception thrown in case of failed discovery | 267 | * exception thrown in case of failed discovery |
268 | */ | 268 | */ |
269 | class failed_discovery : public exception { | 269 | class failed_discovery : public exception { |
270 | public: | 270 | public: |
271 | failed_discovery(OPKELE_E_PARS) | 271 | failed_discovery(OPKELE_E_PARS) |
272 | : exception(OPKELE_E_CONS) { } | 272 | : exception(OPKELE_E_CONS) { } |
273 | }; | 273 | }; |
274 | 274 | ||
275 | /** | 275 | /** |
276 | * unsuccessfull xri resolution | 276 | * unsuccessfull xri resolution |
277 | */ | 277 | */ |
278 | class failed_xri_resolution : public failed_discovery { | 278 | class failed_xri_resolution : public failed_discovery { |
279 | public: | 279 | public: |
280 | long _code; | 280 | long _code; |
281 | failed_xri_resolution(OPKELE_E_PARS,long _c=-1) | 281 | failed_xri_resolution(OPKELE_E_PARS,long _c=-1) |
282 | : failed_discovery(OPKELE_E_CONS), _code(_c) { } | 282 | : failed_discovery(OPKELE_E_CONS), _code(_c) { } |
283 | }; | 283 | }; |
284 | 284 | ||
285 | /** | 285 | /** |
286 | * not implemented (think pure virtual) member function executed, signfies | 286 | * not implemented (think pure virtual) member function executed, signfies |
287 | * programmer error | 287 | * programmer error |
288 | */ | 288 | */ |
289 | class not_implemented : public exception { | 289 | class not_implemented : public exception { |
290 | public: | 290 | public: |
291 | not_implemented(OPKELE_E_PARS) | 291 | not_implemented(OPKELE_E_PARS) |
292 | : exception(OPKELE_E_CONS) { } | 292 | : exception(OPKELE_E_CONS) { } |
293 | }; | 293 | }; |
294 | 294 | ||
295 | /** | 295 | /** |
296 | * internal error, indicates internal libopkele problem | 296 | * internal error, indicates internal libopkele problem |
297 | */ | 297 | */ |
298 | class internal_error : public exception { | 298 | class internal_error : public exception { |
299 | public: | 299 | public: |
300 | internal_error(OPKELE_E_PARS) | 300 | internal_error(OPKELE_E_PARS) |
301 | : exception(OPKELE_E_CONS) { } | 301 | : exception(OPKELE_E_CONS) { } |
302 | }; | 302 | }; |
303 | 303 | ||
304 | /** | 304 | /** |
305 | * thrown in case of unsupported parameter encountered (e.g. unsupported | 305 | * thrown in case of unsupported parameter encountered (e.g. unsupported |
306 | * association type). | 306 | * association type). |
307 | */ | 307 | */ |
308 | class unsupported : public exception { | 308 | class unsupported : public exception { |
309 | public: | 309 | public: |
310 | unsupported(OPKELE_E_PARS) | 310 | unsupported(OPKELE_E_PARS) |
311 | : exception(OPKELE_E_CONS) { } | 311 | : exception(OPKELE_E_CONS) { } |
312 | }; | 312 | }; |
313 | 313 | ||
314 | /** | 314 | /** |
315 | * thrown by associations store related functions in case of dumb RP. | 315 | * thrown by associations store related functions in case of dumb RP. |
316 | */ | 316 | */ |
317 | class dumb_RP : public exception { | 317 | class dumb_RP : public exception { |
318 | public: | 318 | public: |
319 | dumb_RP(OPKELE_E_PARS) | 319 | dumb_RP(OPKELE_E_PARS) |
320 | : exception(OPKELE_E_CONS) { } | 320 | : exception(OPKELE_E_CONS) { } |
321 | }; | 321 | }; |
322 | 322 | ||
323 | /** | 323 | /** |
324 | * thrown by endpoint-queue related function if endpoint is being | 324 | * thrown by endpoint-queue related function if endpoint is being |
325 | * accessed but there's no endpoint available. | 325 | * accessed but there's no endpoint available. |
326 | */ | 326 | */ |
327 | class no_endpoint : public exception { | 327 | class no_endpoint : public exception { |
328 | public: | 328 | public: |
329 | no_endpoint(OPKELE_E_PARS) | 329 | no_endpoint(OPKELE_E_PARS) |
330 | : exception(OPKELE_E_CONS) { } | 330 | : exception(OPKELE_E_CONS) { } |
331 | }; | 331 | }; |
332 | 332 | ||
333 | /** | 333 | /** |
334 | * thrown while processing OpenID request in OP. Signifies invalid realm | 334 | * thrown while processing OpenID request in OP. Signifies invalid realm |
335 | */ | 335 | */ |
336 | class bad_realm : public exception { | 336 | class bad_realm : public exception { |
337 | public: | 337 | public: |
338 | bad_realm(OPKELE_E_PARS) | 338 | bad_realm(OPKELE_E_PARS) |
339 | : exception(OPKELE_E_CONS) { } | 339 | : exception(OPKELE_E_CONS) { } |
340 | }; | 340 | }; |
341 | 341 | ||
342 | /** | 342 | /** |
343 | * thrown when attempting to retrieve return_to of one-way request | 343 | * thrown when attempting to retrieve return_to of one-way request |
344 | */ | 344 | */ |
345 | class no_return_to : public exception { | 345 | class no_return_to : public exception { |
346 | public: | 346 | public: |
347 | no_return_to(OPKELE_E_PARS) | 347 | no_return_to(OPKELE_E_PARS) |
348 | : exception(OPKELE_E_CONS) { } | 348 | : exception(OPKELE_E_CONS) { } |
349 | }; | 349 | }; |
350 | 350 | ||
351 | /** | 351 | /** |
352 | * thrown when querying identity of non-identity related request | 352 | * thrown when querying identity of non-identity related request |
353 | */ | 353 | */ |
354 | class non_identity : public exception { | 354 | class non_identity : public exception { |
355 | public: | 355 | public: |
356 | non_identity(OPKELE_E_PARS) | 356 | non_identity(OPKELE_E_PARS) |
357 | : exception(OPKELE_E_CONS) { } | 357 | : exception(OPKELE_E_CONS) { } |
358 | }; | 358 | }; |
359 | 359 | ||
360 | /** | ||
361 | * thrown if return_to URL doesn't match realm | ||
362 | */ | ||
363 | class bad_return_to : public exception { | ||
364 | public: | ||
365 | bad_return_to(OPKELE_E_PARS) | ||
366 | : exception(OPKELE_E_CONS) { } | ||
367 | }; | ||
368 | |||
360 | } | 369 | } |
361 | 370 | ||
362 | #endif /* __OPKELE_EXCEPTION_H */ | 371 | #endif /* __OPKELE_EXCEPTION_H */ |
diff --git a/lib/basic_op.cc b/lib/basic_op.cc index 22012bc..f7573aa 100644 --- a/lib/basic_op.cc +++ b/lib/basic_op.cc | |||
@@ -1,320 +1,356 @@ | |||
1 | #include <time.h> | 1 | #include <time.h> |
2 | #include <cassert> | 2 | #include <cassert> |
3 | #include <algorithm> | ||
3 | #include <openssl/sha.h> | 4 | #include <openssl/sha.h> |
4 | #include <openssl/hmac.h> | 5 | #include <openssl/hmac.h> |
5 | #include <opkele/data.h> | 6 | #include <opkele/data.h> |
6 | #include <opkele/basic_op.h> | 7 | #include <opkele/basic_op.h> |
7 | #include <opkele/exception.h> | 8 | #include <opkele/exception.h> |
8 | #include <opkele/util.h> | 9 | #include <opkele/util.h> |
9 | #include <opkele/uris.h> | 10 | #include <opkele/uris.h> |
10 | 11 | ||
11 | namespace opkele { | 12 | namespace opkele { |
13 | using std::pair; | ||
14 | using std::mismatch; | ||
12 | 15 | ||
13 | void basic_op::reset_vars() { | 16 | void basic_op::reset_vars() { |
14 | assoc.reset(); | 17 | assoc.reset(); |
15 | return_to.clear(); realm.clear(); | 18 | return_to.clear(); realm.clear(); |
16 | claimed_id.clear(); identity.clear(); | 19 | claimed_id.clear(); identity.clear(); |
17 | invalidate_handle.clear(); | 20 | invalidate_handle.clear(); |
18 | } | 21 | } |
19 | 22 | ||
20 | bool basic_op::has_return_to() const { | 23 | bool basic_op::has_return_to() const { |
21 | return !return_to.empty(); | 24 | return !return_to.empty(); |
22 | } | 25 | } |
23 | const string& basic_op::get_return_to() const { | 26 | const string& basic_op::get_return_to() const { |
24 | if(return_to.empty()) | 27 | if(return_to.empty()) |
25 | throw no_return_to(OPKELE_CP_ "No return_to URL provided with request"); | 28 | throw no_return_to(OPKELE_CP_ "No return_to URL provided with request"); |
26 | return return_to; | 29 | return return_to; |
27 | } | 30 | } |
28 | 31 | ||
29 | const string& basic_op::get_realm() const { | 32 | const string& basic_op::get_realm() const { |
30 | assert(!realm.empty()); | 33 | assert(!realm.empty()); |
31 | return realm; | 34 | return realm; |
32 | } | 35 | } |
33 | 36 | ||
34 | bool basic_op::has_identity() const { | 37 | bool basic_op::has_identity() const { |
35 | return !identity.empty(); | 38 | return !identity.empty(); |
36 | } | 39 | } |
37 | const string& basic_op::get_claimed_id() const { | 40 | const string& basic_op::get_claimed_id() const { |
38 | if(claimed_id.empty()) | 41 | if(claimed_id.empty()) |
39 | throw non_identity(OPKELE_CP_ "attempting to retrieve claimed_id of non-identity related request"); | 42 | throw non_identity(OPKELE_CP_ "attempting to retrieve claimed_id of non-identity related request"); |
40 | assert(!identity.empty()); | 43 | assert(!identity.empty()); |
41 | return claimed_id; | 44 | return claimed_id; |
42 | } | 45 | } |
43 | const string& basic_op::get_identity() const { | 46 | const string& basic_op::get_identity() const { |
44 | if(identity.empty()) | 47 | if(identity.empty()) |
45 | throw non_identity(OPKELE_CP_ "attempting to retrieve identity of non-identity related request"); | 48 | throw non_identity(OPKELE_CP_ "attempting to retrieve identity of non-identity related request"); |
46 | assert(!claimed_id.empty()); | 49 | assert(!claimed_id.empty()); |
47 | return identity; | 50 | return identity; |
48 | } | 51 | } |
49 | 52 | ||
50 | bool basic_op::is_id_select() const { | 53 | bool basic_op::is_id_select() const { |
51 | return identity==IDURI_SELECT20; | 54 | return identity==IDURI_SELECT20; |
52 | } | 55 | } |
53 | 56 | ||
54 | void basic_op::select_identity(const string& c,const string& i) { | 57 | void basic_op::select_identity(const string& c,const string& i) { |
55 | claimed_id = c; identity = i; | 58 | claimed_id = c; identity = i; |
56 | } | 59 | } |
57 | void basic_op::set_claimed_id(const string& c) { | 60 | void basic_op::set_claimed_id(const string& c) { |
58 | claimed_id = c; | 61 | claimed_id = c; |
59 | } | 62 | } |
60 | 63 | ||
61 | basic_openid_message& basic_op::associate( | 64 | basic_openid_message& basic_op::associate( |
62 | basic_openid_message& oum, | 65 | basic_openid_message& oum, |
63 | const basic_openid_message& inm) try { | 66 | const basic_openid_message& inm) try { |
64 | assert(inm.get_field("mode")=="associate"); | 67 | assert(inm.get_field("mode")=="associate"); |
65 | util::dh_t dh; | 68 | util::dh_t dh; |
66 | util::bignum_t c_pub; | 69 | util::bignum_t c_pub; |
67 | unsigned char key_digest[SHA256_DIGEST_LENGTH]; | 70 | unsigned char key_digest[SHA256_DIGEST_LENGTH]; |
68 | size_t d_len = 0; | 71 | size_t d_len = 0; |
69 | enum { | 72 | enum { |
70 | sess_cleartext, sess_dh_sha1, sess_dh_sha256 | 73 | sess_cleartext, sess_dh_sha1, sess_dh_sha256 |
71 | } st = sess_cleartext; | 74 | } st = sess_cleartext; |
72 | string sts = inm.get_field("session_type"); | 75 | string sts = inm.get_field("session_type"); |
73 | string ats = inm.get_field("assoc_type"); | 76 | string ats = inm.get_field("assoc_type"); |
74 | if(sts=="DH-SHA1" || sts=="DH-SHA256") { | 77 | if(sts=="DH-SHA1" || sts=="DH-SHA256") { |
75 | if(!(dh = DH_new())) | 78 | if(!(dh = DH_new())) |
76 | throw exception_openssl(OPKELE_CP_ "failed to DH_new()"); | 79 | throw exception_openssl(OPKELE_CP_ "failed to DH_new()"); |
77 | c_pub = util::base64_to_bignum(inm.get_field("dh_consumer_public")); | 80 | c_pub = util::base64_to_bignum(inm.get_field("dh_consumer_public")); |
78 | try { dh->p = util::base64_to_bignum(inm.get_field("dh_modulus")); | 81 | try { dh->p = util::base64_to_bignum(inm.get_field("dh_modulus")); |
79 | }catch(failed_lookup&) { | 82 | }catch(failed_lookup&) { |
80 | dh->p = util::dec_to_bignum(data::_default_p); } | 83 | dh->p = util::dec_to_bignum(data::_default_p); } |
81 | try { dh->g = util::base64_to_bignum(inm.get_field("dh_gen")); | 84 | try { dh->g = util::base64_to_bignum(inm.get_field("dh_gen")); |
82 | }catch(failed_lookup&) { | 85 | }catch(failed_lookup&) { |
83 | dh->g = util::dec_to_bignum(data::_default_g); } | 86 | dh->g = util::dec_to_bignum(data::_default_g); } |
84 | if(!DH_generate_key(dh)) | 87 | if(!DH_generate_key(dh)) |
85 | throw exception_openssl(OPKELE_CP_ "failed to DH_generate_key()"); | 88 | throw exception_openssl(OPKELE_CP_ "failed to DH_generate_key()"); |
86 | vector<unsigned char> ck(DH_size(dh)+1); | 89 | vector<unsigned char> ck(DH_size(dh)+1); |
87 | unsigned char *ckptr = &(ck.front())+1; | 90 | unsigned char *ckptr = &(ck.front())+1; |
88 | int cklen = DH_compute_key(ckptr,c_pub,dh); | 91 | int cklen = DH_compute_key(ckptr,c_pub,dh); |
89 | if(cklen<0) | 92 | if(cklen<0) |
90 | throw exception_openssl(OPKELE_CP_ "failed to DH_compute_key()"); | 93 | throw exception_openssl(OPKELE_CP_ "failed to DH_compute_key()"); |
91 | if(cklen && (*ckptr)&0x80) { | 94 | if(cklen && (*ckptr)&0x80) { |
92 | (*(--ckptr)) = 0; ++cklen; } | 95 | (*(--ckptr)) = 0; ++cklen; } |
93 | if(sts=="DH-SHA1") { | 96 | if(sts=="DH-SHA1") { |
94 | SHA1(ckptr,cklen,key_digest); d_len = SHA_DIGEST_LENGTH; | 97 | SHA1(ckptr,cklen,key_digest); d_len = SHA_DIGEST_LENGTH; |
95 | }else if(sts=="DH-SHA256") { | 98 | }else if(sts=="DH-SHA256") { |
96 | SHA256(ckptr,cklen,key_digest); d_len = SHA256_DIGEST_LENGTH; | 99 | SHA256(ckptr,cklen,key_digest); d_len = SHA256_DIGEST_LENGTH; |
97 | }else | 100 | }else |
98 | throw internal_error(OPKELE_CP_ "I thought I knew the session type"); | 101 | throw internal_error(OPKELE_CP_ "I thought I knew the session type"); |
99 | }else | 102 | }else |
100 | throw unsupported(OPKELE_CP_ "Unsupported session_type"); | 103 | throw unsupported(OPKELE_CP_ "Unsupported session_type"); |
101 | assoc_t assoc; | 104 | assoc_t assoc; |
102 | if(ats=="HMAC-SHA1") | 105 | if(ats=="HMAC-SHA1") |
103 | assoc = alloc_assoc(ats,SHA_DIGEST_LENGTH,true); | 106 | assoc = alloc_assoc(ats,SHA_DIGEST_LENGTH,true); |
104 | else if(ats=="HMAC-SHA256") | 107 | else if(ats=="HMAC-SHA256") |
105 | assoc = alloc_assoc(ats,SHA256_DIGEST_LENGTH,true); | 108 | assoc = alloc_assoc(ats,SHA256_DIGEST_LENGTH,true); |
106 | else | 109 | else |
107 | throw unsupported(OPKELE_CP_ "Unsupported assoc_type"); | 110 | throw unsupported(OPKELE_CP_ "Unsupported assoc_type"); |
108 | oum.reset_fields(); | 111 | oum.reset_fields(); |
109 | oum.set_field("ns",OIURI_OPENID20); | 112 | oum.set_field("ns",OIURI_OPENID20); |
110 | oum.set_field("assoc_type",assoc->assoc_type()); | 113 | oum.set_field("assoc_type",assoc->assoc_type()); |
111 | oum.set_field("assoc_handle",assoc->handle()); | 114 | oum.set_field("assoc_handle",assoc->handle()); |
112 | oum.set_field("expires_in",util::long_to_string(assoc->expires_in())); | 115 | oum.set_field("expires_in",util::long_to_string(assoc->expires_in())); |
113 | secret_t secret = assoc->secret(); | 116 | secret_t secret = assoc->secret(); |
114 | if(sts=="DH-SHA1" || sts=="DH-SHA256") { | 117 | if(sts=="DH-SHA1" || sts=="DH-SHA256") { |
115 | if(d_len != secret.size()) | 118 | if(d_len != secret.size()) |
116 | throw bad_input(OPKELE_CP_ "Association secret and session MAC are not of the same size"); | 119 | throw bad_input(OPKELE_CP_ "Association secret and session MAC are not of the same size"); |
117 | oum.set_field("session_type",sts); | 120 | oum.set_field("session_type",sts); |
118 | oum.set_field("dh_server_public",util::bignum_to_base64(dh->pub_key)); | 121 | oum.set_field("dh_server_public",util::bignum_to_base64(dh->pub_key)); |
119 | string b64; secret.enxor_to_base64(key_digest,b64); | 122 | string b64; secret.enxor_to_base64(key_digest,b64); |
120 | oum.set_field("enc_mac_key",b64); | 123 | oum.set_field("enc_mac_key",b64); |
121 | }else /* TODO: support cleartext over encrypted connection */ | 124 | }else /* TODO: support cleartext over encrypted connection */ |
122 | throw unsupported(OPKELE_CP_ "Unsupported session type"); | 125 | throw unsupported(OPKELE_CP_ "Unsupported session type"); |
123 | return oum; | 126 | return oum; |
124 | } catch(unsupported& u) { | 127 | } catch(unsupported& u) { |
125 | oum.reset_fields(); | 128 | oum.reset_fields(); |
126 | oum.set_field("ns",OIURI_OPENID20); | 129 | oum.set_field("ns",OIURI_OPENID20); |
127 | oum.set_field("error",u.what()); | 130 | oum.set_field("error",u.what()); |
128 | oum.set_field("error_code","unsupported-type"); | 131 | oum.set_field("error_code","unsupported-type"); |
129 | oum.set_field("session_type","DH-SHA256"); | 132 | oum.set_field("session_type","DH-SHA256"); |
130 | oum.set_field("assoc_type","HMAC-SHA256"); | 133 | oum.set_field("assoc_type","HMAC-SHA256"); |
131 | return oum; | 134 | return oum; |
132 | } | 135 | } |
133 | 136 | ||
134 | void basic_op::checkid_(const basic_openid_message& inm, | 137 | void basic_op::checkid_(const basic_openid_message& inm, |
135 | extension_t *ext) { | 138 | extension_t *ext) { |
136 | reset_vars(); | 139 | reset_vars(); |
137 | string mode = inm.get_field("mode"); | 140 | string mode = inm.get_field("mode"); |
138 | if(mode=="checkid_setup") | 141 | if(mode=="checkid_setup") |
139 | mode = mode_checkid_setup; | 142 | mode = mode_checkid_setup; |
140 | else if(mode=="checkid_immediate") | 143 | else if(mode=="checkid_immediate") |
141 | mode = mode_checkid_immediate; | 144 | mode = mode_checkid_immediate; |
142 | else | 145 | else |
143 | throw bad_input(OPKELE_CP_ "Invalid checkid_* mode"); | 146 | throw bad_input(OPKELE_CP_ "Invalid checkid_* mode"); |
144 | try { | 147 | try { |
145 | assoc = retrieve_assoc(invalidate_handle=inm.get_field("assoc_handle")); | 148 | assoc = retrieve_assoc(invalidate_handle=inm.get_field("assoc_handle")); |
146 | invalidate_handle.clear(); | 149 | invalidate_handle.clear(); |
147 | }catch(failed_lookup&) { | 150 | }catch(failed_lookup&) { |
148 | // no handle specified or no valid assoc found, go dumb | 151 | // no handle specified or no valid assoc found, go dumb |
149 | assoc = alloc_assoc("HMAC-SHA256",SHA256_DIGEST_LENGTH,true); | 152 | assoc = alloc_assoc("HMAC-SHA256",SHA256_DIGEST_LENGTH,true); |
150 | } | 153 | } |
151 | try { | 154 | try { |
152 | openid2 = (inm.get_field("ns")==OIURI_OPENID20); | 155 | openid2 = (inm.get_field("ns")==OIURI_OPENID20); |
153 | }catch(failed_lookup&) { openid2 = false; } | 156 | }catch(failed_lookup&) { openid2 = false; } |
154 | try { | 157 | try { |
155 | return_to = inm.get_field("return_to"); | 158 | return_to = inm.get_field("return_to"); |
156 | }catch(failed_lookup&) { } | 159 | }catch(failed_lookup&) { } |
157 | if(openid2) { | 160 | if(openid2) { |
158 | try { | 161 | try { |
159 | realm = inm.get_field("realm"); | 162 | realm = inm.get_field("realm"); |
160 | }catch(failed_lookup&) { | 163 | }catch(failed_lookup&) { |
161 | try { | 164 | try { |
162 | realm = inm.get_field("trust_root"); | 165 | realm = inm.get_field("trust_root"); |
163 | }catch(failed_lookup&) { | 166 | }catch(failed_lookup&) { |
164 | if(return_to.empty()) | 167 | if(return_to.empty()) |
165 | throw bad_input(OPKELE_CP_ | 168 | throw bad_input(OPKELE_CP_ |
166 | "Both realm and return_to are unset"); | 169 | "Both realm and return_to are unset"); |
167 | realm = return_to; | 170 | realm = return_to; |
168 | } | 171 | } |
169 | } | 172 | } |
170 | }else{ | 173 | }else{ |
171 | try { | 174 | try { |
172 | realm = inm.get_field("trust_root"); | 175 | realm = inm.get_field("trust_root"); |
173 | }catch(failed_lookup&) { | 176 | }catch(failed_lookup&) { |
174 | if(return_to.empty()) | 177 | if(return_to.empty()) |
175 | throw bad_input(OPKELE_CP_ | 178 | throw bad_input(OPKELE_CP_ |
176 | "Both realm and return_to are unset"); | 179 | "Both realm and return_to are unset"); |
177 | realm = return_to; | 180 | realm = return_to; |
178 | } | 181 | } |
179 | } | 182 | } |
180 | try { | 183 | try { |
181 | identity = inm.get_field("identity"); | 184 | identity = inm.get_field("identity"); |
182 | try { | 185 | try { |
183 | claimed_id = inm.get_field("claimed_id"); | 186 | claimed_id = inm.get_field("claimed_id"); |
184 | }catch(failed_lookup&) { | 187 | }catch(failed_lookup&) { |
185 | if(openid2) | 188 | if(openid2) |
186 | throw bad_input(OPKELE_CP_ | 189 | throw bad_input(OPKELE_CP_ |
187 | "claimed_id and identity must be either both present or both absent"); | 190 | "claimed_id and identity must be either both present or both absent"); |
188 | } | 191 | } |
189 | }catch(failed_lookup&) { | 192 | }catch(failed_lookup&) { |
190 | if(openid2 && inm.has_field("claimed_id")) | 193 | if(openid2 && inm.has_field("claimed_id")) |
191 | throw bad_input(OPKELE_CP_ | 194 | throw bad_input(OPKELE_CP_ |
192 | "claimed_id and identity must be either both present or both absent"); | 195 | "claimed_id and identity must be either both present or both absent"); |
193 | } | 196 | } |
194 | verify_return_to(); | 197 | verify_return_to(); |
195 | } | 198 | } |
196 | 199 | ||
197 | basic_openid_message& basic_op::id_res(basic_openid_message& om) { | 200 | basic_openid_message& basic_op::id_res(basic_openid_message& om) { |
198 | assert(assoc); | 201 | assert(assoc); |
199 | assert(!return_to.empty()); | 202 | assert(!return_to.empty()); |
200 | assert(!is_id_select()); | 203 | assert(!is_id_select()); |
201 | time_t now = time(0); | 204 | time_t now = time(0); |
202 | struct tm gmt; gmtime_r(&now,&gmt); | 205 | struct tm gmt; gmtime_r(&now,&gmt); |
203 | char w3timestr[24]; | 206 | char w3timestr[24]; |
204 | if(!strftime(w3timestr,sizeof(w3timestr),"%Y-%m-%dT%H:%M:%SZ",&gmt)) | 207 | if(!strftime(w3timestr,sizeof(w3timestr),"%Y-%m-%dT%H:%M:%SZ",&gmt)) |
205 | throw failed_conversion(OPKELE_CP_ | 208 | throw failed_conversion(OPKELE_CP_ |
206 | "Failed to build time string for nonce" ); | 209 | "Failed to build time string for nonce" ); |
207 | om.set_field("ns",OIURI_OPENID20); | 210 | om.set_field("ns",OIURI_OPENID20); |
208 | om.set_field("mode","id_res"); | 211 | om.set_field("mode","id_res"); |
209 | om.set_field("op_endpoint",get_op_endpoint()); | 212 | om.set_field("op_endpoint",get_op_endpoint()); |
210 | string ats = "ns,mode,op_endpoint,return_to,response_nonce," | 213 | string ats = "ns,mode,op_endpoint,return_to,response_nonce," |
211 | "assoc_handle,signed"; | 214 | "assoc_handle,signed"; |
212 | if(!identity.empty()) { | 215 | if(!identity.empty()) { |
213 | om.set_field("identity",identity); | 216 | om.set_field("identity",identity); |
214 | om.set_field("claimed_id",claimed_id); | 217 | om.set_field("claimed_id",claimed_id); |
215 | ats += ",identity,claimed_id"; | 218 | ats += ",identity,claimed_id"; |
216 | } | 219 | } |
217 | om.set_field("return_to",return_to); | 220 | om.set_field("return_to",return_to); |
218 | string nonce = w3timestr; | 221 | string nonce = w3timestr; |
219 | om.set_field("response_nonce",alloc_nonce(nonce,assoc->stateless())); | 222 | om.set_field("response_nonce",alloc_nonce(nonce,assoc->stateless())); |
220 | if(!invalidate_handle.empty()) { | 223 | if(!invalidate_handle.empty()) { |
221 | om.set_field("invalidate_handle",invalidate_handle); | 224 | om.set_field("invalidate_handle",invalidate_handle); |
222 | ats += ",invalidate_handle"; | 225 | ats += ",invalidate_handle"; |
223 | } | 226 | } |
224 | om.set_field("assoc_handle",assoc->handle()); | 227 | om.set_field("assoc_handle",assoc->handle()); |
225 | om.add_to_signed(ats); | 228 | om.add_to_signed(ats); |
226 | om.set_field("sig",util::base64_signature(assoc,om)); | 229 | om.set_field("sig",util::base64_signature(assoc,om)); |
227 | return om; | 230 | return om; |
228 | } | 231 | } |
229 | 232 | ||
230 | basic_openid_message& basic_op::cancel(basic_openid_message& om) { | 233 | basic_openid_message& basic_op::cancel(basic_openid_message& om) { |
231 | assert(!return_to.empty()); | 234 | assert(!return_to.empty()); |
232 | om.set_field("ns",OIURI_OPENID20); | 235 | om.set_field("ns",OIURI_OPENID20); |
233 | om.set_field("mode","cancel"); | 236 | om.set_field("mode","cancel"); |
234 | return om; | 237 | return om; |
235 | } | 238 | } |
236 | 239 | ||
237 | basic_openid_message& basic_op::error(basic_openid_message& om, | 240 | basic_openid_message& basic_op::error(basic_openid_message& om, |
238 | const string& error,const string& contact, | 241 | const string& error,const string& contact, |
239 | const string& reference ) { | 242 | const string& reference ) { |
240 | assert(!return_to.empty()); | 243 | assert(!return_to.empty()); |
241 | om.set_field("ns",OIURI_OPENID20); | 244 | om.set_field("ns",OIURI_OPENID20); |
242 | om.set_field("mode","error"); | 245 | om.set_field("mode","error"); |
243 | om.set_field("error",error); | 246 | om.set_field("error",error); |
244 | om.set_field("contact",contact); | 247 | om.set_field("contact",contact); |
245 | om.set_field("reference",reference); | 248 | om.set_field("reference",reference); |
246 | return om; | 249 | return om; |
247 | } | 250 | } |
248 | 251 | ||
249 | basic_openid_message& basic_op::setup_needed( | 252 | basic_openid_message& basic_op::setup_needed( |
250 | basic_openid_message& oum,const basic_openid_message& inm) { | 253 | basic_openid_message& oum,const basic_openid_message& inm) { |
251 | assert(mode==mode_checkid_immediate); | 254 | assert(mode==mode_checkid_immediate); |
252 | assert(!return_to.empty()); | 255 | assert(!return_to.empty()); |
253 | if(openid2) { | 256 | if(openid2) { |
254 | oum.set_field("ns",OIURI_OPENID20); | 257 | oum.set_field("ns",OIURI_OPENID20); |
255 | oum.set_field("mode","setup_needed"); | 258 | oum.set_field("mode","setup_needed"); |
256 | }else{ | 259 | }else{ |
257 | oum.set_field("mode","id_res"); | 260 | oum.set_field("mode","id_res"); |
258 | static const string setupmode = "checkid_setup"; | 261 | static const string setupmode = "checkid_setup"; |
259 | oum.set_field("user_setup_url", | 262 | oum.set_field("user_setup_url", |
260 | util::change_mode_message_proxy(inm,setupmode) | 263 | util::change_mode_message_proxy(inm,setupmode) |
261 | .append_query(get_op_endpoint())); | 264 | .append_query(get_op_endpoint())); |
262 | } | 265 | } |
263 | return oum; | 266 | return oum; |
264 | } | 267 | } |
265 | 268 | ||
266 | basic_openid_message& basic_op::check_authentication( | 269 | basic_openid_message& basic_op::check_authentication( |
267 | basic_openid_message& oum, | 270 | basic_openid_message& oum, |
268 | const basic_openid_message& inm) try { | 271 | const basic_openid_message& inm) try { |
269 | assert(inm.get_field("mode")=="check_authentication"); | 272 | assert(inm.get_field("mode")=="check_authentication"); |
270 | oum.reset_fields(); | 273 | oum.reset_fields(); |
271 | oum.set_field("ns",OIURI_OPENID20); | 274 | oum.set_field("ns",OIURI_OPENID20); |
272 | bool o2; | 275 | bool o2; |
273 | try { | 276 | try { |
274 | o2 = (inm.get_field("ns")==OIURI_OPENID20); | 277 | o2 = (inm.get_field("ns")==OIURI_OPENID20); |
275 | }catch(failed_lookup&) { o2 = false; } | 278 | }catch(failed_lookup&) { o2 = false; } |
276 | string nonce; | 279 | string nonce; |
277 | if(o2) { | 280 | if(o2) { |
278 | try { | 281 | try { |
279 | if(!check_nonce(nonce = inm.get_field("response_nonce"))) | 282 | if(!check_nonce(nonce = inm.get_field("response_nonce"))) |
280 | throw failed_check_authentication(OPKELE_CP_ "Invalid nonce"); | 283 | throw failed_check_authentication(OPKELE_CP_ "Invalid nonce"); |
281 | }catch(failed_lookup&) { | 284 | }catch(failed_lookup&) { |
282 | throw failed_check_authentication(OPKELE_CP_ "No nonce provided with check_authentication request"); | 285 | throw failed_check_authentication(OPKELE_CP_ "No nonce provided with check_authentication request"); |
283 | } | 286 | } |
284 | } | 287 | } |
285 | try { | 288 | try { |
286 | assoc = retrieve_assoc(inm.get_field("assoc_handle")); | 289 | assoc = retrieve_assoc(inm.get_field("assoc_handle")); |
287 | if(!assoc->stateless()) | 290 | if(!assoc->stateless()) |
288 | throw failed_check_authentication(OPKELE_CP_ "Will not do check_authentication on a stateful handle"); | 291 | throw failed_check_authentication(OPKELE_CP_ "Will not do check_authentication on a stateful handle"); |
289 | }catch(failed_lookup&) { | 292 | }catch(failed_lookup&) { |
290 | throw failed_check_authentication(OPKELE_CP_ "No assoc_handle or invalid assoc_handle specified with check_authentication request"); | 293 | throw failed_check_authentication(OPKELE_CP_ "No assoc_handle or invalid assoc_handle specified with check_authentication request"); |
291 | } | 294 | } |
292 | static const string idresmode = "id_res"; | 295 | static const string idresmode = "id_res"; |
293 | try { | 296 | try { |
294 | if(util::base64_signature(assoc,util::change_mode_message_proxy(inm,idresmode))!=inm.get_field("sig")) | 297 | if(util::base64_signature(assoc,util::change_mode_message_proxy(inm,idresmode))!=inm.get_field("sig")) |
295 | throw failed_check_authentication(OPKELE_CP_ "Signature mismatch"); | 298 | throw failed_check_authentication(OPKELE_CP_ "Signature mismatch"); |
296 | }catch(failed_lookup&) { | 299 | }catch(failed_lookup&) { |
297 | throw failed_check_authentication(OPKELE_CP_ "failed to calculate signature"); | 300 | throw failed_check_authentication(OPKELE_CP_ "failed to calculate signature"); |
298 | } | 301 | } |
299 | oum.set_field("is_valid","true"); | 302 | oum.set_field("is_valid","true"); |
300 | try { | 303 | try { |
301 | string h = inm.get_field("invalidate_handle"); | 304 | string h = inm.get_field("invalidate_handle"); |
302 | try { | 305 | try { |
303 | assoc_t ih = retrieve_assoc(h); | 306 | assoc_t ih = retrieve_assoc(h); |
304 | }catch(invalid_handle& ih) { | 307 | }catch(invalid_handle& ih) { |
305 | oum.set_field("invalidate_handle",h); | 308 | oum.set_field("invalidate_handle",h); |
306 | }catch(failed_lookup& ih) { | 309 | }catch(failed_lookup& ih) { |
307 | oum.set_field("invalidate_handle",h); | 310 | oum.set_field("invalidate_handle",h); |
308 | } | 311 | } |
309 | }catch(failed_lookup&) { } | 312 | }catch(failed_lookup&) { } |
310 | if(o2) { | 313 | if(o2) { |
311 | assert(!nonce.empty()); | 314 | assert(!nonce.empty()); |
312 | invalidate_nonce(nonce); | 315 | invalidate_nonce(nonce); |
313 | } | 316 | } |
314 | return oum; | 317 | return oum; |
315 | }catch(failed_check_authentication& ) { | 318 | }catch(failed_check_authentication& ) { |
316 | oum.set_field("is_valid","false"); | 319 | oum.set_field("is_valid","false"); |
317 | return oum; | 320 | return oum; |
318 | } | 321 | } |
319 | 322 | ||
323 | void basic_op::verify_return_to() { | ||
324 | string nrealm = opkele::util::rfc_3986_normalize_uri(realm); | ||
325 | if(nrealm.find('#')!=string::npos) | ||
326 | throw opkele::bad_realm(OPKELE_CP_ "authentication realm contains URI fragment"); | ||
327 | string nrt = opkele::util::rfc_3986_normalize_uri(return_to); | ||
328 | string::size_type pr = nrealm.find("://"); | ||
329 | string::size_type prt = nrt.find("://"); | ||
330 | assert(!(pr==string::npos || prt==string::npos)); | ||
331 | pr += sizeof("://")-1; | ||
332 | prt += sizeof("://")-1; | ||
333 | if(!strncmp(nrealm.c_str()+pr,"*.",2)) { | ||
334 | pr = nrealm.find('.',pr); | ||
335 | prt = nrt.find('.',prt); | ||
336 | assert(pr!=string::npos); | ||
337 | if(prt==string::npos) | ||
338 | throw bad_return_to( | ||
339 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
340 | // TODO: check for overgeneralized realm | ||
341 | } | ||
342 | string::size_type lr = nrealm.length(); | ||
343 | string::size_type lrt = nrt.length(); | ||
344 | if( (lrt-prt) < (lr-pr) ) | ||
345 | throw bad_return_to( | ||
346 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
347 | pair<const char*,const char*> mp = mismatch( | ||
348 | nrealm.c_str()+pr,nrealm.c_str()+lr, | ||
349 | nrt.c_str()+prt); | ||
350 | if( (*(mp.first-1))!='/' | ||
351 | && !strchr("/?#",*mp.second) ) | ||
352 | throw bad_return_to( | ||
353 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
354 | } | ||
355 | |||
320 | } | 356 | } |