line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
6
|
|
|
6
|
|
31
|
use strict; |
|
6
|
|
|
|
|
13
|
|
|
6
|
|
|
|
|
154
|
|
2
|
6
|
|
|
6
|
|
29
|
use Carp (); |
|
6
|
|
|
|
|
10
|
|
|
6
|
|
|
|
|
284
|
|
3
|
|
|
|
|
|
|
|
4
|
|
|
|
|
|
|
############################################################################ |
5
|
|
|
|
|
|
|
package Net::OpenID::Association; |
6
|
|
|
|
|
|
|
$Net::OpenID::Association::VERSION = '1.17'; |
7
|
|
|
|
|
|
|
use fields ( |
8
|
6
|
|
|
|
|
39
|
'server', # author-identity identity provider endpoint |
9
|
|
|
|
|
|
|
'secret', # the secret for this association |
10
|
|
|
|
|
|
|
'handle', # the 255-character-max ASCII printable handle (33-126) |
11
|
|
|
|
|
|
|
'expiry', # unixtime, adjusted, of when this association expires |
12
|
|
|
|
|
|
|
'type', # association type |
13
|
6
|
|
|
6
|
|
30
|
); |
|
6
|
|
|
|
|
8
|
|
14
|
|
|
|
|
|
|
|
15
|
6
|
|
|
6
|
|
14873
|
use Storable (); |
|
6
|
|
|
|
|
39646
|
|
|
6
|
|
|
|
|
158
|
|
16
|
6
|
|
|
6
|
|
46
|
use Digest::SHA (); |
|
6
|
|
|
|
|
14
|
|
|
6
|
|
|
|
|
114
|
|
17
|
6
|
|
|
6
|
|
5305
|
use Net::OpenID::Common; |
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
use URI::Escape qw(uri_escape); |
19
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
################################################################ |
21
|
|
|
|
|
|
|
# Association and Session Types |
22
|
|
|
|
|
|
|
|
23
|
|
|
|
|
|
|
# session type hash |
24
|
|
|
|
|
|
|
# name - by which session type appears in URI parameters (required) |
25
|
|
|
|
|
|
|
# len - number of bytes in digest (undef => accommodates any length) |
26
|
|
|
|
|
|
|
# fn - DH hash function (undef => secret passed in the clear) |
27
|
|
|
|
|
|
|
# https - must use encrypted connection (boolean) |
28
|
|
|
|
|
|
|
# |
29
|
|
|
|
|
|
|
my %_session_types = (); |
30
|
|
|
|
|
|
|
# {versionkey}{name} -> session type |
31
|
|
|
|
|
|
|
# {NO}{versionkey} -> no-encryption stype for this version |
32
|
|
|
|
|
|
|
# {MAX}{versionkey} -> strongest encryption stype for this version |
33
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
# association type hash |
35
|
|
|
|
|
|
|
# name - by which assoc. type appears in URI parameters (required) |
36
|
|
|
|
|
|
|
# len - number of bytes in digest (required) |
37
|
|
|
|
|
|
|
# macfn - MAC hash function (required) |
38
|
|
|
|
|
|
|
# |
39
|
|
|
|
|
|
|
my %_assoc_types = (); |
40
|
|
|
|
|
|
|
# {versionkey}{name} -> association type |
41
|
|
|
|
|
|
|
# {MAX}{versionkey} -> strongest encryption atype for this version |
42
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
my %_assoc_macfn = (); |
44
|
|
|
|
|
|
|
# {name} -> hmac function |
45
|
|
|
|
|
|
|
# ... since association types in the cache are only listed by name |
46
|
|
|
|
|
|
|
# and don't say what version they're from. Which should not matter |
47
|
|
|
|
|
|
|
# as long as the macfn associated with a given association type |
48
|
|
|
|
|
|
|
# name does not change in future versions. |
49
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
# (floating point version numbers scare me) |
51
|
|
|
|
|
|
|
# (also version key can stay the same if the |
52
|
|
|
|
|
|
|
# set of hash functions available does not change) |
53
|
|
|
|
|
|
|
# ('NO' and 'MAX' should never be used as version keys) |
54
|
|
|
|
|
|
|
sub _version_key_from_numeric { |
55
|
|
|
|
|
|
|
my ($numeric_protocol_version) = @_; |
56
|
|
|
|
|
|
|
return $numeric_protocol_version < 2 ? 'v1' : 'v2'; |
57
|
|
|
|
|
|
|
} |
58
|
|
|
|
|
|
|
# can SESSION_TYPE be used with ASSOC_TYPE? |
59
|
|
|
|
|
|
|
sub _compatible_stype_atype { |
60
|
|
|
|
|
|
|
my ($s_type, $a_type) = @_; |
61
|
|
|
|
|
|
|
return !$s_type->{len} || $s_type->{len} == $a_type->{len}; |
62
|
|
|
|
|
|
|
} |
63
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
{ |
65
|
|
|
|
|
|
|
# Define the no-encryption session types. |
66
|
|
|
|
|
|
|
# In version 1.1/1.0, the no-encryption session type |
67
|
|
|
|
|
|
|
# is the default and never explicitly specified |
68
|
|
|
|
|
|
|
$_session_types{$_->[0]}{$_->[1]} |
69
|
|
|
|
|
|
|
= $_session_types{NO}{$_->[0]} |
70
|
|
|
|
|
|
|
= { |
71
|
|
|
|
|
|
|
name => $_->[1], |
72
|
|
|
|
|
|
|
https => 1, |
73
|
|
|
|
|
|
|
} |
74
|
|
|
|
|
|
|
foreach ([v1 => ''], [v2 => 'no-encryption']); |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
# Define SHA-based session and association types |
77
|
|
|
|
|
|
|
my %_sha_fns = |
78
|
|
|
|
|
|
|
( |
79
|
|
|
|
|
|
|
SHA1 => { minv => 'v1', # first version group in which this appears |
80
|
|
|
|
|
|
|
v1max => 1, # best encryption for v1 |
81
|
|
|
|
|
|
|
len => 20, # number of bytes in digest |
82
|
|
|
|
|
|
|
fn => \&Digest::SHA::sha1, |
83
|
|
|
|
|
|
|
macfn => \&Digest::SHA::hmac_sha1, }, |
84
|
|
|
|
|
|
|
SHA256 => { minv => 'v2', |
85
|
|
|
|
|
|
|
v2max => 1, # best encryption for v2 |
86
|
|
|
|
|
|
|
len => 32, |
87
|
|
|
|
|
|
|
fn => \&Digest::SHA::sha256, |
88
|
|
|
|
|
|
|
macfn => \&Digest::SHA::hmac_sha256, }, |
89
|
|
|
|
|
|
|
# doubtless there will be more... |
90
|
|
|
|
|
|
|
); |
91
|
|
|
|
|
|
|
foreach my $SHAX (keys %_sha_fns) { |
92
|
|
|
|
|
|
|
my $s = $_sha_fns{$SHAX}; |
93
|
|
|
|
|
|
|
my $a_type = { name => "HMAC-${SHAX}", map {$_,$s->{$_}} qw(len macfn) }; |
94
|
|
|
|
|
|
|
my $s_type = { name => "DH-${SHAX}", map {$_,$s->{$_}} qw(len fn) }; |
95
|
|
|
|
|
|
|
my $seen_minv = 0; |
96
|
|
|
|
|
|
|
foreach my $v (qw(v1 v2)) { |
97
|
|
|
|
|
|
|
$seen_minv = 1 if $v eq $s->{minv}; |
98
|
|
|
|
|
|
|
next unless $seen_minv; |
99
|
|
|
|
|
|
|
$_assoc_types{$v}{$a_type->{name}} = $a_type; |
100
|
|
|
|
|
|
|
$_session_types{$v}{$s_type->{name}} = $s_type; |
101
|
|
|
|
|
|
|
if ($s->{"${v}max"}) { |
102
|
|
|
|
|
|
|
$_assoc_types{MAX}{$v} = $a_type; |
103
|
|
|
|
|
|
|
$_session_types{MAX}{$v} = $s_type; |
104
|
|
|
|
|
|
|
} |
105
|
|
|
|
|
|
|
} |
106
|
|
|
|
|
|
|
$_assoc_macfn{$a_type->{name}} = $a_type->{macfn}; |
107
|
|
|
|
|
|
|
} |
108
|
|
|
|
|
|
|
} |
109
|
|
|
|
|
|
|
################################################################ |
110
|
|
|
|
|
|
|
|
111
|
|
|
|
|
|
|
sub new { |
112
|
|
|
|
|
|
|
my Net::OpenID::Association $self = shift; |
113
|
|
|
|
|
|
|
$self = fields::new( $self ) unless ref $self; |
114
|
|
|
|
|
|
|
my %opts = @_; |
115
|
|
|
|
|
|
|
for my $f (qw( server secret handle expiry type )) { |
116
|
|
|
|
|
|
|
$self->{$f} = delete $opts{$f}; |
117
|
|
|
|
|
|
|
} |
118
|
|
|
|
|
|
|
Carp::croak("unknown options: " . join(", ", keys %opts)) if %opts; |
119
|
|
|
|
|
|
|
return $self; |
120
|
|
|
|
|
|
|
} |
121
|
|
|
|
|
|
|
|
122
|
|
|
|
|
|
|
sub handle { |
123
|
|
|
|
|
|
|
my $self = shift; |
124
|
|
|
|
|
|
|
die if @_; |
125
|
|
|
|
|
|
|
$self->{'handle'}; |
126
|
|
|
|
|
|
|
} |
127
|
|
|
|
|
|
|
|
128
|
|
|
|
|
|
|
sub secret { |
129
|
|
|
|
|
|
|
my $self = shift; |
130
|
|
|
|
|
|
|
die if @_; |
131
|
|
|
|
|
|
|
$self->{'secret'}; |
132
|
|
|
|
|
|
|
} |
133
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
sub type { |
135
|
|
|
|
|
|
|
my $self = shift; |
136
|
|
|
|
|
|
|
die if @_; |
137
|
|
|
|
|
|
|
$self->{'type'}; |
138
|
|
|
|
|
|
|
} |
139
|
|
|
|
|
|
|
|
140
|
|
|
|
|
|
|
sub generate_signature { |
141
|
|
|
|
|
|
|
my Net::OpenID::Association $self = shift; |
142
|
|
|
|
|
|
|
my $string = shift; |
143
|
|
|
|
|
|
|
return OpenID::util::b64($_assoc_macfn{$self->type}->($string, $self->secret)); |
144
|
|
|
|
|
|
|
} |
145
|
|
|
|
|
|
|
|
146
|
|
|
|
|
|
|
sub server { |
147
|
|
|
|
|
|
|
my Net::OpenID::Association $self = shift; |
148
|
|
|
|
|
|
|
Carp::croak("Too many parameters") if @_; |
149
|
|
|
|
|
|
|
return $self->{server}; |
150
|
|
|
|
|
|
|
} |
151
|
|
|
|
|
|
|
|
152
|
|
|
|
|
|
|
sub expired { |
153
|
|
|
|
|
|
|
my Net::OpenID::Association $self = shift; |
154
|
|
|
|
|
|
|
return time() > $self->{'expiry'}; |
155
|
|
|
|
|
|
|
} |
156
|
|
|
|
|
|
|
|
157
|
|
|
|
|
|
|
sub usable { |
158
|
|
|
|
|
|
|
my Net::OpenID::Association $self = shift; |
159
|
|
|
|
|
|
|
return 0 unless $self->{'handle'} =~ /^[\x21-\x7e]{1,255}$/; |
160
|
|
|
|
|
|
|
return 0 unless $self->{'expiry'} =~ /^\d+$/; |
161
|
|
|
|
|
|
|
return 0 unless $self->{'secret'}; |
162
|
|
|
|
|
|
|
return 0 if $self->expired; |
163
|
|
|
|
|
|
|
return 1; |
164
|
|
|
|
|
|
|
} |
165
|
|
|
|
|
|
|
|
166
|
|
|
|
|
|
|
|
167
|
|
|
|
|
|
|
# server_assoc(CSR, SERVER, FORCE_REASSOCIATE, OPTIONS...) |
168
|
|
|
|
|
|
|
# |
169
|
|
|
|
|
|
|
# Return an association for SERVER (provider), whether already |
170
|
|
|
|
|
|
|
# cached and not yet expired, or freshly negotiated. |
171
|
|
|
|
|
|
|
# Return undef if no local storage/cache is available |
172
|
|
|
|
|
|
|
# or negotiation fails for whatever reason, |
173
|
|
|
|
|
|
|
# in which case the caller goes into dumb consumer mode. |
174
|
|
|
|
|
|
|
# FORCE_REASSOCIATE true => ignore the cache |
175
|
|
|
|
|
|
|
# OPTIONS... are passed to new_server_assoc() |
176
|
|
|
|
|
|
|
# |
177
|
|
|
|
|
|
|
sub server_assoc { |
178
|
|
|
|
|
|
|
my ($csr, $server, $force_reassociate, @opts) = @_; |
179
|
|
|
|
|
|
|
|
180
|
|
|
|
|
|
|
# closure to return undef (dumb consumer mode) and log why |
181
|
|
|
|
|
|
|
my $dumb = sub { |
182
|
|
|
|
|
|
|
$csr->_debug("server_assoc: dumb mode: $_[0]"); |
183
|
|
|
|
|
|
|
return undef; |
184
|
|
|
|
|
|
|
}; |
185
|
|
|
|
|
|
|
|
186
|
|
|
|
|
|
|
my $cache = $csr->cache; |
187
|
|
|
|
|
|
|
return $dumb->("no_cache") unless $cache; |
188
|
|
|
|
|
|
|
|
189
|
|
|
|
|
|
|
unless ($force_reassociate) { |
190
|
|
|
|
|
|
|
# try first from cached association handle |
191
|
|
|
|
|
|
|
if (my $handle = $cache->get("shandle:$server")) { |
192
|
|
|
|
|
|
|
my $assoc = handle_assoc($csr, $server, $handle); |
193
|
|
|
|
|
|
|
|
194
|
|
|
|
|
|
|
if ($assoc && $assoc->usable) { |
195
|
|
|
|
|
|
|
$csr->_debug("Found association from cache (handle=$handle)"); |
196
|
|
|
|
|
|
|
return $assoc; |
197
|
|
|
|
|
|
|
} |
198
|
|
|
|
|
|
|
} |
199
|
|
|
|
|
|
|
} |
200
|
|
|
|
|
|
|
|
201
|
|
|
|
|
|
|
# make a new association |
202
|
|
|
|
|
|
|
my ($assoc, $err, $retry) = new_server_assoc($csr, $server, @opts); |
203
|
|
|
|
|
|
|
return $dumb->($err) |
204
|
|
|
|
|
|
|
if $err; |
205
|
|
|
|
|
|
|
($assoc, $err) = new_server_assoc($csr, $server, @opts, %$retry) |
206
|
|
|
|
|
|
|
if $retry; |
207
|
|
|
|
|
|
|
return $dumb->($err || 'second_retry') |
208
|
|
|
|
|
|
|
unless $assoc; |
209
|
|
|
|
|
|
|
|
210
|
|
|
|
|
|
|
my $ahandle = $assoc->handle; |
211
|
|
|
|
|
|
|
$cache->set("hassoc:$server:$ahandle", Storable::freeze({%$assoc})); |
212
|
|
|
|
|
|
|
$cache->set("shandle:$server", $ahandle); |
213
|
|
|
|
|
|
|
|
214
|
|
|
|
|
|
|
# now we test that the cache object given to us actually works. if it |
215
|
|
|
|
|
|
|
# doesn't, it'll also fail later, making the verify fail, so let's |
216
|
|
|
|
|
|
|
# go into stateless (dumb mode) earlier if we can detect this. |
217
|
|
|
|
|
|
|
$cache->get("shandle:$server") |
218
|
|
|
|
|
|
|
or return $dumb->("cache_broken"); |
219
|
|
|
|
|
|
|
|
220
|
|
|
|
|
|
|
return $assoc; |
221
|
|
|
|
|
|
|
} |
222
|
|
|
|
|
|
|
|
223
|
|
|
|
|
|
|
# new_server_assoc(CSR, SERVER, OPTIONS...) |
224
|
|
|
|
|
|
|
# |
225
|
|
|
|
|
|
|
# Attempts to negotiate a fresh association from C<$server> (provider) |
226
|
|
|
|
|
|
|
# with session and association types determined by OPTIONS... |
227
|
|
|
|
|
|
|
# (accepts protocol_version and all assoc_options from Consumer, |
228
|
|
|
|
|
|
|
# however max_encrypt and session_no_encrypt_https are ignored |
229
|
|
|
|
|
|
|
# if assoc_type and session_type are passed directly as hashes) |
230
|
|
|
|
|
|
|
# Returns |
231
|
|
|
|
|
|
|
# ($association) on success |
232
|
|
|
|
|
|
|
# (undef, $error_message) on unrecoverable failure |
233
|
|
|
|
|
|
|
# (undef, undef, {retry...}) if identity provider suggested |
234
|
|
|
|
|
|
|
# alternate session/assoc types in an error response |
235
|
|
|
|
|
|
|
# |
236
|
|
|
|
|
|
|
sub new_server_assoc { |
237
|
|
|
|
|
|
|
my ($csr, $server, %opts) = @_; |
238
|
|
|
|
|
|
|
my $server_is_https = lc($server) =~ m/^https:/; |
239
|
|
|
|
|
|
|
my $protocol_version = delete $opts{protocol_version} || 1; |
240
|
|
|
|
|
|
|
my $version_key = _version_key_from_numeric($protocol_version); |
241
|
|
|
|
|
|
|
my $allow_eavesdropping = (delete $opts{allow_eavesdropping} || 0) && $protocol_version < 2; |
242
|
|
|
|
|
|
|
|
243
|
|
|
|
|
|
|
my $a_maxencrypt = delete $opts{max_encrypt} || 0; |
244
|
|
|
|
|
|
|
my $s_noencrypt = delete $opts{session_no_encrypt_https} && $server_is_https; |
245
|
|
|
|
|
|
|
|
246
|
|
|
|
|
|
|
my $s_type = delete $opts{session_type} || "DH-SHA1"; |
247
|
|
|
|
|
|
|
unless (ref $s_type) { |
248
|
|
|
|
|
|
|
if ($s_noencrypt) { |
249
|
|
|
|
|
|
|
$s_type = $_session_types{NO}{$version_key}; |
250
|
|
|
|
|
|
|
} |
251
|
|
|
|
|
|
|
elsif ($a_maxencrypt) { |
252
|
|
|
|
|
|
|
$s_type = $_session_types{MAX}{$version_key}; |
253
|
|
|
|
|
|
|
} |
254
|
|
|
|
|
|
|
} |
255
|
|
|
|
|
|
|
|
256
|
|
|
|
|
|
|
my $a_type = delete $opts{assoc_type} || "HMAC-SHA1"; |
257
|
|
|
|
|
|
|
unless (ref $a_type) { |
258
|
|
|
|
|
|
|
$a_type = $_assoc_types{MAX}{$version_key} |
259
|
|
|
|
|
|
|
if $a_maxencrypt; |
260
|
|
|
|
|
|
|
} |
261
|
|
|
|
|
|
|
|
262
|
|
|
|
|
|
|
Carp::croak("unknown options: " . join(", ", keys %opts)) if %opts; |
263
|
|
|
|
|
|
|
|
264
|
|
|
|
|
|
|
$a_type = $_assoc_types{$version_key}{$a_type} unless ref $a_type; |
265
|
|
|
|
|
|
|
Carp::croak("unknown association type") unless $a_type; |
266
|
|
|
|
|
|
|
|
267
|
|
|
|
|
|
|
$s_type = $_session_types{$version_key}{$s_type} unless ref $s_type; |
268
|
|
|
|
|
|
|
Carp::croak("unknown session type") unless $s_type; |
269
|
|
|
|
|
|
|
|
270
|
|
|
|
|
|
|
my $error = sub { return (undef, $_[0].($_[1]?" ($_[1])":'')); }; |
271
|
|
|
|
|
|
|
|
272
|
|
|
|
|
|
|
return $error->("incompatible_session_type") |
273
|
|
|
|
|
|
|
unless _compatible_stype_atype($s_type, $a_type); |
274
|
|
|
|
|
|
|
|
275
|
|
|
|
|
|
|
return $error->("https_required") |
276
|
|
|
|
|
|
|
if $s_type->{https} && !$server_is_https && !$allow_eavesdropping; |
277
|
|
|
|
|
|
|
|
278
|
|
|
|
|
|
|
my %post = ( "openid.mode" => "associate" ); |
279
|
|
|
|
|
|
|
$post{'openid.ns'} = OpenID::util::version_2_namespace() |
280
|
|
|
|
|
|
|
if $protocol_version == 2; |
281
|
|
|
|
|
|
|
$post{'openid.assoc_type'} = $a_type->{name}; |
282
|
|
|
|
|
|
|
$post{'openid.session_type'} = $s_type->{name} if $s_type->{name}; |
283
|
|
|
|
|
|
|
|
284
|
|
|
|
|
|
|
my $dh; |
285
|
|
|
|
|
|
|
if ($s_type->{fn}) { |
286
|
|
|
|
|
|
|
$dh = OpenID::util::get_dh(); |
287
|
|
|
|
|
|
|
$post{'openid.dh_consumer_public'} = OpenID::util::int2arg($dh->pub_key); |
288
|
|
|
|
|
|
|
} |
289
|
|
|
|
|
|
|
|
290
|
|
|
|
|
|
|
my $req = HTTP::Request->new(POST => $server); |
291
|
|
|
|
|
|
|
$req->header("Content-Type" => "application/x-www-form-urlencoded"); |
292
|
|
|
|
|
|
|
$req->content(join("&", map { "$_=" . uri_escape($post{$_}) } keys %post)); |
293
|
|
|
|
|
|
|
|
294
|
|
|
|
|
|
|
$csr->_debug("Associate mode request: " . $req->content); |
295
|
|
|
|
|
|
|
|
296
|
|
|
|
|
|
|
my $ua = $csr->ua; |
297
|
|
|
|
|
|
|
my $res = $ua->request($req); |
298
|
|
|
|
|
|
|
|
299
|
|
|
|
|
|
|
return $error->("http_no_response") unless $res; |
300
|
|
|
|
|
|
|
|
301
|
|
|
|
|
|
|
my $recv_time = time(); |
302
|
|
|
|
|
|
|
my $content = $res->content; |
303
|
|
|
|
|
|
|
my %args = OpenID::util::parse_keyvalue($content); |
304
|
|
|
|
|
|
|
$csr->_debug("Response to associate mode: [$content] parsed = " . join(",", %args)); |
305
|
|
|
|
|
|
|
|
306
|
|
|
|
|
|
|
my $r_a_type = $_assoc_types{$version_key}{$args{'assoc_type'}}; |
307
|
|
|
|
|
|
|
my $r_s_type = $_session_types{$version_key}{$args{'session_type'}||''}; |
308
|
|
|
|
|
|
|
|
309
|
|
|
|
|
|
|
unless ($res->is_success) { |
310
|
|
|
|
|
|
|
# direct error |
311
|
|
|
|
|
|
|
return $error->("http_failure_no_associate") |
312
|
|
|
|
|
|
|
if ($protocol_version < 2); |
313
|
|
|
|
|
|
|
return $error->("http_direct_error") |
314
|
|
|
|
|
|
|
unless $args{'error_code'} eq 'unsupported_type'; |
315
|
|
|
|
|
|
|
return (undef,undef,{assoc_type => $r_a_type, session_type => $r_s_type}) |
316
|
|
|
|
|
|
|
if $r_a_type && $r_s_type && ($r_a_type != $a_type || $r_s_type != $s_type); |
317
|
|
|
|
|
|
|
return $error->("unsupported_type"); |
318
|
|
|
|
|
|
|
} |
319
|
|
|
|
|
|
|
return $error->("unknown_assoc_type",$args{'assoc_type'}) |
320
|
|
|
|
|
|
|
unless $r_a_type; |
321
|
|
|
|
|
|
|
return $error->("unknown_session_type",$args{'session_type'}) |
322
|
|
|
|
|
|
|
unless $r_s_type; |
323
|
|
|
|
|
|
|
return $error->("wrong_assoc_type",$r_a_type->{name}) |
324
|
|
|
|
|
|
|
unless $a_type == $r_a_type; |
325
|
|
|
|
|
|
|
return $error->("wrong_session_type",$r_s_type->{name}) |
326
|
|
|
|
|
|
|
unless $s_type == $r_s_type || ($protocol_version < 2); |
327
|
|
|
|
|
|
|
|
328
|
|
|
|
|
|
|
# protocol version 1.1 |
329
|
|
|
|
|
|
|
my $expires_in = $args{'expires_in'}; |
330
|
|
|
|
|
|
|
|
331
|
|
|
|
|
|
|
# protocol version 1.0 (DEPRECATED) |
332
|
|
|
|
|
|
|
if (! $expires_in) { |
333
|
|
|
|
|
|
|
if (my $issued = OpenID::util::w3c_to_time($args{'issued'})) { |
334
|
|
|
|
|
|
|
my $expiry = OpenID::util::w3c_to_time($args{'expiry'}); |
335
|
|
|
|
|
|
|
my $replace_after = OpenID::util::w3c_to_time($args{'replace_after'}); |
336
|
|
|
|
|
|
|
|
337
|
|
|
|
|
|
|
# seconds ahead (positive) or behind (negative) the provider is |
338
|
|
|
|
|
|
|
$expires_in = ($replace_after || $expiry) - $issued; |
339
|
|
|
|
|
|
|
} |
340
|
|
|
|
|
|
|
} |
341
|
|
|
|
|
|
|
|
342
|
|
|
|
|
|
|
# between 1 second and 2 years |
343
|
|
|
|
|
|
|
return $error->("bogus_expires_in") |
344
|
|
|
|
|
|
|
unless $expires_in > 0 && $expires_in < 63072000; |
345
|
|
|
|
|
|
|
|
346
|
|
|
|
|
|
|
my $ahandle = $args{'assoc_handle'}; |
347
|
|
|
|
|
|
|
|
348
|
|
|
|
|
|
|
my $secret; |
349
|
|
|
|
|
|
|
unless ($r_s_type->{fn}) { |
350
|
|
|
|
|
|
|
$secret = OpenID::util::d64($args{'mac_key'}); |
351
|
|
|
|
|
|
|
} |
352
|
|
|
|
|
|
|
else { |
353
|
|
|
|
|
|
|
my $server_pub = OpenID::util::arg2int($args{'dh_server_public'}); |
354
|
|
|
|
|
|
|
my $dh_sec = $dh->compute_secret($server_pub); |
355
|
|
|
|
|
|
|
$secret = OpenID::util::d64($args{'enc_mac_key'}) |
356
|
|
|
|
|
|
|
^ $r_s_type->{fn}->(OpenID::util::int2bytes($dh_sec)); |
357
|
|
|
|
|
|
|
} |
358
|
|
|
|
|
|
|
return $error->("bad_secret_length") |
359
|
|
|
|
|
|
|
if $r_s_type->{len} && length($secret) != $r_s_type->{len}; |
360
|
|
|
|
|
|
|
|
361
|
|
|
|
|
|
|
my %assoc = ( |
362
|
|
|
|
|
|
|
handle => $ahandle, |
363
|
|
|
|
|
|
|
server => $server, |
364
|
|
|
|
|
|
|
secret => $secret, |
365
|
|
|
|
|
|
|
type => $r_a_type->{name}, |
366
|
|
|
|
|
|
|
expiry => $recv_time + $expires_in, |
367
|
|
|
|
|
|
|
); |
368
|
|
|
|
|
|
|
|
369
|
|
|
|
|
|
|
return Net::OpenID::Association->new( %assoc ); |
370
|
|
|
|
|
|
|
} |
371
|
|
|
|
|
|
|
|
372
|
|
|
|
|
|
|
# returns association, or undef if it can't be found |
373
|
|
|
|
|
|
|
sub handle_assoc { |
374
|
|
|
|
|
|
|
my ($csr, $server, $handle) = @_; |
375
|
|
|
|
|
|
|
|
376
|
|
|
|
|
|
|
# closure to return undef (dumb consumer mode) and log why |
377
|
|
|
|
|
|
|
my $dumb = sub { |
378
|
|
|
|
|
|
|
$csr->_debug("handle_assoc: dumb mode: $_[0]"); |
379
|
|
|
|
|
|
|
return undef; |
380
|
|
|
|
|
|
|
}; |
381
|
|
|
|
|
|
|
|
382
|
|
|
|
|
|
|
return $dumb->("no_handle") unless $handle; |
383
|
|
|
|
|
|
|
|
384
|
|
|
|
|
|
|
my $cache = $csr->cache; |
385
|
|
|
|
|
|
|
return $dumb->("no_cache") unless $cache; |
386
|
|
|
|
|
|
|
|
387
|
|
|
|
|
|
|
my $frozen = $cache->get("hassoc:$server:$handle"); |
388
|
|
|
|
|
|
|
return $dumb->("not_in_cache") unless $frozen; |
389
|
|
|
|
|
|
|
|
390
|
|
|
|
|
|
|
my $param = eval { Storable::thaw($frozen) }; |
391
|
|
|
|
|
|
|
return $dumb->("not_a_hashref") unless ref $param eq "HASH"; |
392
|
|
|
|
|
|
|
|
393
|
|
|
|
|
|
|
return Net::OpenID::Association->new( %$param ); |
394
|
|
|
|
|
|
|
} |
395
|
|
|
|
|
|
|
|
396
|
|
|
|
|
|
|
sub invalidate_handle { |
397
|
|
|
|
|
|
|
my ($csr, $server, $handle) = @_; |
398
|
|
|
|
|
|
|
my $cache = $csr->cache |
399
|
|
|
|
|
|
|
or return; |
400
|
|
|
|
|
|
|
$cache->set("hassoc:$server:$handle", ""); |
401
|
|
|
|
|
|
|
} |
402
|
|
|
|
|
|
|
|
403
|
|
|
|
|
|
|
1; |
404
|
|
|
|
|
|
|
|
405
|
|
|
|
|
|
|
__END__ |