-rw-r--r-- | include/opkele/util.h | 8 | ||||
-rw-r--r-- | lib/basic_op.cc | 35 | ||||
-rw-r--r-- | lib/util.cc | 30 |
3 files changed, 41 insertions, 32 deletions
diff --git a/include/opkele/util.h b/include/opkele/util.h index 719f951..bc1a0ea 100644 --- a/include/opkele/util.h +++ b/include/opkele/util.h | |||
@@ -52,125 +52,133 @@ namespace opkele { | |||
52 | operator DH*(void) { return _dh; } | 52 | operator DH*(void) { return _dh; } |
53 | 53 | ||
54 | DH* operator->() { return _dh; } | 54 | DH* operator->() { return _dh; } |
55 | const DH* operator->() const { return _dh; } | 55 | const DH* operator->() const { return _dh; } |
56 | }; | 56 | }; |
57 | 57 | ||
58 | /** | 58 | /** |
59 | * Convert base64-encoded SSL BIGNUM to internal representation. | 59 | * Convert base64-encoded SSL BIGNUM to internal representation. |
60 | * @param b64 base64-encoded number | 60 | * @param b64 base64-encoded number |
61 | * @return SSL BIGNUM | 61 | * @return SSL BIGNUM |
62 | * @throw failed_conversion in case of error | 62 | * @throw failed_conversion in case of error |
63 | */ | 63 | */ |
64 | BIGNUM *base64_to_bignum(const string& b64); | 64 | BIGNUM *base64_to_bignum(const string& b64); |
65 | /** | 65 | /** |
66 | * Convert decimal representation to SSL BIGNUM. | 66 | * Convert decimal representation to SSL BIGNUM. |
67 | * @param dec decimal representation | 67 | * @param dec decimal representation |
68 | * @return resulting BIGNUM | 68 | * @return resulting BIGNUM |
69 | * @throw failed_conversion in case of error | 69 | * @throw failed_conversion in case of error |
70 | */ | 70 | */ |
71 | BIGNUM *dec_to_bignum(const string& dec); | 71 | BIGNUM *dec_to_bignum(const string& dec); |
72 | /** | 72 | /** |
73 | * Convert SSL BIGNUM data to base64 encoded string. | 73 | * Convert SSL BIGNUM data to base64 encoded string. |
74 | * @param bn BIGNUM | 74 | * @param bn BIGNUM |
75 | * @return base64encoded string | 75 | * @return base64encoded string |
76 | */ | 76 | */ |
77 | string bignum_to_base64(const BIGNUM *bn); | 77 | string bignum_to_base64(const BIGNUM *bn); |
78 | 78 | ||
79 | /** | 79 | /** |
80 | * Convert internal time representation to w3c format | 80 | * Convert internal time representation to w3c format |
81 | * @param t internal representation | 81 | * @param t internal representation |
82 | * @return w3c time | 82 | * @return w3c time |
83 | * @throw failed_conversion in case of error | 83 | * @throw failed_conversion in case of error |
84 | */ | 84 | */ |
85 | string time_to_w3c(time_t t); | 85 | string time_to_w3c(time_t t); |
86 | /** | 86 | /** |
87 | * Convert W3C time representation to internal time_t | 87 | * Convert W3C time representation to internal time_t |
88 | * @param w w3c representation | 88 | * @param w w3c representation |
89 | * @return converted time | 89 | * @return converted time |
90 | * @throw failed_conversion in case of error | 90 | * @throw failed_conversion in case of error |
91 | */ | 91 | */ |
92 | time_t w3c_to_time(const string& w); | 92 | time_t w3c_to_time(const string& w); |
93 | 93 | ||
94 | /** | 94 | /** |
95 | * Encode string to the representation suitable for using in URL. | 95 | * Encode string to the representation suitable for using in URL. |
96 | * @param str string to encode | 96 | * @param str string to encode |
97 | * @return encoded string | 97 | * @return encoded string |
98 | * @throw failed_conversion in case of failure | 98 | * @throw failed_conversion in case of failure |
99 | */ | 99 | */ |
100 | string url_encode(const string& str); | 100 | string url_encode(const string& str); |
101 | 101 | ||
102 | /** | 102 | /** |
103 | * Make string suitable for using as x(ht)ml attribute. | 103 | * Make string suitable for using as x(ht)ml attribute. |
104 | * @param str string to escape | 104 | * @param str string to escape |
105 | * @return escaped string | 105 | * @return escaped string |
106 | */ | 106 | */ |
107 | string attr_escape(const string& str); | 107 | string attr_escape(const string& str); |
108 | 108 | ||
109 | /** | 109 | /** |
110 | * Convert number to string | 110 | * Convert number to string |
111 | * @param l number | 111 | * @param l number |
112 | * @return string representation | 112 | * @return string representation |
113 | * @throw failed_conversion in case of failure | 113 | * @throw failed_conversion in case of failure |
114 | */ | 114 | */ |
115 | string long_to_string(long l); | 115 | string long_to_string(long l); |
116 | /** | 116 | /** |
117 | * Convert string to number | 117 | * Convert string to number |
118 | * @param s string, containing the number | 118 | * @param s string, containing the number |
119 | * @return the number | 119 | * @return the number |
120 | * @throw failed_conversion in case of failure | 120 | * @throw failed_conversion in case of failure |
121 | */ | 121 | */ |
122 | long string_to_long(const string& s); | 122 | long string_to_long(const string& s); |
123 | 123 | ||
124 | /** | 124 | /** |
125 | * Encode binary data using base64. | 125 | * Encode binary data using base64. |
126 | * @param data pointer to binary data | 126 | * @param data pointer to binary data |
127 | * @param length length of data | 127 | * @param length length of data |
128 | * @return encoded data | 128 | * @return encoded data |
129 | */ | 129 | */ |
130 | string encode_base64(const void *data,size_t length); | 130 | string encode_base64(const void *data,size_t length); |
131 | /** | 131 | /** |
132 | * Decode binary data from base64 representation. | 132 | * Decode binary data from base64 representation. |
133 | * @param data base64-encoded data | 133 | * @param data base64-encoded data |
134 | * @param rv container for decoded binary | 134 | * @param rv container for decoded binary |
135 | */ | 135 | */ |
136 | void decode_base64(const string& data,vector<unsigned char>& rv); | 136 | void decode_base64(const string& data,vector<unsigned char>& rv); |
137 | 137 | ||
138 | /** | 138 | /** |
139 | * Normalize http(s) URI according to RFC3986, section 6. URI is | 139 | * Normalize http(s) URI according to RFC3986, section 6. URI is |
140 | * expected to have scheme: in front of it. | 140 | * expected to have scheme: in front of it. |
141 | * @param uri URI | 141 | * @param uri URI |
142 | * @return normalized URI | 142 | * @return normalized URI |
143 | * @throw not_implemented in case of non-httpi(s) URI | 143 | * @throw not_implemented in case of non-httpi(s) URI |
144 | * @throw bad_input in case of malformed URI | 144 | * @throw bad_input in case of malformed URI |
145 | */ | 145 | */ |
146 | string rfc_3986_normalize_uri(const string& uri); | 146 | string rfc_3986_normalize_uri(const string& uri); |
147 | 147 | ||
148 | /** | ||
149 | * Match URI against realm | ||
150 | * @param uri URI to match | ||
151 | * @param realm realm to match against | ||
152 | * @return true if URI matches realm | ||
153 | */ | ||
154 | bool uri_matches_realm(const string& uri,const string& realm); | ||
155 | |||
148 | string& strip_uri_fragment_part(string& uri); | 156 | string& strip_uri_fragment_part(string& uri); |
149 | 157 | ||
150 | string abi_demangle(const char* mn); | 158 | string abi_demangle(const char* mn); |
151 | 159 | ||
152 | string base64_signature(const assoc_t& assoc,const basic_openid_message& om); | 160 | string base64_signature(const assoc_t& assoc,const basic_openid_message& om); |
153 | 161 | ||
154 | class change_mode_message_proxy : public basic_openid_message { | 162 | class change_mode_message_proxy : public basic_openid_message { |
155 | public: | 163 | public: |
156 | const basic_openid_message& x; | 164 | const basic_openid_message& x; |
157 | const string& mode; | 165 | const string& mode; |
158 | 166 | ||
159 | change_mode_message_proxy(const basic_openid_message& xx,const string& m) : x(xx), mode(m) { } | 167 | change_mode_message_proxy(const basic_openid_message& xx,const string& m) : x(xx), mode(m) { } |
160 | 168 | ||
161 | bool has_field(const string& n) const { return x.has_field(n); } | 169 | bool has_field(const string& n) const { return x.has_field(n); } |
162 | const string& get_field(const string& n) const { | 170 | const string& get_field(const string& n) const { |
163 | return (n=="mode")?mode:x.get_field(n); } | 171 | return (n=="mode")?mode:x.get_field(n); } |
164 | bool has_ns(const string& uri) const {return x.has_ns(uri); } | 172 | bool has_ns(const string& uri) const {return x.has_ns(uri); } |
165 | string get_ns(const string& uri) const { return x.get_ns(uri); } | 173 | string get_ns(const string& uri) const { return x.get_ns(uri); } |
166 | fields_iterator fields_begin() const { | 174 | fields_iterator fields_begin() const { |
167 | return x.fields_begin(); } | 175 | return x.fields_begin(); } |
168 | fields_iterator fields_end() const { | 176 | fields_iterator fields_end() const { |
169 | return x.fields_end(); } | 177 | return x.fields_end(); } |
170 | }; | 178 | }; |
171 | 179 | ||
172 | } | 180 | } |
173 | 181 | ||
174 | } | 182 | } |
175 | 183 | ||
176 | #endif /* __OPKELE_UTIL_H */ | 184 | #endif /* __OPKELE_UTIL_H */ |
diff --git a/lib/basic_op.cc b/lib/basic_op.cc index f7573aa..11ffb48 100644 --- a/lib/basic_op.cc +++ b/lib/basic_op.cc | |||
@@ -1,110 +1,107 @@ | |||
1 | #include <time.h> | 1 | #include <time.h> |
2 | #include <cassert> | 2 | #include <cassert> |
3 | #include <algorithm> | ||
4 | #include <openssl/sha.h> | 3 | #include <openssl/sha.h> |
5 | #include <openssl/hmac.h> | 4 | #include <openssl/hmac.h> |
6 | #include <opkele/data.h> | 5 | #include <opkele/data.h> |
7 | #include <opkele/basic_op.h> | 6 | #include <opkele/basic_op.h> |
8 | #include <opkele/exception.h> | 7 | #include <opkele/exception.h> |
9 | #include <opkele/util.h> | 8 | #include <opkele/util.h> |
10 | #include <opkele/uris.h> | 9 | #include <opkele/uris.h> |
11 | 10 | ||
12 | namespace opkele { | 11 | namespace opkele { |
13 | using std::pair; | ||
14 | using std::mismatch; | ||
15 | 12 | ||
16 | void basic_op::reset_vars() { | 13 | void basic_op::reset_vars() { |
17 | assoc.reset(); | 14 | assoc.reset(); |
18 | return_to.clear(); realm.clear(); | 15 | return_to.clear(); realm.clear(); |
19 | claimed_id.clear(); identity.clear(); | 16 | claimed_id.clear(); identity.clear(); |
20 | invalidate_handle.clear(); | 17 | invalidate_handle.clear(); |
21 | } | 18 | } |
22 | 19 | ||
23 | bool basic_op::has_return_to() const { | 20 | bool basic_op::has_return_to() const { |
24 | return !return_to.empty(); | 21 | return !return_to.empty(); |
25 | } | 22 | } |
26 | const string& basic_op::get_return_to() const { | 23 | const string& basic_op::get_return_to() const { |
27 | if(return_to.empty()) | 24 | if(return_to.empty()) |
28 | throw no_return_to(OPKELE_CP_ "No return_to URL provided with request"); | 25 | throw no_return_to(OPKELE_CP_ "No return_to URL provided with request"); |
29 | return return_to; | 26 | return return_to; |
30 | } | 27 | } |
31 | 28 | ||
32 | const string& basic_op::get_realm() const { | 29 | const string& basic_op::get_realm() const { |
33 | assert(!realm.empty()); | 30 | assert(!realm.empty()); |
34 | return realm; | 31 | return realm; |
35 | } | 32 | } |
36 | 33 | ||
37 | bool basic_op::has_identity() const { | 34 | bool basic_op::has_identity() const { |
38 | return !identity.empty(); | 35 | return !identity.empty(); |
39 | } | 36 | } |
40 | const string& basic_op::get_claimed_id() const { | 37 | const string& basic_op::get_claimed_id() const { |
41 | if(claimed_id.empty()) | 38 | if(claimed_id.empty()) |
42 | throw non_identity(OPKELE_CP_ "attempting to retrieve claimed_id of non-identity related request"); | 39 | throw non_identity(OPKELE_CP_ "attempting to retrieve claimed_id of non-identity related request"); |
43 | assert(!identity.empty()); | 40 | assert(!identity.empty()); |
44 | return claimed_id; | 41 | return claimed_id; |
45 | } | 42 | } |
46 | const string& basic_op::get_identity() const { | 43 | const string& basic_op::get_identity() const { |
47 | if(identity.empty()) | 44 | if(identity.empty()) |
48 | throw non_identity(OPKELE_CP_ "attempting to retrieve identity of non-identity related request"); | 45 | throw non_identity(OPKELE_CP_ "attempting to retrieve identity of non-identity related request"); |
49 | assert(!claimed_id.empty()); | 46 | assert(!claimed_id.empty()); |
50 | return identity; | 47 | return identity; |
51 | } | 48 | } |
52 | 49 | ||
53 | bool basic_op::is_id_select() const { | 50 | bool basic_op::is_id_select() const { |
54 | return identity==IDURI_SELECT20; | 51 | return identity==IDURI_SELECT20; |
55 | } | 52 | } |
56 | 53 | ||
57 | void basic_op::select_identity(const string& c,const string& i) { | 54 | void basic_op::select_identity(const string& c,const string& i) { |
58 | claimed_id = c; identity = i; | 55 | claimed_id = c; identity = i; |
59 | } | 56 | } |
60 | void basic_op::set_claimed_id(const string& c) { | 57 | void basic_op::set_claimed_id(const string& c) { |
61 | claimed_id = c; | 58 | claimed_id = c; |
62 | } | 59 | } |
63 | 60 | ||
64 | basic_openid_message& basic_op::associate( | 61 | basic_openid_message& basic_op::associate( |
65 | basic_openid_message& oum, | 62 | basic_openid_message& oum, |
66 | const basic_openid_message& inm) try { | 63 | const basic_openid_message& inm) try { |
67 | assert(inm.get_field("mode")=="associate"); | 64 | assert(inm.get_field("mode")=="associate"); |
68 | util::dh_t dh; | 65 | util::dh_t dh; |
69 | util::bignum_t c_pub; | 66 | util::bignum_t c_pub; |
70 | unsigned char key_digest[SHA256_DIGEST_LENGTH]; | 67 | unsigned char key_digest[SHA256_DIGEST_LENGTH]; |
71 | size_t d_len = 0; | 68 | size_t d_len = 0; |
72 | enum { | 69 | enum { |
73 | sess_cleartext, sess_dh_sha1, sess_dh_sha256 | 70 | sess_cleartext, sess_dh_sha1, sess_dh_sha256 |
74 | } st = sess_cleartext; | 71 | } st = sess_cleartext; |
75 | string sts = inm.get_field("session_type"); | 72 | string sts = inm.get_field("session_type"); |
76 | string ats = inm.get_field("assoc_type"); | 73 | string ats = inm.get_field("assoc_type"); |
77 | if(sts=="DH-SHA1" || sts=="DH-SHA256") { | 74 | if(sts=="DH-SHA1" || sts=="DH-SHA256") { |
78 | if(!(dh = DH_new())) | 75 | if(!(dh = DH_new())) |
79 | throw exception_openssl(OPKELE_CP_ "failed to DH_new()"); | 76 | throw exception_openssl(OPKELE_CP_ "failed to DH_new()"); |
80 | c_pub = util::base64_to_bignum(inm.get_field("dh_consumer_public")); | 77 | c_pub = util::base64_to_bignum(inm.get_field("dh_consumer_public")); |
81 | try { dh->p = util::base64_to_bignum(inm.get_field("dh_modulus")); | 78 | try { dh->p = util::base64_to_bignum(inm.get_field("dh_modulus")); |
82 | }catch(failed_lookup&) { | 79 | }catch(failed_lookup&) { |
83 | dh->p = util::dec_to_bignum(data::_default_p); } | 80 | dh->p = util::dec_to_bignum(data::_default_p); } |
84 | try { dh->g = util::base64_to_bignum(inm.get_field("dh_gen")); | 81 | try { dh->g = util::base64_to_bignum(inm.get_field("dh_gen")); |
85 | }catch(failed_lookup&) { | 82 | }catch(failed_lookup&) { |
86 | dh->g = util::dec_to_bignum(data::_default_g); } | 83 | dh->g = util::dec_to_bignum(data::_default_g); } |
87 | if(!DH_generate_key(dh)) | 84 | if(!DH_generate_key(dh)) |
88 | throw exception_openssl(OPKELE_CP_ "failed to DH_generate_key()"); | 85 | throw exception_openssl(OPKELE_CP_ "failed to DH_generate_key()"); |
89 | vector<unsigned char> ck(DH_size(dh)+1); | 86 | vector<unsigned char> ck(DH_size(dh)+1); |
90 | unsigned char *ckptr = &(ck.front())+1; | 87 | unsigned char *ckptr = &(ck.front())+1; |
91 | int cklen = DH_compute_key(ckptr,c_pub,dh); | 88 | int cklen = DH_compute_key(ckptr,c_pub,dh); |
92 | if(cklen<0) | 89 | if(cklen<0) |
93 | throw exception_openssl(OPKELE_CP_ "failed to DH_compute_key()"); | 90 | throw exception_openssl(OPKELE_CP_ "failed to DH_compute_key()"); |
94 | if(cklen && (*ckptr)&0x80) { | 91 | if(cklen && (*ckptr)&0x80) { |
95 | (*(--ckptr)) = 0; ++cklen; } | 92 | (*(--ckptr)) = 0; ++cklen; } |
96 | if(sts=="DH-SHA1") { | 93 | if(sts=="DH-SHA1") { |
97 | SHA1(ckptr,cklen,key_digest); d_len = SHA_DIGEST_LENGTH; | 94 | SHA1(ckptr,cklen,key_digest); d_len = SHA_DIGEST_LENGTH; |
98 | }else if(sts=="DH-SHA256") { | 95 | }else if(sts=="DH-SHA256") { |
99 | SHA256(ckptr,cklen,key_digest); d_len = SHA256_DIGEST_LENGTH; | 96 | SHA256(ckptr,cklen,key_digest); d_len = SHA256_DIGEST_LENGTH; |
100 | }else | 97 | }else |
101 | throw internal_error(OPKELE_CP_ "I thought I knew the session type"); | 98 | throw internal_error(OPKELE_CP_ "I thought I knew the session type"); |
102 | }else | 99 | }else |
103 | throw unsupported(OPKELE_CP_ "Unsupported session_type"); | 100 | throw unsupported(OPKELE_CP_ "Unsupported session_type"); |
104 | assoc_t assoc; | 101 | assoc_t assoc; |
105 | if(ats=="HMAC-SHA1") | 102 | if(ats=="HMAC-SHA1") |
106 | assoc = alloc_assoc(ats,SHA_DIGEST_LENGTH,true); | 103 | assoc = alloc_assoc(ats,SHA_DIGEST_LENGTH,true); |
107 | else if(ats=="HMAC-SHA256") | 104 | else if(ats=="HMAC-SHA256") |
108 | assoc = alloc_assoc(ats,SHA256_DIGEST_LENGTH,true); | 105 | assoc = alloc_assoc(ats,SHA256_DIGEST_LENGTH,true); |
109 | else | 106 | else |
110 | throw unsupported(OPKELE_CP_ "Unsupported assoc_type"); | 107 | throw unsupported(OPKELE_CP_ "Unsupported assoc_type"); |
@@ -228,129 +225,103 @@ namespace opkele { | |||
228 | om.add_to_signed(ats); | 225 | om.add_to_signed(ats); |
229 | om.set_field("sig",util::base64_signature(assoc,om)); | 226 | om.set_field("sig",util::base64_signature(assoc,om)); |
230 | return om; | 227 | return om; |
231 | } | 228 | } |
232 | 229 | ||
233 | basic_openid_message& basic_op::cancel(basic_openid_message& om) { | 230 | basic_openid_message& basic_op::cancel(basic_openid_message& om) { |
234 | assert(!return_to.empty()); | 231 | assert(!return_to.empty()); |
235 | om.set_field("ns",OIURI_OPENID20); | 232 | om.set_field("ns",OIURI_OPENID20); |
236 | om.set_field("mode","cancel"); | 233 | om.set_field("mode","cancel"); |
237 | return om; | 234 | return om; |
238 | } | 235 | } |
239 | 236 | ||
240 | basic_openid_message& basic_op::error(basic_openid_message& om, | 237 | basic_openid_message& basic_op::error(basic_openid_message& om, |
241 | const string& error,const string& contact, | 238 | const string& error,const string& contact, |
242 | const string& reference ) { | 239 | const string& reference ) { |
243 | assert(!return_to.empty()); | 240 | assert(!return_to.empty()); |
244 | om.set_field("ns",OIURI_OPENID20); | 241 | om.set_field("ns",OIURI_OPENID20); |
245 | om.set_field("mode","error"); | 242 | om.set_field("mode","error"); |
246 | om.set_field("error",error); | 243 | om.set_field("error",error); |
247 | om.set_field("contact",contact); | 244 | om.set_field("contact",contact); |
248 | om.set_field("reference",reference); | 245 | om.set_field("reference",reference); |
249 | return om; | 246 | return om; |
250 | } | 247 | } |
251 | 248 | ||
252 | basic_openid_message& basic_op::setup_needed( | 249 | basic_openid_message& basic_op::setup_needed( |
253 | basic_openid_message& oum,const basic_openid_message& inm) { | 250 | basic_openid_message& oum,const basic_openid_message& inm) { |
254 | assert(mode==mode_checkid_immediate); | 251 | assert(mode==mode_checkid_immediate); |
255 | assert(!return_to.empty()); | 252 | assert(!return_to.empty()); |
256 | if(openid2) { | 253 | if(openid2) { |
257 | oum.set_field("ns",OIURI_OPENID20); | 254 | oum.set_field("ns",OIURI_OPENID20); |
258 | oum.set_field("mode","setup_needed"); | 255 | oum.set_field("mode","setup_needed"); |
259 | }else{ | 256 | }else{ |
260 | oum.set_field("mode","id_res"); | 257 | oum.set_field("mode","id_res"); |
261 | static const string setupmode = "checkid_setup"; | 258 | static const string setupmode = "checkid_setup"; |
262 | oum.set_field("user_setup_url", | 259 | oum.set_field("user_setup_url", |
263 | util::change_mode_message_proxy(inm,setupmode) | 260 | util::change_mode_message_proxy(inm,setupmode) |
264 | .append_query(get_op_endpoint())); | 261 | .append_query(get_op_endpoint())); |
265 | } | 262 | } |
266 | return oum; | 263 | return oum; |
267 | } | 264 | } |
268 | 265 | ||
269 | basic_openid_message& basic_op::check_authentication( | 266 | basic_openid_message& basic_op::check_authentication( |
270 | basic_openid_message& oum, | 267 | basic_openid_message& oum, |
271 | const basic_openid_message& inm) try { | 268 | const basic_openid_message& inm) try { |
272 | assert(inm.get_field("mode")=="check_authentication"); | 269 | assert(inm.get_field("mode")=="check_authentication"); |
273 | oum.reset_fields(); | 270 | oum.reset_fields(); |
274 | oum.set_field("ns",OIURI_OPENID20); | 271 | oum.set_field("ns",OIURI_OPENID20); |
275 | bool o2; | 272 | bool o2; |
276 | try { | 273 | try { |
277 | o2 = (inm.get_field("ns")==OIURI_OPENID20); | 274 | o2 = (inm.get_field("ns")==OIURI_OPENID20); |
278 | }catch(failed_lookup&) { o2 = false; } | 275 | }catch(failed_lookup&) { o2 = false; } |
279 | string nonce; | 276 | string nonce; |
280 | if(o2) { | 277 | if(o2) { |
281 | try { | 278 | try { |
282 | if(!check_nonce(nonce = inm.get_field("response_nonce"))) | 279 | if(!check_nonce(nonce = inm.get_field("response_nonce"))) |
283 | throw failed_check_authentication(OPKELE_CP_ "Invalid nonce"); | 280 | throw failed_check_authentication(OPKELE_CP_ "Invalid nonce"); |
284 | }catch(failed_lookup&) { | 281 | }catch(failed_lookup&) { |
285 | throw failed_check_authentication(OPKELE_CP_ "No nonce provided with check_authentication request"); | 282 | throw failed_check_authentication(OPKELE_CP_ "No nonce provided with check_authentication request"); |
286 | } | 283 | } |
287 | } | 284 | } |
288 | try { | 285 | try { |
289 | assoc = retrieve_assoc(inm.get_field("assoc_handle")); | 286 | assoc = retrieve_assoc(inm.get_field("assoc_handle")); |
290 | if(!assoc->stateless()) | 287 | if(!assoc->stateless()) |
291 | throw failed_check_authentication(OPKELE_CP_ "Will not do check_authentication on a stateful handle"); | 288 | throw failed_check_authentication(OPKELE_CP_ "Will not do check_authentication on a stateful handle"); |
292 | }catch(failed_lookup&) { | 289 | }catch(failed_lookup&) { |
293 | throw failed_check_authentication(OPKELE_CP_ "No assoc_handle or invalid assoc_handle specified with check_authentication request"); | 290 | throw failed_check_authentication(OPKELE_CP_ "No assoc_handle or invalid assoc_handle specified with check_authentication request"); |
294 | } | 291 | } |
295 | static const string idresmode = "id_res"; | 292 | static const string idresmode = "id_res"; |
296 | try { | 293 | try { |
297 | if(util::base64_signature(assoc,util::change_mode_message_proxy(inm,idresmode))!=inm.get_field("sig")) | 294 | if(util::base64_signature(assoc,util::change_mode_message_proxy(inm,idresmode))!=inm.get_field("sig")) |
298 | throw failed_check_authentication(OPKELE_CP_ "Signature mismatch"); | 295 | throw failed_check_authentication(OPKELE_CP_ "Signature mismatch"); |
299 | }catch(failed_lookup&) { | 296 | }catch(failed_lookup&) { |
300 | throw failed_check_authentication(OPKELE_CP_ "failed to calculate signature"); | 297 | throw failed_check_authentication(OPKELE_CP_ "failed to calculate signature"); |
301 | } | 298 | } |
302 | oum.set_field("is_valid","true"); | 299 | oum.set_field("is_valid","true"); |
303 | try { | 300 | try { |
304 | string h = inm.get_field("invalidate_handle"); | 301 | string h = inm.get_field("invalidate_handle"); |
305 | try { | 302 | try { |
306 | assoc_t ih = retrieve_assoc(h); | 303 | assoc_t ih = retrieve_assoc(h); |
307 | }catch(invalid_handle& ih) { | 304 | }catch(invalid_handle& ih) { |
308 | oum.set_field("invalidate_handle",h); | 305 | oum.set_field("invalidate_handle",h); |
309 | }catch(failed_lookup& ih) { | 306 | }catch(failed_lookup& ih) { |
310 | oum.set_field("invalidate_handle",h); | 307 | oum.set_field("invalidate_handle",h); |
311 | } | 308 | } |
312 | }catch(failed_lookup&) { } | 309 | }catch(failed_lookup&) { } |
313 | if(o2) { | 310 | if(o2) { |
314 | assert(!nonce.empty()); | 311 | assert(!nonce.empty()); |
315 | invalidate_nonce(nonce); | 312 | invalidate_nonce(nonce); |
316 | } | 313 | } |
317 | return oum; | 314 | return oum; |
318 | }catch(failed_check_authentication& ) { | 315 | }catch(failed_check_authentication& ) { |
319 | oum.set_field("is_valid","false"); | 316 | oum.set_field("is_valid","false"); |
320 | return oum; | 317 | return oum; |
321 | } | 318 | } |
322 | 319 | ||
323 | void basic_op::verify_return_to() { | 320 | void basic_op::verify_return_to() { |
324 | string nrealm = opkele::util::rfc_3986_normalize_uri(realm); | 321 | if(realm.find('#')!=string::npos) |
325 | if(nrealm.find('#')!=string::npos) | ||
326 | throw opkele::bad_realm(OPKELE_CP_ "authentication realm contains URI fragment"); | 322 | throw opkele::bad_realm(OPKELE_CP_ "authentication realm contains URI fragment"); |
327 | string nrt = opkele::util::rfc_3986_normalize_uri(return_to); | 323 | if(!util::uri_matches_realm(return_to,realm)) |
328 | string::size_type pr = nrealm.find("://"); | 324 | throw bad_return_to(OPKELE_CP_ "return_to URL doesn't match realm"); |
329 | string::size_type prt = nrt.find("://"); | ||
330 | assert(!(pr==string::npos || prt==string::npos)); | ||
331 | pr += sizeof("://")-1; | ||
332 | prt += sizeof("://")-1; | ||
333 | if(!strncmp(nrealm.c_str()+pr,"*.",2)) { | ||
334 | pr = nrealm.find('.',pr); | ||
335 | prt = nrt.find('.',prt); | ||
336 | assert(pr!=string::npos); | ||
337 | if(prt==string::npos) | ||
338 | throw bad_return_to( | ||
339 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
340 | // TODO: check for overgeneralized realm | ||
341 | } | ||
342 | string::size_type lr = nrealm.length(); | ||
343 | string::size_type lrt = nrt.length(); | ||
344 | if( (lrt-prt) < (lr-pr) ) | ||
345 | throw bad_return_to( | ||
346 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
347 | pair<const char*,const char*> mp = mismatch( | ||
348 | nrealm.c_str()+pr,nrealm.c_str()+lr, | ||
349 | nrt.c_str()+prt); | ||
350 | if( (*(mp.first-1))!='/' | ||
351 | && !strchr("/?#",*mp.second) ) | ||
352 | throw bad_return_to( | ||
353 | OPKELE_CP_ "return_to URL doesn't match realm"); | ||
354 | } | 325 | } |
355 | 326 | ||
356 | } | 327 | } |
diff --git a/lib/util.cc b/lib/util.cc index b7bc437..b85a377 100644 --- a/lib/util.cc +++ b/lib/util.cc | |||
@@ -1,103 +1,104 @@ | |||
1 | #include <errno.h> | 1 | #include <errno.h> |
2 | #include <cassert> | 2 | #include <cassert> |
3 | #include <cctype> | 3 | #include <cctype> |
4 | #include <cstring> | 4 | #include <cstring> |
5 | #include <vector> | 5 | #include <vector> |
6 | #include <string> | 6 | #include <string> |
7 | #include <stack> | 7 | #include <stack> |
8 | #include <algorithm> | ||
8 | #include <openssl/bio.h> | 9 | #include <openssl/bio.h> |
9 | #include <openssl/evp.h> | 10 | #include <openssl/evp.h> |
10 | #include <openssl/hmac.h> | 11 | #include <openssl/hmac.h> |
11 | #include <curl/curl.h> | 12 | #include <curl/curl.h> |
12 | #include "opkele/util.h" | 13 | #include "opkele/util.h" |
13 | #include "opkele/exception.h" | 14 | #include "opkele/exception.h" |
14 | 15 | ||
15 | #include <config.h> | 16 | #include <config.h> |
16 | #ifdef HAVE_DEMANGLE | 17 | #ifdef HAVE_DEMANGLE |
17 | # include <cxxabi.h> | 18 | # include <cxxabi.h> |
18 | #endif | 19 | #endif |
19 | 20 | ||
20 | namespace opkele { | 21 | namespace opkele { |
21 | using namespace std; | 22 | using namespace std; |
22 | 23 | ||
23 | namespace util { | 24 | namespace util { |
24 | 25 | ||
25 | /* | 26 | /* |
26 | * base64 | 27 | * base64 |
27 | */ | 28 | */ |
28 | string encode_base64(const void *data,size_t length) { | 29 | string encode_base64(const void *data,size_t length) { |
29 | BIO *b64 = 0, *bmem = 0; | 30 | BIO *b64 = 0, *bmem = 0; |
30 | try { | 31 | try { |
31 | b64 = BIO_new(BIO_f_base64()); | 32 | b64 = BIO_new(BIO_f_base64()); |
32 | if(!b64) | 33 | if(!b64) |
33 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 encoder"); | 34 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 encoder"); |
34 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); | 35 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); |
35 | bmem = BIO_new(BIO_s_mem()); | 36 | bmem = BIO_new(BIO_s_mem()); |
36 | BIO_set_flags(b64,BIO_CLOSE); | 37 | BIO_set_flags(b64,BIO_CLOSE); |
37 | if(!bmem) | 38 | if(!bmem) |
38 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() memory buffer"); | 39 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() memory buffer"); |
39 | BIO_push(b64,bmem); | 40 | BIO_push(b64,bmem); |
40 | if(((size_t)BIO_write(b64,data,length))!=length) | 41 | if(((size_t)BIO_write(b64,data,length))!=length) |
41 | throw exception_openssl(OPKELE_CP_ "failed to BIO_write()"); | 42 | throw exception_openssl(OPKELE_CP_ "failed to BIO_write()"); |
42 | if(BIO_flush(b64)!=1) | 43 | if(BIO_flush(b64)!=1) |
43 | throw exception_openssl(OPKELE_CP_ "failed to BIO_flush()"); | 44 | throw exception_openssl(OPKELE_CP_ "failed to BIO_flush()"); |
44 | char *rvd; | 45 | char *rvd; |
45 | long rvl = BIO_get_mem_data(bmem,&rvd); | 46 | long rvl = BIO_get_mem_data(bmem,&rvd); |
46 | string rv(rvd,rvl); | 47 | string rv(rvd,rvl); |
47 | BIO_free_all(b64); | 48 | BIO_free_all(b64); |
48 | return rv; | 49 | return rv; |
49 | }catch(...) { | 50 | }catch(...) { |
50 | if(b64) BIO_free_all(b64); | 51 | if(b64) BIO_free_all(b64); |
51 | throw; | 52 | throw; |
52 | } | 53 | } |
53 | } | 54 | } |
54 | 55 | ||
55 | void decode_base64(const string& data,vector<unsigned char>& rv) { | 56 | void decode_base64(const string& data,vector<unsigned char>& rv) { |
56 | BIO *b64 = 0, *bmem = 0; | 57 | BIO *b64 = 0, *bmem = 0; |
57 | rv.clear(); | 58 | rv.clear(); |
58 | try { | 59 | try { |
59 | bmem = BIO_new_mem_buf((void*)data.data(),data.size()); | 60 | bmem = BIO_new_mem_buf((void*)data.data(),data.size()); |
60 | if(!bmem) | 61 | if(!bmem) |
61 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new_mem_buf()"); | 62 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new_mem_buf()"); |
62 | b64 = BIO_new(BIO_f_base64()); | 63 | b64 = BIO_new(BIO_f_base64()); |
63 | if(!b64) | 64 | if(!b64) |
64 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 decoder"); | 65 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 decoder"); |
65 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); | 66 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); |
66 | BIO_push(b64,bmem); | 67 | BIO_push(b64,bmem); |
67 | unsigned char tmp[512]; | 68 | unsigned char tmp[512]; |
68 | size_t rb = 0; | 69 | size_t rb = 0; |
69 | while((rb=BIO_read(b64,tmp,sizeof(tmp)))>0) | 70 | while((rb=BIO_read(b64,tmp,sizeof(tmp)))>0) |
70 | rv.insert(rv.end(),tmp,&tmp[rb]); | 71 | rv.insert(rv.end(),tmp,&tmp[rb]); |
71 | BIO_free_all(b64); | 72 | BIO_free_all(b64); |
72 | }catch(...) { | 73 | }catch(...) { |
73 | if(b64) BIO_free_all(b64); | 74 | if(b64) BIO_free_all(b64); |
74 | throw; | 75 | throw; |
75 | } | 76 | } |
76 | } | 77 | } |
77 | 78 | ||
78 | /* | 79 | /* |
79 | * big numerics | 80 | * big numerics |
80 | */ | 81 | */ |
81 | 82 | ||
82 | BIGNUM *base64_to_bignum(const string& b64) { | 83 | BIGNUM *base64_to_bignum(const string& b64) { |
83 | vector<unsigned char> bin; | 84 | vector<unsigned char> bin; |
84 | decode_base64(b64,bin); | 85 | decode_base64(b64,bin); |
85 | BIGNUM *rv = BN_bin2bn(&(bin.front()),bin.size(),0); | 86 | BIGNUM *rv = BN_bin2bn(&(bin.front()),bin.size(),0); |
86 | if(!rv) | 87 | if(!rv) |
87 | throw failed_conversion(OPKELE_CP_ "failed to BN_bin2bn()"); | 88 | throw failed_conversion(OPKELE_CP_ "failed to BN_bin2bn()"); |
88 | return rv; | 89 | return rv; |
89 | } | 90 | } |
90 | 91 | ||
91 | BIGNUM *dec_to_bignum(const string& dec) { | 92 | BIGNUM *dec_to_bignum(const string& dec) { |
92 | BIGNUM *rv = 0; | 93 | BIGNUM *rv = 0; |
93 | if(!BN_dec2bn(&rv,dec.c_str())) | 94 | if(!BN_dec2bn(&rv,dec.c_str())) |
94 | throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); | 95 | throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); |
95 | return rv; | 96 | return rv; |
96 | } | 97 | } |
97 | 98 | ||
98 | string bignum_to_base64(const BIGNUM *bn) { | 99 | string bignum_to_base64(const BIGNUM *bn) { |
99 | vector<unsigned char> bin(BN_num_bytes(bn)+1); | 100 | vector<unsigned char> bin(BN_num_bytes(bn)+1); |
100 | unsigned char *binptr = &(bin.front())+1; | 101 | unsigned char *binptr = &(bin.front())+1; |
101 | int l = BN_bn2bin(bn,binptr); | 102 | int l = BN_bn2bin(bn,binptr); |
102 | if(l && (*binptr)&0x80){ | 103 | if(l && (*binptr)&0x80){ |
103 | (*(--binptr)) = 0; ++l; | 104 | (*(--binptr)) = 0; ++l; |
@@ -258,145 +259,174 @@ namespace opkele { | |||
258 | char tmp[8]; | 259 | char tmp[8]; |
259 | snprintf(tmp,sizeof(tmp),":%ld",port); | 260 | snprintf(tmp,sizeof(tmp),":%ld",port); |
260 | rv += tmp; | 261 | rv += tmp; |
261 | } | 262 | } |
262 | if(ni==string::npos) { | 263 | if(ni==string::npos) { |
263 | rv += '/'; return rv; | 264 | rv += '/'; return rv; |
264 | } | 265 | } |
265 | interesting = ni; | 266 | interesting = ni; |
266 | }else if(ic!='/') { | 267 | }else if(ic!='/') { |
267 | rv += '/'; rv += ic; | 268 | rv += '/'; rv += ic; |
268 | qf = true; | 269 | qf = true; |
269 | ++interesting; | 270 | ++interesting; |
270 | } | 271 | } |
271 | string::size_type n = interesting; | 272 | string::size_type n = interesting; |
272 | char tmp[3] = { 0,0,0 }; | 273 | char tmp[3] = { 0,0,0 }; |
273 | stack<string::size_type> psegs; psegs.push(rv.length()); | 274 | stack<string::size_type> psegs; psegs.push(rv.length()); |
274 | string pseg; | 275 | string pseg; |
275 | for(;n<ul;) { | 276 | for(;n<ul;) { |
276 | string::size_type unsafe = uri.find_first_of(qf?"%":"%/?#",n); | 277 | string::size_type unsafe = uri.find_first_of(qf?"%":"%/?#",n); |
277 | if(unsafe==string::npos) { | 278 | if(unsafe==string::npos) { |
278 | pseg.append(uri,n,ul-n-1); n = ul-1; | 279 | pseg.append(uri,n,ul-n-1); n = ul-1; |
279 | }else{ | 280 | }else{ |
280 | pseg.append(uri,n,unsafe-n); | 281 | pseg.append(uri,n,unsafe-n); |
281 | n = unsafe; | 282 | n = unsafe; |
282 | } | 283 | } |
283 | char c = uri[n++]; | 284 | char c = uri[n++]; |
284 | if(c=='%') { | 285 | if(c=='%') { |
285 | if((n+1)>=ul) | 286 | if((n+1)>=ul) |
286 | throw bad_input(OPKELE_CP_ "Unexpected end of URI encountered while parsing percent-encoded character"); | 287 | throw bad_input(OPKELE_CP_ "Unexpected end of URI encountered while parsing percent-encoded character"); |
287 | tmp[0] = uri[n++]; | 288 | tmp[0] = uri[n++]; |
288 | tmp[1] = uri[n++]; | 289 | tmp[1] = uri[n++]; |
289 | if(!( isxdigit(tmp[0]) && isxdigit(tmp[1]) )) | 290 | if(!( isxdigit(tmp[0]) && isxdigit(tmp[1]) )) |
290 | throw bad_input(OPKELE_CP_ "Invalid percent-encoded character in URI being normalized"); | 291 | throw bad_input(OPKELE_CP_ "Invalid percent-encoded character in URI being normalized"); |
291 | int cc = strtol(tmp,0,16); | 292 | int cc = strtol(tmp,0,16); |
292 | if( isalpha(cc) || isdigit(cc) || strchr("._~-",cc) ) | 293 | if( isalpha(cc) || isdigit(cc) || strchr("._~-",cc) ) |
293 | pseg += cc; | 294 | pseg += cc; |
294 | else{ | 295 | else{ |
295 | pseg += '%'; | 296 | pseg += '%'; |
296 | pseg += toupper(tmp[0]); pseg += toupper(tmp[1]); | 297 | pseg += toupper(tmp[0]); pseg += toupper(tmp[1]); |
297 | } | 298 | } |
298 | }else if(qf) { | 299 | }else if(qf) { |
299 | rv += pseg; rv += c; | 300 | rv += pseg; rv += c; |
300 | pseg.clear(); | 301 | pseg.clear(); |
301 | }else if(n>=ul || strchr("?/#",c)) { | 302 | }else if(n>=ul || strchr("?/#",c)) { |
302 | if(pseg.empty() || pseg==".") { | 303 | if(pseg.empty() || pseg==".") { |
303 | }else if(pseg=="..") { | 304 | }else if(pseg=="..") { |
304 | if(psegs.size()>1) { | 305 | if(psegs.size()>1) { |
305 | rv.resize(psegs.top()); psegs.pop(); | 306 | rv.resize(psegs.top()); psegs.pop(); |
306 | } | 307 | } |
307 | }else{ | 308 | }else{ |
308 | psegs.push(rv.length()); | 309 | psegs.push(rv.length()); |
309 | if(c!='/') { | 310 | if(c!='/') { |
310 | pseg += c; | 311 | pseg += c; |
311 | qf = true; | 312 | qf = true; |
312 | } | 313 | } |
313 | rv += '/'; rv += pseg; | 314 | rv += '/'; rv += pseg; |
314 | } | 315 | } |
315 | if(c=='/' && (n>=ul || strchr("?#",uri[n])) ) { | 316 | if(c=='/' && (n>=ul || strchr("?#",uri[n])) ) { |
316 | rv += '/'; | 317 | rv += '/'; |
317 | if(n<ul) | 318 | if(n<ul) |
318 | qf = true; | 319 | qf = true; |
319 | }else if(strchr("?#",c)) { | 320 | }else if(strchr("?#",c)) { |
320 | if(psegs.size()==1 && psegs.top()==rv.length()) | 321 | if(psegs.size()==1 && psegs.top()==rv.length()) |
321 | rv += '/'; | 322 | rv += '/'; |
322 | if(pseg.empty()) | 323 | if(pseg.empty()) |
323 | rv += c; | 324 | rv += c; |
324 | qf = true; | 325 | qf = true; |
325 | } | 326 | } |
326 | pseg.clear(); | 327 | pseg.clear(); |
327 | }else{ | 328 | }else{ |
328 | pseg += c; | 329 | pseg += c; |
329 | } | 330 | } |
330 | } | 331 | } |
331 | if(!pseg.empty()) { | 332 | if(!pseg.empty()) { |
332 | if(!qf) rv += '/'; | 333 | if(!qf) rv += '/'; |
333 | rv += pseg; | 334 | rv += pseg; |
334 | } | 335 | } |
335 | return rv; | 336 | return rv; |
336 | } | 337 | } |
337 | 338 | ||
338 | string& strip_uri_fragment_part(string& u) { | 339 | string& strip_uri_fragment_part(string& u) { |
339 | string::size_type q = u.find('?'), f = u.find('#'); | 340 | string::size_type q = u.find('?'), f = u.find('#'); |
340 | if(q==string::npos) { | 341 | if(q==string::npos) { |
341 | if(f!=string::npos) | 342 | if(f!=string::npos) |
342 | u.erase(f); | 343 | u.erase(f); |
343 | }else{ | 344 | }else{ |
344 | if(f!=string::npos) { | 345 | if(f!=string::npos) { |
345 | if(f<q) | 346 | if(f<q) |
346 | u.erase(f,q-f); | 347 | u.erase(f,q-f); |
347 | else | 348 | else |
348 | u.erase(f); | 349 | u.erase(f); |
349 | } | 350 | } |
350 | } | 351 | } |
351 | return u; | 352 | return u; |
352 | } | 353 | } |
353 | 354 | ||
355 | bool uri_matches_realm(const string& uri,const string& realm) { | ||
356 | string nrealm = opkele::util::rfc_3986_normalize_uri(realm); | ||
357 | string nu = opkele::util::rfc_3986_normalize_uri(uri); | ||
358 | string::size_type pr = nrealm.find("://"); | ||
359 | string::size_type pu = nu.find("://"); | ||
360 | assert(!(pr==string::npos || pu==string::npos)); | ||
361 | pr += sizeof("://")-1; | ||
362 | pu += sizeof("://")-1; | ||
363 | if(!strncmp(nrealm.c_str()+pr,"*.",2)) { | ||
364 | pr = nrealm.find('.',pr); | ||
365 | pu = nu.find('.',pu); | ||
366 | assert(pr!=string::npos); | ||
367 | if(pu==string::npos) | ||
368 | return false; | ||
369 | // TODO: check for overgeneralized realm | ||
370 | } | ||
371 | string::size_type lr = nrealm.length(); | ||
372 | string::size_type lu = nu.length(); | ||
373 | if( (lu-pu) < (lr-pr) ) | ||
374 | return false; | ||
375 | pair<const char*,const char*> mp = mismatch( | ||
376 | nrealm.c_str()+pr,nrealm.c_str()+lr, | ||
377 | nu.c_str()+pu); | ||
378 | if( (*(mp.first-1))!='/' | ||
379 | && !strchr("/?#",*mp.second) ) | ||
380 | return false; | ||
381 | return true; | ||
382 | } | ||
383 | |||
354 | string abi_demangle(const char *mn) { | 384 | string abi_demangle(const char *mn) { |
355 | #ifndef HAVE_DEMANGLE | 385 | #ifndef HAVE_DEMANGLE |
356 | return mn; | 386 | return mn; |
357 | #else /* !HAVE_DEMANGLE */ | 387 | #else /* !HAVE_DEMANGLE */ |
358 | int dstat; | 388 | int dstat; |
359 | char *demangled = abi::__cxa_demangle(mn,0,0,&dstat); | 389 | char *demangled = abi::__cxa_demangle(mn,0,0,&dstat); |
360 | if(dstat) | 390 | if(dstat) |
361 | return mn; | 391 | return mn; |
362 | string rv = demangled; | 392 | string rv = demangled; |
363 | free(demangled); | 393 | free(demangled); |
364 | return rv; | 394 | return rv; |
365 | #endif /* !HAVE_DEMANGLE */ | 395 | #endif /* !HAVE_DEMANGLE */ |
366 | } | 396 | } |
367 | 397 | ||
368 | string base64_signature(const assoc_t& assoc,const basic_openid_message& om) { | 398 | string base64_signature(const assoc_t& assoc,const basic_openid_message& om) { |
369 | const string& slist = om.get_field("signed"); | 399 | const string& slist = om.get_field("signed"); |
370 | string kv; | 400 | string kv; |
371 | string::size_type p=0; | 401 | string::size_type p=0; |
372 | while(true) { | 402 | while(true) { |
373 | string::size_type co = slist.find(',',p); | 403 | string::size_type co = slist.find(',',p); |
374 | string f = (co==string::npos) | 404 | string f = (co==string::npos) |
375 | ?slist.substr(p):slist.substr(p,co-p); | 405 | ?slist.substr(p):slist.substr(p,co-p); |
376 | kv += f; | 406 | kv += f; |
377 | kv += ':'; | 407 | kv += ':'; |
378 | kv += om.get_field(f); | 408 | kv += om.get_field(f); |
379 | kv += '\n'; | 409 | kv += '\n'; |
380 | if(co==string::npos) break; | 410 | if(co==string::npos) break; |
381 | p = co+1; | 411 | p = co+1; |
382 | } | 412 | } |
383 | const secret_t& secret = assoc->secret(); | 413 | const secret_t& secret = assoc->secret(); |
384 | const EVP_MD *evpmd; | 414 | const EVP_MD *evpmd; |
385 | const string& at = assoc->assoc_type(); | 415 | const string& at = assoc->assoc_type(); |
386 | if(at=="HMAC-SHA256") | 416 | if(at=="HMAC-SHA256") |
387 | evpmd = EVP_sha256(); | 417 | evpmd = EVP_sha256(); |
388 | else if(at=="HMAC-SHA1") | 418 | else if(at=="HMAC-SHA1") |
389 | evpmd = EVP_sha1(); | 419 | evpmd = EVP_sha1(); |
390 | else | 420 | else |
391 | throw unsupported(OPKELE_CP_ "unknown association type"); | 421 | throw unsupported(OPKELE_CP_ "unknown association type"); |
392 | unsigned int md_len = 0; | 422 | unsigned int md_len = 0; |
393 | unsigned char *md = HMAC(evpmd, | 423 | unsigned char *md = HMAC(evpmd, |
394 | &(secret.front()),secret.size(), | 424 | &(secret.front()),secret.size(), |
395 | (const unsigned char*)kv.data(),kv.length(), | 425 | (const unsigned char*)kv.data(),kv.length(), |
396 | 0,&md_len); | 426 | 0,&md_len); |
397 | return encode_base64(md,md_len); | 427 | return encode_base64(md,md_len); |
398 | } | 428 | } |
399 | 429 | ||
400 | } | 430 | } |
401 | 431 | ||
402 | } | 432 | } |