mirror of
https://github.com/silverstripe/silverstripe-framework
synced 2024-10-22 12:05:37 +00:00
Removed OpenID from core - it is now a module
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@44372 467b73ca-7a2a-4603-9d3b-597d59a354a9
This commit is contained in:
parent
09f9baf890
commit
6a9e104006
@ -1,18 +0,0 @@
|
|||||||
#OpenIDLoginForm_LoginForm_OpenIDURL {
|
|
||||||
background: url(../../sapphire/images/openid-small.gif) no-repeat;
|
|
||||||
background-color: #fff;
|
|
||||||
background-position: 0 50%;
|
|
||||||
color: #000;
|
|
||||||
padding-left: 18px;
|
|
||||||
width: 284px;
|
|
||||||
}
|
|
||||||
|
|
||||||
#OpenIDDescription {
|
|
||||||
margin-bottom: 2em;
|
|
||||||
}
|
|
||||||
|
|
||||||
#OpenIDDescription p {
|
|
||||||
font-size: 1em;
|
|
||||||
line-height: 1.3em;
|
|
||||||
margin-top: 0.5em !important;
|
|
||||||
}
|
|
@ -1,529 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the PHP OpenID library by JanRain, Inc.
|
|
||||||
*
|
|
||||||
* This module contains core utility functionality used by the
|
|
||||||
* library. See Consumer.php and Server.php for the consumer and
|
|
||||||
* server implementations.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the fetcher code.
|
|
||||||
*/
|
|
||||||
require_once "Auth/Yadis/PlainHTTPFetcher.php";
|
|
||||||
require_once "Auth/Yadis/ParanoidHTTPFetcher.php";
|
|
||||||
require_once "Auth/OpenID/BigMath.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Status code returned by the server when the only option is to show
|
|
||||||
* an error page, since we do not have enough information to redirect
|
|
||||||
* back to the consumer. The associated value is an error message that
|
|
||||||
* should be displayed on an HTML error page.
|
|
||||||
*
|
|
||||||
* @see Auth_OpenID_Server
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_LOCAL_ERROR', 'local_error');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Status code returned when there is an error to return in key-value
|
|
||||||
* form to the consumer. The caller should return a 400 Bad Request
|
|
||||||
* response with content-type text/plain and the value as the body.
|
|
||||||
*
|
|
||||||
* @see Auth_OpenID_Server
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_REMOTE_ERROR', 'remote_error');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Status code returned when there is a key-value form OK response to
|
|
||||||
* the consumer. The value associated with this code is the
|
|
||||||
* response. The caller should return a 200 OK response with
|
|
||||||
* content-type text/plain and the value as the body.
|
|
||||||
*
|
|
||||||
* @see Auth_OpenID_Server
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_REMOTE_OK', 'remote_ok');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Status code returned when there is a redirect back to the
|
|
||||||
* consumer. The value is the URL to redirect back to. The caller
|
|
||||||
* should return a 302 Found redirect with a Location: header
|
|
||||||
* containing the URL.
|
|
||||||
*
|
|
||||||
* @see Auth_OpenID_Server
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_REDIRECT', 'redirect');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Status code returned when the caller needs to authenticate the
|
|
||||||
* user. The associated value is a {@link Auth_OpenID_ServerRequest}
|
|
||||||
* object that can be used to complete the authentication. If the user
|
|
||||||
* has taken some authentication action, use the retry() method of the
|
|
||||||
* {@link Auth_OpenID_ServerRequest} object to complete the request.
|
|
||||||
*
|
|
||||||
* @see Auth_OpenID_Server
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_DO_AUTH', 'do_auth');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Status code returned when there were no OpenID arguments
|
|
||||||
* passed. This code indicates that the caller should return a 200 OK
|
|
||||||
* response and display an HTML page that says that this is an OpenID
|
|
||||||
* server endpoint.
|
|
||||||
*
|
|
||||||
* @see Auth_OpenID_Server
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_DO_ABOUT', 'do_about');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Defines for regexes and format checking.
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_letters',
|
|
||||||
"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ");
|
|
||||||
|
|
||||||
define('Auth_OpenID_digits',
|
|
||||||
"0123456789");
|
|
||||||
|
|
||||||
define('Auth_OpenID_punct',
|
|
||||||
"!\"#$%&'()*+,-./:;<=>?@[\\]^_`{|}~");
|
|
||||||
|
|
||||||
if (Auth_OpenID_getMathLib() === null && !defined('Auth_OpenID_NO_MATH_SUPPORT')) {
|
|
||||||
|
|
||||||
define('Auth_OpenID_NO_MATH_SUPPORT', true);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The OpenID utility function class.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
class Auth_OpenID {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return true if $thing is an Auth_OpenID_FailureResponse object;
|
|
||||||
* false if not.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function isFailure($thing)
|
|
||||||
{
|
|
||||||
return is_a($thing, 'Auth_OpenID_FailureResponse');
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Gets the query data from the server environment based on the
|
|
||||||
* request method used. If GET was used, this looks at
|
|
||||||
* $_SERVER['QUERY_STRING'] directly. If POST was used, this
|
|
||||||
* fetches data from the special php://input file stream.
|
|
||||||
*
|
|
||||||
* Returns an associative array of the query arguments.
|
|
||||||
*
|
|
||||||
* Skips invalid key/value pairs (i.e. keys with no '=value'
|
|
||||||
* portion).
|
|
||||||
*
|
|
||||||
* Returns an empty array if neither GET nor POST was used, or if
|
|
||||||
* POST was used but php://input cannot be opened.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function getQuery($query_str=null)
|
|
||||||
{
|
|
||||||
if ($query_str !== null) {
|
|
||||||
$str = $query_str;
|
|
||||||
} else if ($_SERVER['REQUEST_METHOD'] == 'GET') {
|
|
||||||
$str = $_SERVER['QUERY_STRING'];
|
|
||||||
} else if ($_SERVER['REQUEST_METHOD'] == 'POST') {
|
|
||||||
$str = file_get_contents('php://input');
|
|
||||||
|
|
||||||
if ($str === false) {
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
|
|
||||||
$chunks = explode("&", $str);
|
|
||||||
|
|
||||||
$data = array();
|
|
||||||
foreach ($chunks as $chunk) {
|
|
||||||
$parts = explode("=", $chunk, 2);
|
|
||||||
|
|
||||||
if (count($parts) != 2) {
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
list($k, $v) = $parts;
|
|
||||||
$data[$k] = urldecode($v);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $data;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create dir_name as a directory if it does not exist. If it
|
|
||||||
* exists, make sure that it is, in fact, a directory. Returns
|
|
||||||
* true if the operation succeeded; false if not.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function ensureDir($dir_name)
|
|
||||||
{
|
|
||||||
if (is_dir($dir_name) || @mkdir($dir_name)) {
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
if (Auth_OpenID::ensureDir(dirname($dir_name))) {
|
|
||||||
return is_dir($dir_name) || @mkdir($dir_name);
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Adds a string prefix to all values of an array. Returns a new
|
|
||||||
* array containing the prefixed values.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function addPrefix($values, $prefix)
|
|
||||||
{
|
|
||||||
$new_values = array();
|
|
||||||
foreach ($values as $s) {
|
|
||||||
$new_values[] = $prefix . $s;
|
|
||||||
}
|
|
||||||
return $new_values;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Convenience function for getting array values. Given an array
|
|
||||||
* $arr and a key $key, get the corresponding value from the array
|
|
||||||
* or return $default if the key is absent.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function arrayGet($arr, $key, $fallback = null)
|
|
||||||
{
|
|
||||||
if (is_array($arr)) {
|
|
||||||
if (array_key_exists($key, $arr)) {
|
|
||||||
return $arr[$key];
|
|
||||||
} else {
|
|
||||||
return $fallback;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
trigger_error("Auth_OpenID::arrayGet (key = ".$key.") expected " .
|
|
||||||
"array as first parameter, got " .
|
|
||||||
gettype($arr), E_USER_WARNING);
|
|
||||||
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Replacement for PHP's broken parse_str.
|
|
||||||
*/
|
|
||||||
function parse_str($query)
|
|
||||||
{
|
|
||||||
if ($query === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$parts = explode('&', $query);
|
|
||||||
|
|
||||||
$new_parts = array();
|
|
||||||
for ($i = 0; $i < count($parts); $i++) {
|
|
||||||
$pair = explode('=', $parts[$i]);
|
|
||||||
|
|
||||||
if (count($pair) != 2) {
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
list($key, $value) = $pair;
|
|
||||||
$new_parts[$key] = urldecode($value);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $new_parts;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Implements the PHP 5 'http_build_query' functionality.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param array $data Either an array key/value pairs or an array
|
|
||||||
* of arrays, each of which holding two values: a key and a value,
|
|
||||||
* sequentially.
|
|
||||||
* @return string $result The result of url-encoding the key/value
|
|
||||||
* pairs from $data into a URL query string
|
|
||||||
* (e.g. "username=bob&id=56").
|
|
||||||
*/
|
|
||||||
function httpBuildQuery($data)
|
|
||||||
{
|
|
||||||
$pairs = array();
|
|
||||||
foreach ($data as $key => $value) {
|
|
||||||
if (is_array($value)) {
|
|
||||||
$pairs[] = urlencode($value[0])."=".urlencode($value[1]);
|
|
||||||
} else {
|
|
||||||
$pairs[] = urlencode($key)."=".urlencode($value);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return implode("&", $pairs);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* "Appends" query arguments onto a URL. The URL may or may not
|
|
||||||
* already have arguments (following a question mark).
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param string $url A URL, which may or may not already have
|
|
||||||
* arguments.
|
|
||||||
* @param array $args Either an array key/value pairs or an array of
|
|
||||||
* arrays, each of which holding two values: a key and a value,
|
|
||||||
* sequentially. If $args is an ordinary key/value array, the
|
|
||||||
* parameters will be added to the URL in sorted alphabetical order;
|
|
||||||
* if $args is an array of arrays, their order will be preserved.
|
|
||||||
* @return string $url The original URL with the new parameters added.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
function appendArgs($url, $args)
|
|
||||||
{
|
|
||||||
if (count($args) == 0) {
|
|
||||||
return $url;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Non-empty array; if it is an array of arrays, use
|
|
||||||
// multisort; otherwise use sort.
|
|
||||||
if (array_key_exists(0, $args) &&
|
|
||||||
is_array($args[0])) {
|
|
||||||
// Do nothing here.
|
|
||||||
} else {
|
|
||||||
$keys = array_keys($args);
|
|
||||||
sort($keys);
|
|
||||||
$new_args = array();
|
|
||||||
foreach ($keys as $key) {
|
|
||||||
$new_args[] = array($key, $args[$key]);
|
|
||||||
}
|
|
||||||
$args = $new_args;
|
|
||||||
}
|
|
||||||
|
|
||||||
$sep = '?';
|
|
||||||
if (strpos($url, '?') !== false) {
|
|
||||||
$sep = '&';
|
|
||||||
}
|
|
||||||
|
|
||||||
return $url . $sep . Auth_OpenID::httpBuildQuery($args);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Turn a string into an ASCII string.
|
|
||||||
*
|
|
||||||
* Replace non-ascii characters with a %-encoded, UTF-8
|
|
||||||
* encoding. This function will fail if the input is a string and
|
|
||||||
* there are non-7-bit-safe characters. It is assumed that the
|
|
||||||
* caller will have already translated the input into a Unicode
|
|
||||||
* character sequence, according to the encoding of the HTTP POST
|
|
||||||
* or GET.
|
|
||||||
*
|
|
||||||
* Do not escape anything that is already 7-bit safe, so we do the
|
|
||||||
* minimal transform on the identity URL
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function quoteMinimal($s)
|
|
||||||
{
|
|
||||||
$res = array();
|
|
||||||
for ($i = 0; $i < strlen($s); $i++) {
|
|
||||||
$c = $s[$i];
|
|
||||||
if ($c >= "\x80") {
|
|
||||||
for ($j = 0; $j < count(utf8_encode($c)); $j++) {
|
|
||||||
array_push($res, sprintf("%02X", ord($c[$j])));
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
array_push($res, $c);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return implode('', $res);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Implements python's urlunparse, which is not available in PHP.
|
|
||||||
* Given the specified components of a URL, this function rebuilds
|
|
||||||
* and returns the URL.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param string $scheme The scheme (e.g. 'http'). Defaults to 'http'.
|
|
||||||
* @param string $host The host. Required.
|
|
||||||
* @param string $port The port.
|
|
||||||
* @param string $path The path.
|
|
||||||
* @param string $query The query.
|
|
||||||
* @param string $fragment The fragment.
|
|
||||||
* @return string $url The URL resulting from assembling the
|
|
||||||
* specified components.
|
|
||||||
*/
|
|
||||||
function urlunparse($scheme, $host, $port = null, $path = '/',
|
|
||||||
$query = '', $fragment = '')
|
|
||||||
{
|
|
||||||
|
|
||||||
if (!$scheme) {
|
|
||||||
$scheme = 'http';
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$host) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$path) {
|
|
||||||
$path = '/';
|
|
||||||
}
|
|
||||||
|
|
||||||
$result = $scheme . "://" . $host;
|
|
||||||
|
|
||||||
if ($port) {
|
|
||||||
$result .= ":" . $port;
|
|
||||||
}
|
|
||||||
|
|
||||||
$result .= $path;
|
|
||||||
|
|
||||||
if ($query) {
|
|
||||||
$result .= "?" . $query;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($fragment) {
|
|
||||||
$result .= "#" . $fragment;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given a URL, this "normalizes" it by adding a trailing slash
|
|
||||||
* and / or a leading http:// scheme where necessary. Returns
|
|
||||||
* null if the original URL is malformed and cannot be normalized.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param string $url The URL to be normalized.
|
|
||||||
* @return mixed $new_url The URL after normalization, or null if
|
|
||||||
* $url was malformed.
|
|
||||||
*/
|
|
||||||
function normalizeUrl($url)
|
|
||||||
{
|
|
||||||
if ($url === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
assert(is_string($url));
|
|
||||||
|
|
||||||
$old_url = $url;
|
|
||||||
$url = trim($url);
|
|
||||||
|
|
||||||
if (strpos($url, "://") === false) {
|
|
||||||
$url = "http://" . $url;
|
|
||||||
}
|
|
||||||
|
|
||||||
$parsed = @parse_url($url);
|
|
||||||
|
|
||||||
if ($parsed === false) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$defaults = array(
|
|
||||||
'scheme' => '',
|
|
||||||
'host' => '',
|
|
||||||
'path' => '',
|
|
||||||
'query' => '',
|
|
||||||
'fragment' => '',
|
|
||||||
'port' => ''
|
|
||||||
);
|
|
||||||
|
|
||||||
$parsed = array_merge($defaults, $parsed);
|
|
||||||
|
|
||||||
if (($parsed['scheme'] == '') ||
|
|
||||||
($parsed['host'] == '')) {
|
|
||||||
if ($parsed['path'] == '' &&
|
|
||||||
$parsed['query'] == '' &&
|
|
||||||
$parsed['fragment'] == '') {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$url = 'http://' + $url;
|
|
||||||
$parsed = parse_url($url);
|
|
||||||
|
|
||||||
$parsed = array_merge($defaults, $parsed);
|
|
||||||
}
|
|
||||||
|
|
||||||
$tail = array_map(array('Auth_OpenID', 'quoteMinimal'),
|
|
||||||
array($parsed['path'],
|
|
||||||
$parsed['query'],
|
|
||||||
$parsed['fragment']));
|
|
||||||
if ($tail[0] == '') {
|
|
||||||
$tail[0] = '/';
|
|
||||||
}
|
|
||||||
|
|
||||||
$url = Auth_OpenID::urlunparse($parsed['scheme'], $parsed['host'],
|
|
||||||
$parsed['port'], $tail[0], $tail[1],
|
|
||||||
$tail[2]);
|
|
||||||
|
|
||||||
assert(is_string($url));
|
|
||||||
|
|
||||||
return $url;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Replacement (wrapper) for PHP's intval() because it's broken.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function intval($value)
|
|
||||||
{
|
|
||||||
$re = "/^\\d+$/";
|
|
||||||
|
|
||||||
if (!preg_match($re, $value)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return intval($value);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Count the number of bytes in a string independently of
|
|
||||||
* multibyte support conditions.
|
|
||||||
*
|
|
||||||
* @param string $str The string of bytes to count.
|
|
||||||
* @return int The number of bytes in $str.
|
|
||||||
*/
|
|
||||||
function bytes($str)
|
|
||||||
{
|
|
||||||
return strlen(bin2hex($str)) / 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get the bytes in a string independently of multibyte support
|
|
||||||
* conditions.
|
|
||||||
*/
|
|
||||||
function toBytes($str)
|
|
||||||
{
|
|
||||||
$hex = bin2hex($str);
|
|
||||||
|
|
||||||
if (!$hex) {
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
|
|
||||||
$b = array();
|
|
||||||
for ($i = 0; $i < strlen($hex); $i += 2) {
|
|
||||||
$b[] = chr(base_convert(substr($hex, $i, 2), 16, 10));
|
|
||||||
}
|
|
||||||
|
|
||||||
return $b;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,603 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This module contains code for dealing with associations between
|
|
||||||
* consumers and servers.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID/CryptUtil.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID/KVForm.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID/HMACSHA1.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class represents an association between a server and a
|
|
||||||
* consumer. In general, users of this library will never see
|
|
||||||
* instances of this object. The only exception is if you implement a
|
|
||||||
* custom {@link Auth_OpenID_OpenIDStore}.
|
|
||||||
*
|
|
||||||
* If you do implement such a store, it will need to store the values
|
|
||||||
* of the handle, secret, issued, lifetime, and assoc_type instance
|
|
||||||
* variables.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_Association {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is a HMAC-SHA1 specific value.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $SIG_LENGTH = 20;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The ordering and name of keys as stored by serialize.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $assoc_keys = array(
|
|
||||||
'version',
|
|
||||||
'handle',
|
|
||||||
'secret',
|
|
||||||
'issued',
|
|
||||||
'lifetime',
|
|
||||||
'assoc_type'
|
|
||||||
);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is an alternate constructor (factory method) used by the
|
|
||||||
* OpenID consumer library to create associations. OpenID store
|
|
||||||
* implementations shouldn't use this constructor.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*
|
|
||||||
* @param integer $expires_in This is the amount of time this
|
|
||||||
* association is good for, measured in seconds since the
|
|
||||||
* association was issued.
|
|
||||||
*
|
|
||||||
* @param string $handle This is the handle the server gave this
|
|
||||||
* association.
|
|
||||||
*
|
|
||||||
* @param string secret This is the shared secret the server
|
|
||||||
* generated for this association.
|
|
||||||
*
|
|
||||||
* @param assoc_type This is the type of association this
|
|
||||||
* instance represents. The only valid value of this field at
|
|
||||||
* this time is 'HMAC-SHA1', but new types may be defined in the
|
|
||||||
* future.
|
|
||||||
*
|
|
||||||
* @return association An {@link Auth_OpenID_Association}
|
|
||||||
* instance.
|
|
||||||
*/
|
|
||||||
function fromExpiresIn($expires_in, $handle, $secret, $assoc_type)
|
|
||||||
{
|
|
||||||
$issued = time();
|
|
||||||
$lifetime = $expires_in;
|
|
||||||
return new Auth_OpenID_Association($handle, $secret,
|
|
||||||
$issued, $lifetime, $assoc_type);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the standard constructor for creating an association.
|
|
||||||
* The library should create all of the necessary associations, so
|
|
||||||
* this constructor is not part of the external API.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*
|
|
||||||
* @param string $handle This is the handle the server gave this
|
|
||||||
* association.
|
|
||||||
*
|
|
||||||
* @param string $secret This is the shared secret the server
|
|
||||||
* generated for this association.
|
|
||||||
*
|
|
||||||
* @param integer $issued This is the time this association was
|
|
||||||
* issued, in seconds since 00:00 GMT, January 1, 1970. (ie, a
|
|
||||||
* unix timestamp)
|
|
||||||
*
|
|
||||||
* @param integer $lifetime This is the amount of time this
|
|
||||||
* association is good for, measured in seconds since the
|
|
||||||
* association was issued.
|
|
||||||
*
|
|
||||||
* @param string $assoc_type This is the type of association this
|
|
||||||
* instance represents. The only valid value of this field at
|
|
||||||
* this time is 'HMAC-SHA1', but new types may be defined in the
|
|
||||||
* future.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_Association(
|
|
||||||
$handle, $secret, $issued, $lifetime, $assoc_type)
|
|
||||||
{
|
|
||||||
if (!in_array($assoc_type,
|
|
||||||
Auth_OpenID_getSupportedAssociationTypes())) {
|
|
||||||
$fmt = 'Unsupported association type (%s)';
|
|
||||||
trigger_error(sprintf($fmt, $assoc_type), E_USER_ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->handle = $handle;
|
|
||||||
$this->secret = $secret;
|
|
||||||
$this->issued = $issued;
|
|
||||||
$this->lifetime = $lifetime;
|
|
||||||
$this->assoc_type = $assoc_type;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This returns the number of seconds this association is still
|
|
||||||
* valid for, or 0 if the association is no longer valid.
|
|
||||||
*
|
|
||||||
* @return integer $seconds The number of seconds this association
|
|
||||||
* is still valid for, or 0 if the association is no longer valid.
|
|
||||||
*/
|
|
||||||
function getExpiresIn($now = null)
|
|
||||||
{
|
|
||||||
if ($now == null) {
|
|
||||||
$now = time();
|
|
||||||
}
|
|
||||||
|
|
||||||
return max(0, $this->issued + $this->lifetime - $now);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This checks to see if two {@link Auth_OpenID_Association}
|
|
||||||
* instances represent the same association.
|
|
||||||
*
|
|
||||||
* @return bool $result true if the two instances represent the
|
|
||||||
* same association, false otherwise.
|
|
||||||
*/
|
|
||||||
function equal($other)
|
|
||||||
{
|
|
||||||
return ((gettype($this) == gettype($other))
|
|
||||||
&& ($this->handle == $other->handle)
|
|
||||||
&& ($this->secret == $other->secret)
|
|
||||||
&& ($this->issued == $other->issued)
|
|
||||||
&& ($this->lifetime == $other->lifetime)
|
|
||||||
&& ($this->assoc_type == $other->assoc_type));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Convert an association to KV form.
|
|
||||||
*
|
|
||||||
* @return string $result String in KV form suitable for
|
|
||||||
* deserialization by deserialize.
|
|
||||||
*/
|
|
||||||
function serialize()
|
|
||||||
{
|
|
||||||
$data = array(
|
|
||||||
'version' => '2',
|
|
||||||
'handle' => $this->handle,
|
|
||||||
'secret' => base64_encode($this->secret),
|
|
||||||
'issued' => strval(intval($this->issued)),
|
|
||||||
'lifetime' => strval(intval($this->lifetime)),
|
|
||||||
'assoc_type' => $this->assoc_type
|
|
||||||
);
|
|
||||||
|
|
||||||
assert(array_keys($data) == $this->assoc_keys);
|
|
||||||
|
|
||||||
return Auth_OpenID_KVForm::fromArray($data, $strict = true);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Parse an association as stored by serialize(). This is the
|
|
||||||
* inverse of serialize.
|
|
||||||
*
|
|
||||||
* @param string $assoc_s Association as serialized by serialize()
|
|
||||||
* @return Auth_OpenID_Association $result instance of this class
|
|
||||||
*/
|
|
||||||
function deserialize($class_name, $assoc_s)
|
|
||||||
{
|
|
||||||
$pairs = Auth_OpenID_KVForm::toArray($assoc_s, $strict = true);
|
|
||||||
$keys = array();
|
|
||||||
$values = array();
|
|
||||||
foreach ($pairs as $key => $value) {
|
|
||||||
if (is_array($value)) {
|
|
||||||
list($key, $value) = $value;
|
|
||||||
}
|
|
||||||
$keys[] = $key;
|
|
||||||
$values[] = $value;
|
|
||||||
}
|
|
||||||
|
|
||||||
$class_vars = get_class_vars($class_name);
|
|
||||||
$class_assoc_keys = $class_vars['assoc_keys'];
|
|
||||||
|
|
||||||
sort($keys);
|
|
||||||
sort($class_assoc_keys);
|
|
||||||
|
|
||||||
if ($keys != $class_assoc_keys) {
|
|
||||||
trigger_error('Unexpected key values: ' . var_export($keys, true),
|
|
||||||
E_USER_WARNING);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$version = $pairs['version'];
|
|
||||||
$handle = $pairs['handle'];
|
|
||||||
$secret = $pairs['secret'];
|
|
||||||
$issued = $pairs['issued'];
|
|
||||||
$lifetime = $pairs['lifetime'];
|
|
||||||
$assoc_type = $pairs['assoc_type'];
|
|
||||||
|
|
||||||
if ($version != '2') {
|
|
||||||
trigger_error('Unknown version: ' . $version, E_USER_WARNING);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$issued = intval($issued);
|
|
||||||
$lifetime = intval($lifetime);
|
|
||||||
$secret = base64_decode($secret);
|
|
||||||
|
|
||||||
return new $class_name(
|
|
||||||
$handle, $secret, $issued, $lifetime, $assoc_type);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Generate a signature for a sequence of (key, value) pairs
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param array $pairs The pairs to sign, in order. This is an
|
|
||||||
* array of two-tuples.
|
|
||||||
* @return string $signature The binary signature of this sequence
|
|
||||||
* of pairs
|
|
||||||
*/
|
|
||||||
function sign($pairs)
|
|
||||||
{
|
|
||||||
$kv = Auth_OpenID_KVForm::fromArray($pairs);
|
|
||||||
return Auth_OpenID_HMACSHA1($this->secret, $kv);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Generate a signature for some fields in a dictionary
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param array $fields The fields to sign, in order; this is an
|
|
||||||
* array of strings.
|
|
||||||
* @param array $data Dictionary of values to sign (an array of
|
|
||||||
* string => string pairs).
|
|
||||||
* @return string $signature The signature, base64 encoded
|
|
||||||
*/
|
|
||||||
function signMessage($message)
|
|
||||||
{
|
|
||||||
if ($message->hasKey(Auth_OpenID_OPENID_NS, 'sig') ||
|
|
||||||
$message->hasKey(Auth_OpenID_OPENID_NS, 'signed')) {
|
|
||||||
// Already has a sig
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$extant_handle = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'assoc_handle');
|
|
||||||
|
|
||||||
if ($extant_handle && ($extant_handle != $this->handle)) {
|
|
||||||
// raise ValueError("Message has a different association handle")
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$signed_message = $message;
|
|
||||||
$signed_message->setArg(Auth_OpenID_OPENID_NS, 'assoc_handle',
|
|
||||||
$this->handle);
|
|
||||||
|
|
||||||
$message_keys = array_keys($signed_message->toPostArgs());
|
|
||||||
$signed_list = array();
|
|
||||||
$signed_prefix = 'openid.';
|
|
||||||
|
|
||||||
foreach ($message_keys as $k) {
|
|
||||||
if (strpos($k, $signed_prefix) === 0) {
|
|
||||||
$signed_list[] = substr($k, strlen($signed_prefix));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$signed_list[] = 'signed';
|
|
||||||
sort($signed_list);
|
|
||||||
|
|
||||||
$signed_message->setArg(Auth_OpenID_OPENID_NS, 'signed',
|
|
||||||
implode(',', $signed_list));
|
|
||||||
$sig = $this->getMessageSignature($signed_message);
|
|
||||||
$signed_message->setArg(Auth_OpenID_OPENID_NS, 'sig', $sig);
|
|
||||||
return $signed_message;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given a {@link Auth_OpenID_Message}, return the key/value pairs
|
|
||||||
* to be signed according to the signed list in the message. If
|
|
||||||
* the message lacks a signed list, return null.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _makePairs(&$message)
|
|
||||||
{
|
|
||||||
$signed = $message->getArg(Auth_OpenID_OPENID_NS, 'signed');
|
|
||||||
if (!$signed) {
|
|
||||||
// raise ValueError('Message has no signed list: %s' % (message,))
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$signed_list = explode(',', $signed);
|
|
||||||
$pairs = array();
|
|
||||||
$data = $message->toPostArgs();
|
|
||||||
foreach ($signed_list as $field) {
|
|
||||||
$pairs[] = array($field, Auth_OpenID::arrayGet($data,
|
|
||||||
'openid.' .
|
|
||||||
$field, ''));
|
|
||||||
}
|
|
||||||
return $pairs;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given an {@link Auth_OpenID_Message}, return the signature for
|
|
||||||
* the signed list in the message.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function getMessageSignature(&$message)
|
|
||||||
{
|
|
||||||
$pairs = $this->_makePairs($message);
|
|
||||||
return base64_encode($this->sign($pairs));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Confirm that the signature of these fields matches the
|
|
||||||
* signature contained in the data.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function checkMessageSignature(&$message)
|
|
||||||
{
|
|
||||||
$sig = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'sig');
|
|
||||||
|
|
||||||
if (!$sig) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$calculated_sig = $this->getMessageSignature($message);
|
|
||||||
return $calculated_sig == $sig;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getSecretSize($assoc_type)
|
|
||||||
{
|
|
||||||
if ($assoc_type == 'HMAC-SHA1') {
|
|
||||||
return 20;
|
|
||||||
} else if ($assoc_type == 'HMAC-SHA256') {
|
|
||||||
return 32;
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getAllAssociationTypes()
|
|
||||||
{
|
|
||||||
return array('HMAC-SHA1', 'HMAC-SHA256');
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getSupportedAssociationTypes()
|
|
||||||
{
|
|
||||||
$a = array('HMAC-SHA1');
|
|
||||||
|
|
||||||
if (Auth_OpenID_HMACSHA256_SUPPORTED) {
|
|
||||||
$a[] = 'HMAC-SHA256';
|
|
||||||
}
|
|
||||||
|
|
||||||
return $a;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getSessionTypes($assoc_type)
|
|
||||||
{
|
|
||||||
$assoc_to_session = array(
|
|
||||||
'HMAC-SHA1' => array('DH-SHA1', 'no-encryption'));
|
|
||||||
|
|
||||||
if (Auth_OpenID_HMACSHA256_SUPPORTED) {
|
|
||||||
$assoc_to_session['HMAC-SHA256'] =
|
|
||||||
array('DH-SHA256', 'no-encryption');
|
|
||||||
}
|
|
||||||
|
|
||||||
return Auth_OpenID::arrayGet($assoc_to_session, $assoc_type, array());
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_checkSessionType($assoc_type, $session_type)
|
|
||||||
{
|
|
||||||
if (!in_array($session_type,
|
|
||||||
Auth_OpenID_getSessionTypes($assoc_type))) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getDefaultAssociationOrder()
|
|
||||||
{
|
|
||||||
$order = array();
|
|
||||||
|
|
||||||
if (!defined('Auth_OpenID_NO_MATH_SUPPORT')) {
|
|
||||||
$order[] = array('HMAC-SHA1', 'DH-SHA1');
|
|
||||||
|
|
||||||
if (Auth_OpenID_HMACSHA256_SUPPORTED) {
|
|
||||||
$order[] = array('HMAC-SHA256', 'DH-SHA256');
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$order[] = array('HMAC-SHA1', 'no-encryption');
|
|
||||||
|
|
||||||
if (Auth_OpenID_HMACSHA256_SUPPORTED) {
|
|
||||||
$order[] = array('HMAC-SHA256', 'no-encryption');
|
|
||||||
}
|
|
||||||
|
|
||||||
return $order;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getOnlyEncryptedOrder()
|
|
||||||
{
|
|
||||||
$result = array();
|
|
||||||
|
|
||||||
foreach (Auth_OpenID_getDefaultAssociationOrder() as $pair) {
|
|
||||||
list($assoc, $session) = $pair;
|
|
||||||
|
|
||||||
if ($session != 'no-encryption') {
|
|
||||||
if (Auth_OpenID_HMACSHA256_SUPPORTED &&
|
|
||||||
($assoc == 'HMAC-SHA256')) {
|
|
||||||
$result[] = $pair;
|
|
||||||
} else if ($assoc != 'HMAC-SHA256') {
|
|
||||||
$result[] = $pair;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
function &Auth_OpenID_getDefaultNegotiator()
|
|
||||||
{
|
|
||||||
$x = new Auth_OpenID_SessionNegotiator(
|
|
||||||
Auth_OpenID_getDefaultAssociationOrder());
|
|
||||||
return $x;
|
|
||||||
}
|
|
||||||
|
|
||||||
function &Auth_OpenID_getEncryptedNegotiator()
|
|
||||||
{
|
|
||||||
$x = new Auth_OpenID_SessionNegotiator(
|
|
||||||
Auth_OpenID_getOnlyEncryptedOrder());
|
|
||||||
return $x;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A session negotiator controls the allowed and preferred association
|
|
||||||
* types and association session types. Both the {@link
|
|
||||||
* Auth_OpenID_Consumer} and {@link Auth_OpenID_Server} use
|
|
||||||
* negotiators when creating associations.
|
|
||||||
*
|
|
||||||
* You can create and use negotiators if you:
|
|
||||||
|
|
||||||
* - Do not want to do Diffie-Hellman key exchange because you use
|
|
||||||
* transport-layer encryption (e.g. SSL)
|
|
||||||
*
|
|
||||||
* - Want to use only SHA-256 associations
|
|
||||||
*
|
|
||||||
* - Do not want to support plain-text associations over a non-secure
|
|
||||||
* channel
|
|
||||||
*
|
|
||||||
* It is up to you to set a policy for what kinds of associations to
|
|
||||||
* accept. By default, the library will make any kind of association
|
|
||||||
* that is allowed in the OpenID 2.0 specification.
|
|
||||||
*
|
|
||||||
* Use of negotiators in the library
|
|
||||||
* =================================
|
|
||||||
*
|
|
||||||
* When a consumer makes an association request, it calls {@link
|
|
||||||
* getAllowedType} to get the preferred association type and
|
|
||||||
* association session type.
|
|
||||||
*
|
|
||||||
* The server gets a request for a particular association/session type
|
|
||||||
* and calls {@link isAllowed} to determine if it should create an
|
|
||||||
* association. If it is supported, negotiation is complete. If it is
|
|
||||||
* not, the server calls {@link getAllowedType} to get an allowed
|
|
||||||
* association type to return to the consumer.
|
|
||||||
*
|
|
||||||
* If the consumer gets an error response indicating that the
|
|
||||||
* requested association/session type is not supported by the server
|
|
||||||
* that contains an assocation/session type to try, it calls {@link
|
|
||||||
* isAllowed} to determine if it should try again with the given
|
|
||||||
* combination of association/session type.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_SessionNegotiator {
|
|
||||||
function Auth_OpenID_SessionNegotiator($allowed_types)
|
|
||||||
{
|
|
||||||
$this->allowed_types = $allowed_types;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set the allowed association types, checking to make sure each
|
|
||||||
* combination is valid.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function setAllowedTypes($allowed_types)
|
|
||||||
{
|
|
||||||
foreach ($allowed_types as $pair) {
|
|
||||||
list($assoc_type, $session_type) = $pair;
|
|
||||||
if (!Auth_OpenID_checkSessionType($assoc_type, $session_type)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->allowed_types = $allowed_types;
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Add an association type and session type to the allowed types
|
|
||||||
* list. The assocation/session pairs are tried in the order that
|
|
||||||
* they are added.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function addAllowedType($assoc_type, $session_type = null)
|
|
||||||
{
|
|
||||||
if ($this->allowed_types === null) {
|
|
||||||
$this->allowed_types = array();
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($session_type === null) {
|
|
||||||
$available = Auth_OpenID_getSessionTypes($assoc_type);
|
|
||||||
|
|
||||||
if (!$available) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($available as $session_type) {
|
|
||||||
$this->addAllowedType($assoc_type, $session_type);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if (Auth_OpenID_checkSessionType($assoc_type, $session_type)) {
|
|
||||||
$this->allowed_types[] = array($assoc_type, $session_type);
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Is this combination of association type and session type allowed?
|
|
||||||
function isAllowed($assoc_type, $session_type)
|
|
||||||
{
|
|
||||||
$assoc_good = in_array(array($assoc_type, $session_type),
|
|
||||||
$this->allowed_types);
|
|
||||||
|
|
||||||
$matches = in_array($session_type,
|
|
||||||
Auth_OpenID_getSessionTypes($assoc_type));
|
|
||||||
|
|
||||||
return ($assoc_good && $matches);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get a pair of assocation type and session type that are
|
|
||||||
* supported.
|
|
||||||
*/
|
|
||||||
function getAllowedType()
|
|
||||||
{
|
|
||||||
if (!$this->allowed_types) {
|
|
||||||
return array(null, null);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $this->allowed_types[0];
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,458 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* BigMath: A math library wrapper that abstracts out the underlying
|
|
||||||
* long integer library.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Needed for random number generation
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID/CryptUtil.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Need Auth_OpenID::bytes().
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The superclass of all big-integer math implementations
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_MathLibrary {
|
|
||||||
/**
|
|
||||||
* Given a long integer, returns the number converted to a binary
|
|
||||||
* string. This function accepts long integer values of arbitrary
|
|
||||||
* magnitude and uses the local large-number math library when
|
|
||||||
* available.
|
|
||||||
*
|
|
||||||
* @param integer $long The long number (can be a normal PHP
|
|
||||||
* integer or a number created by one of the available long number
|
|
||||||
* libraries)
|
|
||||||
* @return string $binary The binary version of $long
|
|
||||||
*/
|
|
||||||
function longToBinary($long)
|
|
||||||
{
|
|
||||||
$cmp = $this->cmp($long, 0);
|
|
||||||
if ($cmp < 0) {
|
|
||||||
$msg = __FUNCTION__ . " takes only positive integers.";
|
|
||||||
trigger_error($msg, E_USER_ERROR);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($cmp == 0) {
|
|
||||||
return "\x00";
|
|
||||||
}
|
|
||||||
|
|
||||||
$bytes = array();
|
|
||||||
|
|
||||||
while ($this->cmp($long, 0) > 0) {
|
|
||||||
array_unshift($bytes, $this->mod($long, 256));
|
|
||||||
$long = $this->div($long, pow(2, 8));
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($bytes && ($bytes[0] > 127)) {
|
|
||||||
array_unshift($bytes, 0);
|
|
||||||
}
|
|
||||||
|
|
||||||
$string = '';
|
|
||||||
foreach ($bytes as $byte) {
|
|
||||||
$string .= pack('C', $byte);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $string;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given a binary string, returns the binary string converted to a
|
|
||||||
* long number.
|
|
||||||
*
|
|
||||||
* @param string $binary The binary version of a long number,
|
|
||||||
* probably as a result of calling longToBinary
|
|
||||||
* @return integer $long The long number equivalent of the binary
|
|
||||||
* string $str
|
|
||||||
*/
|
|
||||||
function binaryToLong($str)
|
|
||||||
{
|
|
||||||
if ($str === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Use array_merge to return a zero-indexed array instead of a
|
|
||||||
// one-indexed array.
|
|
||||||
$bytes = array_merge(unpack('C*', $str));
|
|
||||||
|
|
||||||
$n = $this->init(0);
|
|
||||||
|
|
||||||
if ($bytes && ($bytes[0] > 127)) {
|
|
||||||
trigger_error("bytesToNum works only for positive integers.",
|
|
||||||
E_USER_WARNING);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($bytes as $byte) {
|
|
||||||
$n = $this->mul($n, pow(2, 8));
|
|
||||||
$n = $this->add($n, $byte);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $n;
|
|
||||||
}
|
|
||||||
|
|
||||||
function base64ToLong($str)
|
|
||||||
{
|
|
||||||
$b64 = base64_decode($str);
|
|
||||||
|
|
||||||
if ($b64 === false) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $this->binaryToLong($b64);
|
|
||||||
}
|
|
||||||
|
|
||||||
function longToBase64($str)
|
|
||||||
{
|
|
||||||
return base64_encode($this->longToBinary($str));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a random number in the specified range. This function
|
|
||||||
* accepts $start, $stop, and $step values of arbitrary magnitude
|
|
||||||
* and will utilize the local large-number math library when
|
|
||||||
* available.
|
|
||||||
*
|
|
||||||
* @param integer $start The start of the range, or the minimum
|
|
||||||
* random number to return
|
|
||||||
* @param integer $stop The end of the range, or the maximum
|
|
||||||
* random number to return
|
|
||||||
* @param integer $step The step size, such that $result - ($step
|
|
||||||
* * N) = $start for some N
|
|
||||||
* @return integer $result The resulting randomly-generated number
|
|
||||||
*/
|
|
||||||
function rand($stop)
|
|
||||||
{
|
|
||||||
static $duplicate_cache = array();
|
|
||||||
|
|
||||||
// Used as the key for the duplicate cache
|
|
||||||
$rbytes = $this->longToBinary($stop);
|
|
||||||
|
|
||||||
if (array_key_exists($rbytes, $duplicate_cache)) {
|
|
||||||
list($duplicate, $nbytes) = $duplicate_cache[$rbytes];
|
|
||||||
} else {
|
|
||||||
if ($rbytes[0] == "\x00") {
|
|
||||||
$nbytes = Auth_OpenID::bytes($rbytes) - 1;
|
|
||||||
} else {
|
|
||||||
$nbytes = Auth_OpenID::bytes($rbytes);
|
|
||||||
}
|
|
||||||
|
|
||||||
$mxrand = $this->pow(256, $nbytes);
|
|
||||||
|
|
||||||
// If we get a number less than this, then it is in the
|
|
||||||
// duplicated range.
|
|
||||||
$duplicate = $this->mod($mxrand, $stop);
|
|
||||||
|
|
||||||
if (count($duplicate_cache) > 10) {
|
|
||||||
$duplicate_cache = array();
|
|
||||||
}
|
|
||||||
|
|
||||||
$duplicate_cache[$rbytes] = array($duplicate, $nbytes);
|
|
||||||
}
|
|
||||||
|
|
||||||
do {
|
|
||||||
$bytes = "\x00" . Auth_OpenID_CryptUtil::getBytes($nbytes);
|
|
||||||
$n = $this->binaryToLong($bytes);
|
|
||||||
// Keep looping if this value is in the low duplicated range
|
|
||||||
} while ($this->cmp($n, $duplicate) < 0);
|
|
||||||
|
|
||||||
return $this->mod($n, $stop);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Exposes BCmath math library functionality.
|
|
||||||
*
|
|
||||||
* {@link Auth_OpenID_BcMathWrapper} wraps the functionality provided
|
|
||||||
* by the BCMath extension.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_BcMathWrapper extends Auth_OpenID_MathLibrary{
|
|
||||||
var $type = 'bcmath';
|
|
||||||
|
|
||||||
function add($x, $y)
|
|
||||||
{
|
|
||||||
return bcadd($x, $y);
|
|
||||||
}
|
|
||||||
|
|
||||||
function sub($x, $y)
|
|
||||||
{
|
|
||||||
return bcsub($x, $y);
|
|
||||||
}
|
|
||||||
|
|
||||||
function pow($base, $exponent)
|
|
||||||
{
|
|
||||||
return bcpow($base, $exponent);
|
|
||||||
}
|
|
||||||
|
|
||||||
function cmp($x, $y)
|
|
||||||
{
|
|
||||||
return bccomp($x, $y);
|
|
||||||
}
|
|
||||||
|
|
||||||
function init($number, $base = 10)
|
|
||||||
{
|
|
||||||
return $number;
|
|
||||||
}
|
|
||||||
|
|
||||||
function mod($base, $modulus)
|
|
||||||
{
|
|
||||||
return bcmod($base, $modulus);
|
|
||||||
}
|
|
||||||
|
|
||||||
function mul($x, $y)
|
|
||||||
{
|
|
||||||
return bcmul($x, $y);
|
|
||||||
}
|
|
||||||
|
|
||||||
function div($x, $y)
|
|
||||||
{
|
|
||||||
return bcdiv($x, $y);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Same as bcpowmod when bcpowmod is missing
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _powmod($base, $exponent, $modulus)
|
|
||||||
{
|
|
||||||
$square = $this->mod($base, $modulus);
|
|
||||||
$result = 1;
|
|
||||||
while($this->cmp($exponent, 0) > 0) {
|
|
||||||
if ($this->mod($exponent, 2)) {
|
|
||||||
$result = $this->mod($this->mul($result, $square), $modulus);
|
|
||||||
}
|
|
||||||
$square = $this->mod($this->mul($square, $square), $modulus);
|
|
||||||
$exponent = $this->div($exponent, 2);
|
|
||||||
}
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
function powmod($base, $exponent, $modulus)
|
|
||||||
{
|
|
||||||
if (function_exists('bcpowmod')) {
|
|
||||||
return bcpowmod($base, $exponent, $modulus);
|
|
||||||
} else {
|
|
||||||
return $this->_powmod($base, $exponent, $modulus);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function toString($num)
|
|
||||||
{
|
|
||||||
return $num;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Exposes GMP math library functionality.
|
|
||||||
*
|
|
||||||
* {@link Auth_OpenID_GmpMathWrapper} wraps the functionality provided
|
|
||||||
* by the GMP extension.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_GmpMathWrapper extends Auth_OpenID_MathLibrary{
|
|
||||||
var $type = 'gmp';
|
|
||||||
|
|
||||||
function add($x, $y)
|
|
||||||
{
|
|
||||||
return gmp_add($x, $y);
|
|
||||||
}
|
|
||||||
|
|
||||||
function sub($x, $y)
|
|
||||||
{
|
|
||||||
return gmp_sub($x, $y);
|
|
||||||
}
|
|
||||||
|
|
||||||
function pow($base, $exponent)
|
|
||||||
{
|
|
||||||
return gmp_pow($base, $exponent);
|
|
||||||
}
|
|
||||||
|
|
||||||
function cmp($x, $y)
|
|
||||||
{
|
|
||||||
return gmp_cmp($x, $y);
|
|
||||||
}
|
|
||||||
|
|
||||||
function init($number, $base = 10)
|
|
||||||
{
|
|
||||||
return gmp_init($number, $base);
|
|
||||||
}
|
|
||||||
|
|
||||||
function mod($base, $modulus)
|
|
||||||
{
|
|
||||||
return gmp_mod($base, $modulus);
|
|
||||||
}
|
|
||||||
|
|
||||||
function mul($x, $y)
|
|
||||||
{
|
|
||||||
return gmp_mul($x, $y);
|
|
||||||
}
|
|
||||||
|
|
||||||
function div($x, $y)
|
|
||||||
{
|
|
||||||
return gmp_div_q($x, $y);
|
|
||||||
}
|
|
||||||
|
|
||||||
function powmod($base, $exponent, $modulus)
|
|
||||||
{
|
|
||||||
return gmp_powm($base, $exponent, $modulus);
|
|
||||||
}
|
|
||||||
|
|
||||||
function toString($num)
|
|
||||||
{
|
|
||||||
return gmp_strval($num);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Define the supported extensions. An extension array has keys
|
|
||||||
* 'modules', 'extension', and 'class'. 'modules' is an array of PHP
|
|
||||||
* module names which the loading code will attempt to load. These
|
|
||||||
* values will be suffixed with a library file extension (e.g. ".so").
|
|
||||||
* 'extension' is the name of a PHP extension which will be tested
|
|
||||||
* before 'modules' are loaded. 'class' is the string name of a
|
|
||||||
* {@link Auth_OpenID_MathWrapper} subclass which should be
|
|
||||||
* instantiated if a given extension is present.
|
|
||||||
*
|
|
||||||
* You can define new math library implementations and add them to
|
|
||||||
* this array.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_math_extensions()
|
|
||||||
{
|
|
||||||
$result = array();
|
|
||||||
|
|
||||||
if (!defined('Auth_OpenID_BUGGY_GMP')) {
|
|
||||||
$result[] =
|
|
||||||
array('modules' => array('gmp', 'php_gmp'),
|
|
||||||
'extension' => 'gmp',
|
|
||||||
'class' => 'Auth_OpenID_GmpMathWrapper');
|
|
||||||
}
|
|
||||||
|
|
||||||
$result[] = array(
|
|
||||||
'modules' => array('bcmath', 'php_bcmath'),
|
|
||||||
'extension' => 'bcmath',
|
|
||||||
'class' => 'Auth_OpenID_BcMathWrapper');
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Detect which (if any) math library is available
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_detectMathLibrary($exts)
|
|
||||||
{
|
|
||||||
$loaded = false;
|
|
||||||
|
|
||||||
foreach ($exts as $extension) {
|
|
||||||
// See if the extension specified is already loaded.
|
|
||||||
if ($extension['extension'] &&
|
|
||||||
extension_loaded($extension['extension'])) {
|
|
||||||
$loaded = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Try to load dynamic modules.
|
|
||||||
if (!$loaded) {
|
|
||||||
foreach ($extension['modules'] as $module) {
|
|
||||||
if (@dl($module . "." . PHP_SHLIB_SUFFIX)) {
|
|
||||||
$loaded = true;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// If the load succeeded, supply an instance of
|
|
||||||
// Auth_OpenID_MathWrapper which wraps the specified
|
|
||||||
// module's functionality.
|
|
||||||
if ($loaded) {
|
|
||||||
return $extension;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* {@link Auth_OpenID_getMathLib} checks for the presence of long
|
|
||||||
* number extension modules and returns an instance of
|
|
||||||
* {@link Auth_OpenID_MathWrapper} which exposes the module's
|
|
||||||
* functionality.
|
|
||||||
*
|
|
||||||
* Checks for the existence of an extension module described by the
|
|
||||||
* result of {@link Auth_OpenID_math_extensions()} and returns an
|
|
||||||
* instance of a wrapper for that extension module. If no extension
|
|
||||||
* module is found, an instance of {@link Auth_OpenID_MathWrapper} is
|
|
||||||
* returned, which wraps the native PHP integer implementation. The
|
|
||||||
* proper calling convention for this method is $lib =&
|
|
||||||
* Auth_OpenID_getMathLib().
|
|
||||||
*
|
|
||||||
* This function checks for the existence of specific long number
|
|
||||||
* implementations in the following order: GMP followed by BCmath.
|
|
||||||
*
|
|
||||||
* @return Auth_OpenID_MathWrapper $instance An instance of
|
|
||||||
* {@link Auth_OpenID_MathWrapper} or one of its subclasses
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
function &Auth_OpenID_getMathLib()
|
|
||||||
{
|
|
||||||
// The instance of Auth_OpenID_MathWrapper that we choose to
|
|
||||||
// supply will be stored here, so that subseqent calls to this
|
|
||||||
// method will return a reference to the same object.
|
|
||||||
static $lib = null;
|
|
||||||
|
|
||||||
if (isset($lib)) {
|
|
||||||
return $lib;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (defined('Auth_OpenID_NO_MATH_SUPPORT')) {
|
|
||||||
$null = null;
|
|
||||||
return $null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// If this method has not been called before, look at
|
|
||||||
// Auth_OpenID_math_extensions and try to find an extension that
|
|
||||||
// works.
|
|
||||||
$ext = Auth_OpenID_detectMathLibrary(Auth_OpenID_math_extensions());
|
|
||||||
if ($ext === false) {
|
|
||||||
$tried = array();
|
|
||||||
foreach (Auth_OpenID_math_extensions() as $extinfo) {
|
|
||||||
$tried[] = $extinfo['extension'];
|
|
||||||
}
|
|
||||||
$triedstr = implode(", ", $tried);
|
|
||||||
|
|
||||||
define('Auth_OpenID_NO_MATH_SUPPORT', true);
|
|
||||||
$null = null;
|
|
||||||
return $null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Instantiate a new wrapper
|
|
||||||
$class = $ext['class'];
|
|
||||||
$lib = new $class();
|
|
||||||
|
|
||||||
return $lib;
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,2059 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This module documents the main interface with the OpenID consumer
|
|
||||||
* library. The only part of the library which has to be used and
|
|
||||||
* isn't documented in full here is the store required to create an
|
|
||||||
* Auth_OpenID_Consumer instance. More on the abstract store type and
|
|
||||||
* concrete implementations of it that are provided in the
|
|
||||||
* documentation for the Auth_OpenID_Consumer constructor.
|
|
||||||
*
|
|
||||||
* OVERVIEW
|
|
||||||
*
|
|
||||||
* The OpenID identity verification process most commonly uses the
|
|
||||||
* following steps, as visible to the user of this library:
|
|
||||||
*
|
|
||||||
* 1. The user enters their OpenID into a field on the consumer's
|
|
||||||
* site, and hits a login button.
|
|
||||||
* 2. The consumer site discovers the user's OpenID server using the
|
|
||||||
* YADIS protocol.
|
|
||||||
* 3. The consumer site sends the browser a redirect to the identity
|
|
||||||
* server. This is the authentication request as described in
|
|
||||||
* the OpenID specification.
|
|
||||||
* 4. The identity server's site sends the browser a redirect back
|
|
||||||
* to the consumer site. This redirect contains the server's
|
|
||||||
* response to the authentication request.
|
|
||||||
*
|
|
||||||
* The most important part of the flow to note is the consumer's site
|
|
||||||
* must handle two separate HTTP requests in order to perform the full
|
|
||||||
* identity check.
|
|
||||||
*
|
|
||||||
* LIBRARY DESIGN
|
|
||||||
*
|
|
||||||
* This consumer library is designed with that flow in mind. The goal
|
|
||||||
* is to make it as easy as possible to perform the above steps
|
|
||||||
* securely.
|
|
||||||
*
|
|
||||||
* At a high level, there are two important parts in the consumer
|
|
||||||
* library. The first important part is this module, which contains
|
|
||||||
* the interface to actually use this library. The second is the
|
|
||||||
* Auth_OpenID_Interface class, which describes the interface to use
|
|
||||||
* if you need to create a custom method for storing the state this
|
|
||||||
* library needs to maintain between requests.
|
|
||||||
*
|
|
||||||
* In general, the second part is less important for users of the
|
|
||||||
* library to know about, as several implementations are provided
|
|
||||||
* which cover a wide variety of situations in which consumers may use
|
|
||||||
* the library.
|
|
||||||
*
|
|
||||||
* This module contains a class, Auth_OpenID_Consumer, with methods
|
|
||||||
* corresponding to the actions necessary in each of steps 2, 3, and 4
|
|
||||||
* described in the overview. Use of this library should be as easy
|
|
||||||
* as creating an Auth_OpenID_Consumer instance and calling the
|
|
||||||
* methods appropriate for the action the site wants to take.
|
|
||||||
*
|
|
||||||
* STORES AND DUMB MODE
|
|
||||||
*
|
|
||||||
* OpenID is a protocol that works best when the consumer site is able
|
|
||||||
* to store some state. This is the normal mode of operation for the
|
|
||||||
* protocol, and is sometimes referred to as smart mode. There is
|
|
||||||
* also a fallback mode, known as dumb mode, which is available when
|
|
||||||
* the consumer site is not able to store state. This mode should be
|
|
||||||
* avoided when possible, as it leaves the implementation more
|
|
||||||
* vulnerable to replay attacks.
|
|
||||||
*
|
|
||||||
* The mode the library works in for normal operation is determined by
|
|
||||||
* the store that it is given. The store is an abstraction that
|
|
||||||
* handles the data that the consumer needs to manage between http
|
|
||||||
* requests in order to operate efficiently and securely.
|
|
||||||
*
|
|
||||||
* Several store implementation are provided, and the interface is
|
|
||||||
* fully documented so that custom stores can be used as well. See
|
|
||||||
* the documentation for the Auth_OpenID_Consumer class for more
|
|
||||||
* information on the interface for stores. The implementations that
|
|
||||||
* are provided allow the consumer site to store the necessary data in
|
|
||||||
* several different ways, including several SQL databases and normal
|
|
||||||
* files on disk.
|
|
||||||
*
|
|
||||||
* There is an additional concrete store provided that puts the system
|
|
||||||
* in dumb mode. This is not recommended, as it removes the library's
|
|
||||||
* ability to stop replay attacks reliably. It still uses time-based
|
|
||||||
* checking to make replay attacks only possible within a small
|
|
||||||
* window, but they remain possible within that window. This store
|
|
||||||
* should only be used if the consumer site has no way to retain data
|
|
||||||
* between requests at all.
|
|
||||||
*
|
|
||||||
* IMMEDIATE MODE
|
|
||||||
*
|
|
||||||
* In the flow described above, the user may need to confirm to the
|
|
||||||
* lidentity server that it's ok to authorize his or her identity.
|
|
||||||
* The server may draw pages asking for information from the user
|
|
||||||
* before it redirects the browser back to the consumer's site. This
|
|
||||||
* is generally transparent to the consumer site, so it is typically
|
|
||||||
* ignored as an implementation detail.
|
|
||||||
*
|
|
||||||
* There can be times, however, where the consumer site wants to get a
|
|
||||||
* response immediately. When this is the case, the consumer can put
|
|
||||||
* the library in immediate mode. In immediate mode, there is an
|
|
||||||
* extra response possible from the server, which is essentially the
|
|
||||||
* server reporting that it doesn't have enough information to answer
|
|
||||||
* the question yet.
|
|
||||||
*
|
|
||||||
* USING THIS LIBRARY
|
|
||||||
*
|
|
||||||
* Integrating this library into an application is usually a
|
|
||||||
* relatively straightforward process. The process should basically
|
|
||||||
* follow this plan:
|
|
||||||
*
|
|
||||||
* Add an OpenID login field somewhere on your site. When an OpenID
|
|
||||||
* is entered in that field and the form is submitted, it should make
|
|
||||||
* a request to the your site which includes that OpenID URL.
|
|
||||||
*
|
|
||||||
* First, the application should instantiate the Auth_OpenID_Consumer
|
|
||||||
* class using the store of choice (Auth_OpenID_FileStore or one of
|
|
||||||
* the SQL-based stores). If the application has a custom
|
|
||||||
* session-management implementation, an object implementing the
|
|
||||||
* {@link Auth_Yadis_PHPSession} interface should be passed as the
|
|
||||||
* second parameter. Otherwise, the default uses $_SESSION.
|
|
||||||
*
|
|
||||||
* Next, the application should call the Auth_OpenID_Consumer object's
|
|
||||||
* 'begin' method. This method takes the OpenID URL. The 'begin'
|
|
||||||
* method returns an Auth_OpenID_AuthRequest object.
|
|
||||||
*
|
|
||||||
* Next, the application should call the 'redirectURL' method of the
|
|
||||||
* Auth_OpenID_AuthRequest object. The 'return_to' URL parameter is
|
|
||||||
* the URL that the OpenID server will send the user back to after
|
|
||||||
* attempting to verify his or her identity. The 'trust_root' is the
|
|
||||||
* URL (or URL pattern) that identifies your web site to the user when
|
|
||||||
* he or she is authorizing it. Send a redirect to the resulting URL
|
|
||||||
* to the user's browser.
|
|
||||||
*
|
|
||||||
* That's the first half of the authentication process. The second
|
|
||||||
* half of the process is done after the user's ID server sends the
|
|
||||||
* user's browser a redirect back to your site to complete their
|
|
||||||
* login.
|
|
||||||
*
|
|
||||||
* When that happens, the user will contact your site at the URL given
|
|
||||||
* as the 'return_to' URL to the Auth_OpenID_AuthRequest::redirectURL
|
|
||||||
* call made above. The request will have several query parameters
|
|
||||||
* added to the URL by the identity server as the information
|
|
||||||
* necessary to finish the request.
|
|
||||||
*
|
|
||||||
* Lastly, instantiate an Auth_OpenID_Consumer instance as above and
|
|
||||||
* call its 'complete' method, passing in all the received query
|
|
||||||
* arguments.
|
|
||||||
*
|
|
||||||
* There are multiple possible return types possible from that
|
|
||||||
* method. These indicate the whether or not the login was successful,
|
|
||||||
* and include any additional information appropriate for their type.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require utility classes and functions for the consumer.
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID.php";
|
|
||||||
require_once "Auth/OpenID/Message.php";
|
|
||||||
require_once "Auth/OpenID/HMACSHA1.php";
|
|
||||||
require_once "Auth/OpenID/Association.php";
|
|
||||||
require_once "Auth/OpenID/CryptUtil.php";
|
|
||||||
require_once "Auth/OpenID/DiffieHellman.php";
|
|
||||||
require_once "Auth/OpenID/KVForm.php";
|
|
||||||
require_once "Auth/OpenID/Nonce.php";
|
|
||||||
require_once "Auth/OpenID/Discover.php";
|
|
||||||
require_once "Auth/Yadis/Manager.php";
|
|
||||||
require_once "Auth/Yadis/XRI.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the status code returned when the complete method returns
|
|
||||||
* successfully.
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_SUCCESS', 'success');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Status to indicate cancellation of OpenID authentication.
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_CANCEL', 'cancel');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the status code completeAuth returns when the value it
|
|
||||||
* received indicated an invalid login.
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_FAILURE', 'failure');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the status code completeAuth returns when the
|
|
||||||
* {@link Auth_OpenID_Consumer} instance is in immediate mode, and the
|
|
||||||
* identity server sends back a URL to send the user to to complete his
|
|
||||||
* or her login.
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_SETUP_NEEDED', 'setup needed');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the status code beginAuth returns when the page fetched
|
|
||||||
* from the entered OpenID URL doesn't contain the necessary link tags
|
|
||||||
* to function as an identity page.
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_PARSE_ERROR', 'parse error');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An OpenID consumer implementation that performs discovery and does
|
|
||||||
* session management. See the Consumer.php file documentation for
|
|
||||||
* more information.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_Consumer {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $discoverMethod = 'Auth_OpenID_discover';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $session_key_prefix = "_openid_consumer_";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $_token_suffix = "last_token";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Initialize a Consumer instance.
|
|
||||||
*
|
|
||||||
* You should create a new instance of the Consumer object with
|
|
||||||
* every HTTP request that handles OpenID transactions.
|
|
||||||
*
|
|
||||||
* @param Auth_OpenID_OpenIDStore $store This must be an object
|
|
||||||
* that implements the interface in {@link
|
|
||||||
* Auth_OpenID_OpenIDStore}. Several concrete implementations are
|
|
||||||
* provided, to cover most common use cases. For stores backed by
|
|
||||||
* MySQL, PostgreSQL, or SQLite, see the {@link
|
|
||||||
* Auth_OpenID_SQLStore} class and its sublcasses. For a
|
|
||||||
* filesystem-backed store, see the {@link Auth_OpenID_FileStore}
|
|
||||||
* module. As a last resort, if it isn't possible for the server
|
|
||||||
* to store state at all, an instance of {@link
|
|
||||||
* Auth_OpenID_DumbStore} can be used.
|
|
||||||
*
|
|
||||||
* @param mixed $session An object which implements the interface
|
|
||||||
* of the {@link Auth_Yadis_PHPSession} class. Particularly, this
|
|
||||||
* object is expected to have these methods: get($key), set($key),
|
|
||||||
* $value), and del($key). This defaults to a session object
|
|
||||||
* which wraps PHP's native session machinery. You should only
|
|
||||||
* need to pass something here if you have your own sessioning
|
|
||||||
* implementation.
|
|
||||||
*
|
|
||||||
* @param str $consumer_cls The name of the class to instantiate
|
|
||||||
* when creating the internal consumer object. This is used for
|
|
||||||
* testing.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_Consumer(&$store, $session = null,
|
|
||||||
$consumer_cls = null)
|
|
||||||
{
|
|
||||||
if ($session === null) {
|
|
||||||
$session = new Auth_Yadis_PHPSession();
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->session =& $session;
|
|
||||||
|
|
||||||
if ($consumer_cls !== null) {
|
|
||||||
$this->consumer =& new $consumer_cls($store);
|
|
||||||
} else {
|
|
||||||
$this->consumer =& new Auth_OpenID_GenericConsumer($store);
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->_token_key = $this->session_key_prefix . $this->_token_suffix;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Used in testing to define the discovery mechanism.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function getDiscoveryObject(&$session, $openid_url,
|
|
||||||
$session_key_prefix)
|
|
||||||
{
|
|
||||||
return new Auth_Yadis_Discovery($session, $openid_url,
|
|
||||||
$session_key_prefix);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Start the OpenID authentication process. See steps 1-2 in the
|
|
||||||
* overview at the top of this file.
|
|
||||||
*
|
|
||||||
* @param string $user_url Identity URL given by the user. This
|
|
||||||
* method performs a textual transformation of the URL to try and
|
|
||||||
* make sure it is normalized. For example, a user_url of
|
|
||||||
* example.com will be normalized to http://example.com/
|
|
||||||
* normalizing and resolving any redirects the server might issue.
|
|
||||||
*
|
|
||||||
* @param bool $anonymous True if the OpenID request is to be sent
|
|
||||||
* to the server without any identifier information. Use this
|
|
||||||
* when you want to transport data but don't want to do OpenID
|
|
||||||
* authentication with identifiers.
|
|
||||||
*
|
|
||||||
* @return Auth_OpenID_AuthRequest $auth_request An object
|
|
||||||
* containing the discovered information will be returned, with a
|
|
||||||
* method for building a redirect URL to the server, as described
|
|
||||||
* in step 3 of the overview. This object may also be used to add
|
|
||||||
* extension arguments to the request, using its 'addExtensionArg'
|
|
||||||
* method.
|
|
||||||
*/
|
|
||||||
function begin($user_url, $anonymous=false)
|
|
||||||
{
|
|
||||||
$openid_url = $user_url;
|
|
||||||
|
|
||||||
$disco = $this->getDiscoveryObject($this->session,
|
|
||||||
$openid_url,
|
|
||||||
$this->session_key_prefix);
|
|
||||||
|
|
||||||
// Set the 'stale' attribute of the manager. If discovery
|
|
||||||
// fails in a fatal way, the stale flag will cause the manager
|
|
||||||
// to be cleaned up next time discovery is attempted.
|
|
||||||
|
|
||||||
$m = $disco->getManager();
|
|
||||||
$loader = new Auth_Yadis_ManagerLoader();
|
|
||||||
|
|
||||||
if ($m) {
|
|
||||||
if ($m->stale) {
|
|
||||||
$disco->destroyManager();
|
|
||||||
} else {
|
|
||||||
$m->stale = true;
|
|
||||||
$disco->session->set($disco->session_key,
|
|
||||||
serialize($loader->toSession($m)));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$endpoint = $disco->getNextService($this->discoverMethod,
|
|
||||||
$this->consumer->fetcher);
|
|
||||||
|
|
||||||
// Reset the 'stale' attribute of the manager.
|
|
||||||
$m =& $disco->getManager();
|
|
||||||
if ($m) {
|
|
||||||
$m->stale = false;
|
|
||||||
$disco->session->set($disco->session_key,
|
|
||||||
serialize($loader->toSession($m)));
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($endpoint === null) {
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
return $this->beginWithoutDiscovery($endpoint,
|
|
||||||
$anonymous);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Start OpenID verification without doing OpenID server
|
|
||||||
* discovery. This method is used internally by Consumer.begin
|
|
||||||
* after discovery is performed, and exists to provide an
|
|
||||||
* interface for library users needing to perform their own
|
|
||||||
* discovery.
|
|
||||||
*
|
|
||||||
* @param Auth_OpenID_ServiceEndpoint $endpoint an OpenID service
|
|
||||||
* endpoint descriptor.
|
|
||||||
*
|
|
||||||
* @param bool anonymous Set to true if you want to perform OpenID
|
|
||||||
* without identifiers.
|
|
||||||
*
|
|
||||||
* @return Auth_OpenID_AuthRequest $auth_request An OpenID
|
|
||||||
* authentication request object.
|
|
||||||
*/
|
|
||||||
function &beginWithoutDiscovery($endpoint, $anonymous=false)
|
|
||||||
{
|
|
||||||
$loader = new Auth_OpenID_ServiceEndpointLoader();
|
|
||||||
$auth_req = $this->consumer->begin($endpoint);
|
|
||||||
$this->session->set($this->_token_key,
|
|
||||||
$loader->toSession($auth_req->endpoint));
|
|
||||||
if (!$auth_req->setAnonymous($anonymous)) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
"OpenID 1 requests MUST include the identifier " .
|
|
||||||
"in the request.");
|
|
||||||
}
|
|
||||||
return $auth_req;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Called to interpret the server's response to an OpenID
|
|
||||||
* request. It is called in step 4 of the flow described in the
|
|
||||||
* consumer overview.
|
|
||||||
*
|
|
||||||
* @param array $query An array of the query parameters (key =>
|
|
||||||
* value pairs) for this HTTP request. Defaults to null. If
|
|
||||||
* null, the GET or POST data are automatically gotten from the
|
|
||||||
* PHP environment. It is only useful to override $query for
|
|
||||||
* testing.
|
|
||||||
*
|
|
||||||
* @return Auth_OpenID_ConsumerResponse $response A instance of an
|
|
||||||
* Auth_OpenID_ConsumerResponse subclass. The type of response is
|
|
||||||
* indicated by the status attribute, which will be one of
|
|
||||||
* SUCCESS, CANCEL, FAILURE, or SETUP_NEEDED.
|
|
||||||
*/
|
|
||||||
function complete($query=null)
|
|
||||||
{
|
|
||||||
if ($query === null) {
|
|
||||||
$query = Auth_OpenID::getQuery();
|
|
||||||
}
|
|
||||||
|
|
||||||
$loader = new Auth_OpenID_ServiceEndpointLoader();
|
|
||||||
$endpoint_data = $this->session->get($this->_token_key);
|
|
||||||
$endpoint =
|
|
||||||
$loader->fromSession($endpoint_data);
|
|
||||||
|
|
||||||
if ($endpoint === null) {
|
|
||||||
$response = new Auth_OpenID_FailureResponse(null,
|
|
||||||
'No session state found');
|
|
||||||
} else {
|
|
||||||
$message = Auth_OpenID_Message::fromPostArgs($query);
|
|
||||||
$response = $this->consumer->complete($message, $endpoint);
|
|
||||||
$this->session->del($this->_token_key);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (in_array($response->status, array(Auth_OpenID_SUCCESS,
|
|
||||||
Auth_OpenID_CANCEL))) {
|
|
||||||
if ($response->identity_url !== null) {
|
|
||||||
$disco = $this->getDiscoveryObject($this->session,
|
|
||||||
$response->identity_url,
|
|
||||||
$this->session_key_prefix);
|
|
||||||
$disco->cleanup();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $response;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A class implementing HMAC/DH-SHA1 consumer sessions.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_DiffieHellmanSHA1ConsumerSession {
|
|
||||||
var $session_type = 'DH-SHA1';
|
|
||||||
var $hash_func = 'Auth_OpenID_SHA1';
|
|
||||||
var $secret_size = 20;
|
|
||||||
var $allowed_assoc_types = array('HMAC-SHA1');
|
|
||||||
|
|
||||||
function Auth_OpenID_DiffieHellmanSHA1ConsumerSession($dh = null)
|
|
||||||
{
|
|
||||||
if ($dh === null) {
|
|
||||||
$dh = new Auth_OpenID_DiffieHellman();
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->dh = $dh;
|
|
||||||
}
|
|
||||||
|
|
||||||
function getRequest()
|
|
||||||
{
|
|
||||||
$math =& Auth_OpenID_getMathLib();
|
|
||||||
|
|
||||||
$cpub = $math->longToBase64($this->dh->public);
|
|
||||||
|
|
||||||
$args = array('dh_consumer_public' => $cpub);
|
|
||||||
|
|
||||||
if (!$this->dh->usingDefaultValues()) {
|
|
||||||
$args = array_merge($args, array(
|
|
||||||
'dh_modulus' =>
|
|
||||||
$math->longToBase64($this->dh->mod),
|
|
||||||
'dh_gen' =>
|
|
||||||
$math->longToBase64($this->dh->gen)));
|
|
||||||
}
|
|
||||||
|
|
||||||
return $args;
|
|
||||||
}
|
|
||||||
|
|
||||||
function extractSecret($response)
|
|
||||||
{
|
|
||||||
if (!$response->hasKey(Auth_OpenID_OPENID_NS,
|
|
||||||
'dh_server_public')) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$response->hasKey(Auth_OpenID_OPENID_NS,
|
|
||||||
'enc_mac_key')) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$math =& Auth_OpenID_getMathLib();
|
|
||||||
|
|
||||||
$spub = $math->base64ToLong($response->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'dh_server_public'));
|
|
||||||
$enc_mac_key = base64_decode($response->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'enc_mac_key'));
|
|
||||||
|
|
||||||
return $this->dh->xorSecret($spub, $enc_mac_key, $this->hash_func);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A class implementing HMAC/DH-SHA256 consumer sessions.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_DiffieHellmanSHA256ConsumerSession extends
|
|
||||||
Auth_OpenID_DiffieHellmanSHA1ConsumerSession {
|
|
||||||
var $session_type = 'DH-SHA256';
|
|
||||||
var $hash_func = 'Auth_OpenID_SHA256';
|
|
||||||
var $secret_size = 32;
|
|
||||||
var $allowed_assoc_types = array('HMAC-SHA256');
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A class implementing plaintext consumer sessions.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_PlainTextConsumerSession {
|
|
||||||
var $session_type = 'no-encryption';
|
|
||||||
var $allowed_assoc_types = array('HMAC-SHA1');
|
|
||||||
|
|
||||||
function getRequest()
|
|
||||||
{
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
|
|
||||||
function extractSecret($response)
|
|
||||||
{
|
|
||||||
if (!$response->hasKey(Auth_OpenID_OPENID_NS, 'mac_key')) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
return base64_decode($response->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'mac_key'));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns available session types.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_getAvailableSessionTypes()
|
|
||||||
{
|
|
||||||
$types = array(
|
|
||||||
'no-encryption' => 'Auth_OpenID_PlainTextConsumerSession',
|
|
||||||
'DH-SHA1' => 'Auth_OpenID_DiffieHellmanSHA1ConsumerSession',
|
|
||||||
'DH-SHA256' => 'Auth_OpenID_DiffieHellmanSHA256ConsumerSession');
|
|
||||||
|
|
||||||
return $types;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class is the interface to the OpenID consumer logic.
|
|
||||||
* Instances of it maintain no per-request state, so they can be
|
|
||||||
* reused (or even used by multiple threads concurrently) as needed.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_GenericConsumer {
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $discoverMethod = 'Auth_OpenID_discover';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This consumer's store object.
|
|
||||||
*/
|
|
||||||
var $store;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $_use_assocs;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $openid1_nonce_query_arg_name = 'janrain_nonce';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This method initializes a new {@link Auth_OpenID_Consumer}
|
|
||||||
* instance to access the library.
|
|
||||||
*
|
|
||||||
* @param Auth_OpenID_OpenIDStore $store This must be an object
|
|
||||||
* that implements the interface in {@link Auth_OpenID_OpenIDStore}.
|
|
||||||
* Several concrete implementations are provided, to cover most common use
|
|
||||||
* cases. For stores backed by MySQL, PostgreSQL, or SQLite, see
|
|
||||||
* the {@link Auth_OpenID_SQLStore} class and its sublcasses. For a
|
|
||||||
* filesystem-backed store, see the {@link Auth_OpenID_FileStore} module.
|
|
||||||
* As a last resort, if it isn't possible for the server to store
|
|
||||||
* state at all, an instance of {@link Auth_OpenID_DumbStore} can be used.
|
|
||||||
*
|
|
||||||
* @param bool $immediate This is an optional boolean value. It
|
|
||||||
* controls whether the library uses immediate mode, as explained
|
|
||||||
* in the module description. The default value is False, which
|
|
||||||
* disables immediate mode.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_GenericConsumer(&$store)
|
|
||||||
{
|
|
||||||
$this->store =& $store;
|
|
||||||
$this->negotiator =& Auth_OpenID_getDefaultNegotiator();
|
|
||||||
$this->_use_assocs = ($this->store ? true : false);
|
|
||||||
|
|
||||||
$this->fetcher = Auth_Yadis_Yadis::getHTTPFetcher();
|
|
||||||
|
|
||||||
$this->session_types = Auth_OpenID_getAvailableSessionTypes();
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Called to begin OpenID authentication using the specified
|
|
||||||
* {@link Auth_OpenID_ServiceEndpoint}.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function begin($service_endpoint)
|
|
||||||
{
|
|
||||||
$assoc = $this->_getAssociation($service_endpoint);
|
|
||||||
$r = new Auth_OpenID_AuthRequest($service_endpoint, $assoc);
|
|
||||||
$r->return_to_args[$this->openid1_nonce_query_arg_name] =
|
|
||||||
Auth_OpenID_mkNonce();
|
|
||||||
return $r;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given an {@link Auth_OpenID_Message}, {@link
|
|
||||||
* Auth_OpenID_ServiceEndpoint} and optional return_to URL,
|
|
||||||
* complete OpenID authentication.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function complete($message, $endpoint, $return_to = null)
|
|
||||||
{
|
|
||||||
$mode = $message->getArg(Auth_OpenID_OPENID_NS, 'mode',
|
|
||||||
'<no mode set>');
|
|
||||||
|
|
||||||
if ($return_to !== null) {
|
|
||||||
if (!$this->_checkReturnTo($message, $return_to)) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
"openid.return_to does not match return URL");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($mode == 'cancel') {
|
|
||||||
return new Auth_OpenID_CancelResponse($endpoint);
|
|
||||||
} else if ($mode == 'error') {
|
|
||||||
$error = $message->getArg(Auth_OpenID_OPENID_NS, 'error');
|
|
||||||
$contact = $message->getArg(Auth_OpenID_OPENID_NS, 'contact');
|
|
||||||
$reference = $message->getArg(Auth_OpenID_OPENID_NS, 'reference');
|
|
||||||
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint, $error,
|
|
||||||
$contact, $reference);
|
|
||||||
} else if ($message->isOpenID2() && ($mode == 'setup_needed')) {
|
|
||||||
return new Auth_OpenID_SetupNeededResponse($endpoint);
|
|
||||||
|
|
||||||
} else if ($mode == 'id_res') {
|
|
||||||
if ($this->_checkSetupNeeded($message)) {
|
|
||||||
return SetupNeededResponse($endpoint,
|
|
||||||
$result->user_setup_url);
|
|
||||||
} else {
|
|
||||||
return $this->_doIdRes($message, $endpoint);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
sprintf("Invalid openid.mode '%s'",
|
|
||||||
$mode));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _checkSetupNeeded($message)
|
|
||||||
{
|
|
||||||
// In OpenID 1, we check to see if this is a cancel from
|
|
||||||
// immediate mode by the presence of the user_setup_url
|
|
||||||
// parameter.
|
|
||||||
if ($message->isOpenID1()) {
|
|
||||||
$user_setup_url = $message->getArg(Auth_OpenID_OPENID1_NS,
|
|
||||||
'user_setup_url');
|
|
||||||
if ($user_setup_url !== null) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _doIdRes($message, $endpoint)
|
|
||||||
{
|
|
||||||
$signed_list_str = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'signed');
|
|
||||||
|
|
||||||
if ($signed_list_str === null) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
"Response missing signed list");
|
|
||||||
}
|
|
||||||
|
|
||||||
$signed_list = explode(',', $signed_list_str);
|
|
||||||
|
|
||||||
// Checks for presence of appropriate fields (and checks
|
|
||||||
// signed list fields)
|
|
||||||
$result = $this->_idResCheckForFields($message, $signed_list);
|
|
||||||
|
|
||||||
if (Auth_OpenID::isFailure($result)) {
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Verify discovery information:
|
|
||||||
$result = $this->_verifyDiscoveryResults($message, $endpoint);
|
|
||||||
|
|
||||||
if (Auth_OpenID::isFailure($result)) {
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
$endpoint = $result;
|
|
||||||
|
|
||||||
$result = $this->_idResCheckSignature($message,
|
|
||||||
$endpoint->server_url);
|
|
||||||
|
|
||||||
if (Auth_OpenID::isFailure($result)) {
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
$response_identity = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'identity');
|
|
||||||
|
|
||||||
$result = $this->_idResCheckNonce($message, $endpoint);
|
|
||||||
|
|
||||||
if (Auth_OpenID::isFailure($result)) {
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
$signed_fields = Auth_OpenID::addPrefix($signed_list, "openid.");
|
|
||||||
|
|
||||||
return new Auth_OpenID_SuccessResponse($endpoint, $message,
|
|
||||||
$signed_fields);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _checkReturnTo($message, $return_to)
|
|
||||||
{
|
|
||||||
// Check an OpenID message and its openid.return_to value
|
|
||||||
// against a return_to URL from an application. Return True
|
|
||||||
// on success, False on failure.
|
|
||||||
|
|
||||||
// Check the openid.return_to args against args in the
|
|
||||||
// original message.
|
|
||||||
$result = Auth_OpenID_GenericConsumer::_verifyReturnToArgs(
|
|
||||||
$message->toPostArgs());
|
|
||||||
if (Auth_OpenID::isFailure($result)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check the return_to base URL against the one in the
|
|
||||||
// message.
|
|
||||||
$msg_return_to = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'return_to');
|
|
||||||
|
|
||||||
$return_to_parts = parse_url($return_to);
|
|
||||||
$msg_return_to_parts = parse_url($msg_return_to);
|
|
||||||
|
|
||||||
// If port is absent from both, add it so it's equal in the
|
|
||||||
// check below.
|
|
||||||
if ((!array_key_exists('port', $return_to_parts)) &&
|
|
||||||
(!array_key_exists('port', $msg_return_to_parts))) {
|
|
||||||
$return_to_parts['port'] = null;
|
|
||||||
$msg_return_to_parts['port'] = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// If path is absent from both, add it so it's equal in the
|
|
||||||
// check below.
|
|
||||||
if ((!array_key_exists('path', $return_to_parts)) &&
|
|
||||||
(!array_key_exists('path', $msg_return_to_parts))) {
|
|
||||||
$return_to_parts['path'] = null;
|
|
||||||
$msg_return_to_parts['path'] = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// The URL scheme, authority, and path MUST be the same
|
|
||||||
// between the two URLs.
|
|
||||||
foreach (array('scheme', 'host', 'port', 'path') as $component) {
|
|
||||||
// If the url component is absent in either URL, fail.
|
|
||||||
// There should always be a scheme, host, port, and path.
|
|
||||||
if (!array_key_exists($component, $return_to_parts)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!array_key_exists($component, $msg_return_to_parts)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (Auth_OpenID::arrayGet($return_to_parts, $component) !==
|
|
||||||
Auth_OpenID::arrayGet($msg_return_to_parts, $component)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _verifyReturnToArgs($query)
|
|
||||||
{
|
|
||||||
// Verify that the arguments in the return_to URL are present in this
|
|
||||||
// response.
|
|
||||||
|
|
||||||
$message = Auth_OpenID_Message::fromPostArgs($query);
|
|
||||||
$return_to = $message->getArg(Auth_OpenID_OPENID_NS, 'return_to');
|
|
||||||
|
|
||||||
// XXX: this should be checked by _idResCheckForFields
|
|
||||||
if (!$return_to) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
"no openid.return_to in query");
|
|
||||||
}
|
|
||||||
|
|
||||||
$parsed_url = parse_url($return_to);
|
|
||||||
|
|
||||||
$q = array();
|
|
||||||
if (array_key_exists('query', $parsed_url)) {
|
|
||||||
$rt_query = $parsed_url['query'];
|
|
||||||
$q = Auth_OpenID::parse_str($rt_query);
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($q as $rt_key => $rt_value) {
|
|
||||||
if (!array_key_exists($rt_key, $query)) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
sprintf("return_to parameter %s absent from query", $rt_key));
|
|
||||||
} else {
|
|
||||||
$value = $query[$rt_key];
|
|
||||||
if ($rt_value != $value) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
sprintf("parameter %s value %s does not match " .
|
|
||||||
"return_to value %s", $rt_key,
|
|
||||||
$value, $rt_value));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _idResCheckSignature($message, $server_url)
|
|
||||||
{
|
|
||||||
$assoc_handle = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'assoc_handle');
|
|
||||||
|
|
||||||
$assoc = $this->store->getAssociation($server_url, $assoc_handle);
|
|
||||||
|
|
||||||
if ($assoc) {
|
|
||||||
if ($assoc->getExpiresIn() <= 0) {
|
|
||||||
// XXX: It might be a good idea sometimes to re-start
|
|
||||||
// the authentication with a new association. Doing it
|
|
||||||
// automatically opens the possibility for
|
|
||||||
// denial-of-service by a server that just returns
|
|
||||||
// expired associations (or really short-lived
|
|
||||||
// associations)
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
'Association with ' . $server_url . ' expired');
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$assoc->checkMessageSignature($message)) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
"Bad signature");
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
// It's not an association we know about. Stateless mode
|
|
||||||
// is our only possible path for recovery. XXX - async
|
|
||||||
// framework will not want to block on this call to
|
|
||||||
// _checkAuth.
|
|
||||||
if (!$this->_checkAuth($message, $server_url)) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
"Server denied check_authentication");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _verifyDiscoveryResults($message, $endpoint=null)
|
|
||||||
{
|
|
||||||
if ($message->getOpenIDNamespace() == Auth_OpenID_OPENID2_NS) {
|
|
||||||
return $this->_verifyDiscoveryResultsOpenID2($message,
|
|
||||||
$endpoint);
|
|
||||||
} else {
|
|
||||||
return $this->_verifyDiscoveryResultsOpenID1($message,
|
|
||||||
$endpoint);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _verifyDiscoveryResultsOpenID1($message, $endpoint)
|
|
||||||
{
|
|
||||||
if ($endpoint === null) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
'When using OpenID 1, the claimed ID must be supplied, ' .
|
|
||||||
'either by passing it through as a return_to parameter ' .
|
|
||||||
'or by using a session, and supplied to the GenericConsumer ' .
|
|
||||||
'as the argument to complete()');
|
|
||||||
}
|
|
||||||
|
|
||||||
$to_match = new Auth_OpenID_ServiceEndpoint();
|
|
||||||
$to_match->type_uris = array(Auth_OpenID_TYPE_1_1);
|
|
||||||
$to_match->local_id = $message->getArg(Auth_OpenID_OPENID1_NS,
|
|
||||||
'identity');
|
|
||||||
|
|
||||||
// Restore delegate information from the initiation phase
|
|
||||||
$to_match->claimed_id = $endpoint->claimed_id;
|
|
||||||
|
|
||||||
if ($to_match->local_id === null) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
"Missing required field openid.identity");
|
|
||||||
}
|
|
||||||
|
|
||||||
$to_match_1_0 = $to_match->copy();
|
|
||||||
$to_match_1_0->type_uris = array(Auth_OpenID_TYPE_1_0);
|
|
||||||
|
|
||||||
$result = $this->_verifyDiscoverySingle($endpoint, $to_match);
|
|
||||||
|
|
||||||
if (is_a($result, 'Auth_OpenID_TypeURIMismatch')) {
|
|
||||||
$result = $this->_verifyDiscoverySingle($endpoint, $to_match_1_0);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (Auth_OpenID::isFailure($result)) {
|
|
||||||
return $result;
|
|
||||||
} else {
|
|
||||||
return $endpoint;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _verifyDiscoverySingle($endpoint, $to_match)
|
|
||||||
{
|
|
||||||
// Every type URI that's in the to_match endpoint has to be
|
|
||||||
// present in the discovered endpoint.
|
|
||||||
foreach ($to_match->type_uris as $type_uri) {
|
|
||||||
if (!$endpoint->usesExtension($type_uri)) {
|
|
||||||
return new Auth_OpenID_TypeURIMismatch($endpoint,
|
|
||||||
"Required type ".$type_uri." not present");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($to_match->claimed_id != $endpoint->claimed_id) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
sprintf('Claimed ID does not match (different subjects!), ' .
|
|
||||||
'Expected %s, got %s', $to_match->claimed_id,
|
|
||||||
$endpoint->claimed_id));
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($to_match->getLocalID() != $endpoint->getLocalID()) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
sprintf('local_id mismatch. Expected %s, got %s',
|
|
||||||
$to_match->getLocalID(), $endpoint->getLocalID()));
|
|
||||||
}
|
|
||||||
|
|
||||||
// If the server URL is None, this must be an OpenID 1
|
|
||||||
// response, because op_endpoint is a required parameter in
|
|
||||||
// OpenID 2. In that case, we don't actually care what the
|
|
||||||
// discovered server_url is, because signature checking or
|
|
||||||
// check_auth should take care of that check for us.
|
|
||||||
if ($to_match->server_url === null) {
|
|
||||||
if ($to_match->preferredNamespace() != Auth_OpenID_OPENID1_NS) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
"Preferred namespace mismatch (bug)");
|
|
||||||
}
|
|
||||||
} else if ($to_match->server_url != $endpoint->server_url) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
sprintf('OP Endpoint mismatch. Expected %s, got %s',
|
|
||||||
$to_match->server_url, $endpoint->server_url));
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _verifyDiscoveryResultsOpenID2($message, $endpoint)
|
|
||||||
{
|
|
||||||
$to_match = new Auth_OpenID_ServiceEndpoint();
|
|
||||||
$to_match->type_uris = array(Auth_OpenID_TYPE_2_0);
|
|
||||||
$to_match->claimed_id = $message->getArg(Auth_OpenID_OPENID2_NS,
|
|
||||||
'claimed_id');
|
|
||||||
|
|
||||||
$to_match->local_id = $message->getArg(Auth_OpenID_OPENID2_NS,
|
|
||||||
'identity');
|
|
||||||
|
|
||||||
$to_match->server_url = $message->getArg(Auth_OpenID_OPENID2_NS,
|
|
||||||
'op_endpoint');
|
|
||||||
|
|
||||||
if ($to_match->server_url === null) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
"OP Endpoint URL missing");
|
|
||||||
}
|
|
||||||
|
|
||||||
// claimed_id and identifier must both be present or both be
|
|
||||||
// absent
|
|
||||||
if (($to_match->claimed_id === null) &&
|
|
||||||
($to_match->local_id !== null)) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
'openid.identity is present without openid.claimed_id');
|
|
||||||
} else if (($to_match->claimed_id !== null) &&
|
|
||||||
($to_match->local_id === null)) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
'openid.claimed_id is present without openid.identity');
|
|
||||||
} else if ($to_match->claimed_id === null) {
|
|
||||||
// This is a response without identifiers, so there's
|
|
||||||
// really no checking that we can do, so return an
|
|
||||||
// endpoint that's for the specified `openid.op_endpoint'
|
|
||||||
return Auth_OpenID_ServiceEndpoint::fromOPEndpointURL(
|
|
||||||
$to_match->server_url);
|
|
||||||
} else if (!$endpoint) {
|
|
||||||
// The claimed ID doesn't match, so we have to do
|
|
||||||
// discovery again. This covers not using sessions, OP
|
|
||||||
// identifier endpoints and responses that didn't match
|
|
||||||
// the original request.
|
|
||||||
// oidutil.log('No pre-discovered information supplied.')
|
|
||||||
return $this->_discoverAndVerify($to_match);
|
|
||||||
} else if ($to_match->claimed_id != $endpoint->claimed_id) {
|
|
||||||
// oidutil.log('Mismatched pre-discovered session data. '
|
|
||||||
// 'Claimed ID in session=%s, in assertion=%s' %
|
|
||||||
// (endpoint.claimed_id, to_match.claimed_id))
|
|
||||||
return $this->_discoverAndVerify($to_match);
|
|
||||||
} else {
|
|
||||||
// The claimed ID matches, so we use the endpoint that we
|
|
||||||
// discovered in initiation. This should be the most
|
|
||||||
// common case.
|
|
||||||
$result = $this->_verifyDiscoverySingle($endpoint, $to_match);
|
|
||||||
|
|
||||||
if (Auth_OpenID::isFailure($result)) {
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $endpoint;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Never reached.
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _discoverAndVerify($to_match)
|
|
||||||
{
|
|
||||||
// oidutil.log('Performing discovery on %s' % (to_match.claimed_id,))
|
|
||||||
list($unused, $services) = call_user_func($this->discoverMethod,
|
|
||||||
$to_match->claimed_id,
|
|
||||||
$this->fetcher);
|
|
||||||
if (!$services) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
sprintf("No OpenID information found at %s",
|
|
||||||
$to_match->claimed_id));
|
|
||||||
}
|
|
||||||
|
|
||||||
// Search the services resulting from discovery to find one
|
|
||||||
// that matches the information from the assertion
|
|
||||||
$failure_messages = array();
|
|
||||||
|
|
||||||
foreach ($services as $endpoint) {
|
|
||||||
$result = $this->_verifyDiscoverySingle($endpoint, $to_match);
|
|
||||||
|
|
||||||
if (Auth_OpenID::isFailure($result)) {
|
|
||||||
$failure_messages->append($result);
|
|
||||||
} else {
|
|
||||||
// It matches, so discover verification has
|
|
||||||
// succeeded. Return this endpoint.
|
|
||||||
return $endpoint;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
sprintf('No matching endpoint found after discovering %s',
|
|
||||||
$to_match->claimed_id));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _idResGetNonceOpenID1($message, $endpoint)
|
|
||||||
{
|
|
||||||
$return_to = $message->getArg(Auth_OpenID_OPENID1_NS,
|
|
||||||
'return_to');
|
|
||||||
if ($return_to === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$parsed_url = parse_url($return_to);
|
|
||||||
|
|
||||||
if (!array_key_exists('query', $parsed_url)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$query = $parsed_url['query'];
|
|
||||||
$pairs = Auth_OpenID::parse_str($query);
|
|
||||||
|
|
||||||
if ($pairs === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($pairs as $k => $v) {
|
|
||||||
if ($k == $this->openid1_nonce_query_arg_name) {
|
|
||||||
return $v;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _idResCheckNonce($message, $endpoint)
|
|
||||||
{
|
|
||||||
if ($message->isOpenID1()) {
|
|
||||||
// This indicates that the nonce was generated by the consumer
|
|
||||||
$nonce = $this->_idResGetNonceOpenID1($message, $endpoint);
|
|
||||||
$server_url = '';
|
|
||||||
} else {
|
|
||||||
$nonce = $message->getArg(Auth_OpenID_OPENID2_NS,
|
|
||||||
'response_nonce');
|
|
||||||
|
|
||||||
$server_url = $endpoint->server_url;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($nonce === null) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
"Nonce missing from response");
|
|
||||||
}
|
|
||||||
|
|
||||||
$parts = Auth_OpenID_splitNonce($nonce);
|
|
||||||
|
|
||||||
if ($parts === null) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
"Malformed nonce in response");
|
|
||||||
}
|
|
||||||
|
|
||||||
list($timestamp, $salt) = $parts;
|
|
||||||
|
|
||||||
if (!$this->store->useNonce($server_url, $timestamp, $salt)) {
|
|
||||||
return new Auth_OpenID_FailureResponse($endpoint,
|
|
||||||
"Nonce already used or out of range");
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _idResCheckForFields($message, $signed_list)
|
|
||||||
{
|
|
||||||
$basic_fields = array('return_to', 'assoc_handle', 'sig');
|
|
||||||
$basic_sig_fields = array('return_to', 'identity');
|
|
||||||
|
|
||||||
$require_fields = array(
|
|
||||||
Auth_OpenID_OPENID2_NS => array_merge($basic_fields,
|
|
||||||
array('op_endpoint')),
|
|
||||||
|
|
||||||
Auth_OpenID_OPENID1_NS => array_merge($basic_fields,
|
|
||||||
array('identity'))
|
|
||||||
);
|
|
||||||
|
|
||||||
$require_sigs = array(
|
|
||||||
Auth_OpenID_OPENID2_NS => array_merge($basic_sig_fields,
|
|
||||||
array('response_nonce',
|
|
||||||
'claimed_id',
|
|
||||||
'assoc_handle')),
|
|
||||||
Auth_OpenID_OPENID1_NS => array_merge($basic_sig_fields,
|
|
||||||
array('nonce'))
|
|
||||||
);
|
|
||||||
|
|
||||||
foreach ($require_fields[$message->getOpenIDNamespace()] as $field) {
|
|
||||||
if (!$message->hasKey(Auth_OpenID_OPENID_NS, $field)) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
"Missing required field '".$field."'");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($require_sigs[$message->getOpenIDNamespace()] as $field) {
|
|
||||||
// Field is present and not in signed list
|
|
||||||
if ($message->hasKey(Auth_OpenID_OPENID_NS, $field) &&
|
|
||||||
(!in_array($field, $signed_list))) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
"'".$field."' not signed");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _checkAuth($message, $server_url)
|
|
||||||
{
|
|
||||||
$request = $this->_createCheckAuthRequest($message);
|
|
||||||
if ($request === null) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$resp_message = $this->_makeKVPost($request, $server_url);
|
|
||||||
if (($resp_message === null) ||
|
|
||||||
(is_a($resp_message, 'Auth_OpenID_ServerErrorContainer'))) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $this->_processCheckAuthResponse($resp_message, $server_url);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _createCheckAuthRequest($message)
|
|
||||||
{
|
|
||||||
$signed = $message->getArg(Auth_OpenID_OPENID_NS, 'signed');
|
|
||||||
if ($signed === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$whitelist = array('assoc_handle', 'sig',
|
|
||||||
'signed', 'invalidate_handle');
|
|
||||||
|
|
||||||
$check_args = array();
|
|
||||||
|
|
||||||
foreach ($whitelist as $k) {
|
|
||||||
$val = $message->getArg(Auth_OpenID_OPENID_NS, $k);
|
|
||||||
if ($val !== null) {
|
|
||||||
$check_args[$k] = $val;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$signed = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'signed');
|
|
||||||
|
|
||||||
if ($signed) {
|
|
||||||
foreach (explode(',', $signed) as $k) {
|
|
||||||
if ($k == 'ns') {
|
|
||||||
$check_args['ns'] = $message->getOpenIDNamespace();
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$message->hasKey(Auth_OpenID_OPENID_NS,
|
|
||||||
$k)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$val = $message->getAliasedArg($k);
|
|
||||||
$check_args[$k] = $val;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$check_args['mode'] = 'check_authentication';
|
|
||||||
return Auth_OpenID_Message::fromOpenIDArgs($check_args);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _processCheckAuthResponse($response, $server_url)
|
|
||||||
{
|
|
||||||
$is_valid = $response->getArg(Auth_OpenID_OPENID_NS, 'is_valid',
|
|
||||||
'false');
|
|
||||||
|
|
||||||
$invalidate_handle = $response->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'invalidate_handle');
|
|
||||||
|
|
||||||
if ($invalidate_handle !== null) {
|
|
||||||
$this->store->removeAssociation($server_url,
|
|
||||||
$invalidate_handle);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($is_valid == 'true') {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _makeKVPost($message, $server_url)
|
|
||||||
{
|
|
||||||
$body = $message->toURLEncoded();
|
|
||||||
$resp = $this->fetcher->post($server_url, $body);
|
|
||||||
|
|
||||||
if ($resp === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$response_message = Auth_OpenID_Message::fromKVForm($resp->body);
|
|
||||||
|
|
||||||
if ($resp->status == 400) {
|
|
||||||
return Auth_OpenID_ServerErrorContainer::fromMessage(
|
|
||||||
$response_message);
|
|
||||||
} else if ($resp->status != 200) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $response_message;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _getAssociation($endpoint)
|
|
||||||
{
|
|
||||||
if (!$this->_use_assocs) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$assoc = $this->store->getAssociation($endpoint->server_url);
|
|
||||||
|
|
||||||
if (($assoc === null) ||
|
|
||||||
($assoc->getExpiresIn() <= 0)) {
|
|
||||||
|
|
||||||
$assoc = $this->_negotiateAssociation($endpoint);
|
|
||||||
|
|
||||||
if ($assoc !== null) {
|
|
||||||
$this->store->storeAssociation($endpoint->server_url,
|
|
||||||
$assoc);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $assoc;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _negotiateAssociation($endpoint)
|
|
||||||
{
|
|
||||||
// Get our preferred session/association type from the negotiatior.
|
|
||||||
list($assoc_type, $session_type) = $this->negotiator->getAllowedType();
|
|
||||||
|
|
||||||
$assoc = $this->_requestAssociation(
|
|
||||||
$endpoint, $assoc_type, $session_type);
|
|
||||||
|
|
||||||
if (Auth_OpenID::isFailure($assoc)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (is_a($assoc, 'Auth_OpenID_ServerErrorContainer')) {
|
|
||||||
$why = $assoc;
|
|
||||||
|
|
||||||
// Any error message whose code is not 'unsupported-type'
|
|
||||||
// should be considered a total failure.
|
|
||||||
if (($why->error_code != 'unsupported-type') ||
|
|
||||||
($why->message->isOpenID1())) {
|
|
||||||
// oidutil.log(
|
|
||||||
// 'Server error when requesting an association from %r: %s'
|
|
||||||
// % (endpoint.server_url, why.error_text))
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// The server didn't like the association/session type
|
|
||||||
// that we sent, and it sent us back a message that
|
|
||||||
// might tell us how to handle it.
|
|
||||||
// oidutil.log(
|
|
||||||
// 'Unsupported association type %s: %s' % (assoc_type,
|
|
||||||
// why.error_text,))
|
|
||||||
|
|
||||||
// Extract the session_type and assoc_type from the
|
|
||||||
// error message
|
|
||||||
$assoc_type = $why->message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'assoc_type');
|
|
||||||
|
|
||||||
$session_type = $why->message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'session_type');
|
|
||||||
|
|
||||||
if (($assoc_type === null) || ($session_type === null)) {
|
|
||||||
// oidutil.log('Server responded with unsupported association '
|
|
||||||
// 'session but did not supply a fallback.')
|
|
||||||
return null;
|
|
||||||
} else if (!$this->negotiator->isAllowed($assoc_type,
|
|
||||||
$session_type)) {
|
|
||||||
// fmt = ('Server sent unsupported session/association type: '
|
|
||||||
// 'session_type=%s, assoc_type=%s')
|
|
||||||
// oidutil.log(fmt % (session_type, assoc_type))
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
// Attempt to create an association from the assoc_type
|
|
||||||
// and session_type that the server told us it
|
|
||||||
// supported.
|
|
||||||
$assoc = $this->_requestAssociation(
|
|
||||||
$endpoint, $assoc_type, $session_type);
|
|
||||||
|
|
||||||
if (is_a($assoc, 'Auth_OpenID_ServerErrorContainer')) {
|
|
||||||
// Do not keep trying, since it rejected the
|
|
||||||
// association type that it told us to use.
|
|
||||||
// oidutil.log('Server %s refused its suggested association
|
|
||||||
// 'type: session_type=%s, assoc_type=%s'
|
|
||||||
// % (endpoint.server_url, session_type,
|
|
||||||
// assoc_type))
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
return $assoc;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $assoc;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _requestAssociation($endpoint, $assoc_type, $session_type)
|
|
||||||
{
|
|
||||||
list($assoc_session, $args) = $this->_createAssociateRequest(
|
|
||||||
$endpoint, $assoc_type, $session_type);
|
|
||||||
|
|
||||||
$response_message = $this->_makeKVPost($args, $endpoint->server_url);
|
|
||||||
|
|
||||||
if ($response_message === null) {
|
|
||||||
// oidutil.log('openid.associate request failed: %s' % (why[0],))
|
|
||||||
return null;
|
|
||||||
} else if (is_a($response_message,
|
|
||||||
'Auth_OpenID_ServerErrorContainer')) {
|
|
||||||
return $response_message;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $this->_extractAssociation($response_message, $assoc_session);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _extractAssociation(&$assoc_response, &$assoc_session)
|
|
||||||
{
|
|
||||||
// Extract the common fields from the response, raising an
|
|
||||||
// exception if they are not found
|
|
||||||
$assoc_type = $assoc_response->getArg(
|
|
||||||
Auth_OpenID_OPENID_NS, 'assoc_type',
|
|
||||||
Auth_OpenID_NO_DEFAULT);
|
|
||||||
|
|
||||||
if ($assoc_type === null) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
'assoc_type missing from association response');
|
|
||||||
}
|
|
||||||
|
|
||||||
$assoc_handle = $assoc_response->getArg(
|
|
||||||
Auth_OpenID_OPENID_NS, 'assoc_handle',
|
|
||||||
Auth_OpenID_NO_DEFAULT);
|
|
||||||
|
|
||||||
if ($assoc_handle === null) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
'assoc_handle missing from association response');
|
|
||||||
}
|
|
||||||
|
|
||||||
// expires_in is a base-10 string. The Python parsing will
|
|
||||||
// accept literals that have whitespace around them and will
|
|
||||||
// accept negative values. Neither of these are really in-spec,
|
|
||||||
// but we think it's OK to accept them.
|
|
||||||
$expires_in_str = $assoc_response->getArg(
|
|
||||||
Auth_OpenID_OPENID_NS, 'expires_in',
|
|
||||||
Auth_OpenID_NO_DEFAULT);
|
|
||||||
|
|
||||||
if ($expires_in_str === null) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
'expires_in missing from association response');
|
|
||||||
}
|
|
||||||
|
|
||||||
$expires_in = Auth_OpenID::intval($expires_in_str);
|
|
||||||
if ($expires_in === false) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// OpenID 1 has funny association session behaviour.
|
|
||||||
if ($assoc_response->isOpenID1()) {
|
|
||||||
$session_type = $this->_getOpenID1SessionType($assoc_response);
|
|
||||||
} else {
|
|
||||||
$session_type = $assoc_response->getArg(
|
|
||||||
Auth_OpenID_OPENID2_NS, 'session_type',
|
|
||||||
Auth_OpenID_NO_DEFAULT);
|
|
||||||
|
|
||||||
if ($session_type === null) {
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
'session_type missing from association response');
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Session type mismatch
|
|
||||||
if ($assoc_session->session_type != $session_type) {
|
|
||||||
if ($assoc_response->isOpenID1() &&
|
|
||||||
($session_type == 'no-encryption')) {
|
|
||||||
// In OpenID 1, any association request can result in
|
|
||||||
// a 'no-encryption' association response. Setting
|
|
||||||
// assoc_session to a new no-encryption session should
|
|
||||||
// make the rest of this function work properly for
|
|
||||||
// that case.
|
|
||||||
$assoc_session = new Auth_OpenID_PlainTextConsumerSession();
|
|
||||||
} else {
|
|
||||||
// Any other mismatch, regardless of protocol version
|
|
||||||
// results in the failure of the association session
|
|
||||||
// altogether.
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Make sure assoc_type is valid for session_type
|
|
||||||
if (!in_array($assoc_type, $assoc_session->allowed_assoc_types)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Delegate to the association session to extract the secret
|
|
||||||
// from the response, however is appropriate for that session
|
|
||||||
// type.
|
|
||||||
$secret = $assoc_session->extractSecret($assoc_response);
|
|
||||||
|
|
||||||
if ($secret === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
return Auth_OpenID_Association::fromExpiresIn(
|
|
||||||
$expires_in, $assoc_handle, $secret, $assoc_type);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _createAssociateRequest($endpoint, $assoc_type, $session_type)
|
|
||||||
{
|
|
||||||
if (array_key_exists($session_type, $this->session_types)) {
|
|
||||||
$session_type_class = $this->session_types[$session_type];
|
|
||||||
|
|
||||||
if (is_callable($session_type_class)) {
|
|
||||||
$assoc_session = $session_type_class();
|
|
||||||
} else {
|
|
||||||
$assoc_session = new $session_type_class();
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$args = array(
|
|
||||||
'mode' => 'associate',
|
|
||||||
'assoc_type' => $assoc_type);
|
|
||||||
|
|
||||||
if (!$endpoint->compatibilityMode()) {
|
|
||||||
$args['ns'] = Auth_OpenID_OPENID2_NS;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Leave out the session type if we're in compatibility mode
|
|
||||||
// *and* it's no-encryption.
|
|
||||||
if ((!$endpoint->compatibilityMode()) ||
|
|
||||||
($assoc_session->session_type != 'no-encryption')) {
|
|
||||||
$args['session_type'] = $assoc_session->session_type;
|
|
||||||
}
|
|
||||||
|
|
||||||
$args = array_merge($args, $assoc_session->getRequest());
|
|
||||||
$message = Auth_OpenID_Message::fromOpenIDArgs($args);
|
|
||||||
return array($assoc_session, $message);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given an association response message, extract the OpenID 1.X
|
|
||||||
* session type.
|
|
||||||
*
|
|
||||||
* This function mostly takes care of the 'no-encryption' default
|
|
||||||
* behavior in OpenID 1.
|
|
||||||
*
|
|
||||||
* If the association type is plain-text, this function will
|
|
||||||
* return 'no-encryption'
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @return $typ The association type for this message
|
|
||||||
*/
|
|
||||||
function _getOpenID1SessionType($assoc_response)
|
|
||||||
{
|
|
||||||
// If it's an OpenID 1 message, allow session_type to default
|
|
||||||
// to None (which signifies "no-encryption")
|
|
||||||
$session_type = $assoc_response->getArg(Auth_OpenID_OPENID1_NS,
|
|
||||||
'session_type');
|
|
||||||
|
|
||||||
// Handle the differences between no-encryption association
|
|
||||||
// respones in OpenID 1 and 2:
|
|
||||||
|
|
||||||
// no-encryption is not really a valid session type for OpenID
|
|
||||||
// 1, but we'll accept it anyway, while issuing a warning.
|
|
||||||
if ($session_type == 'no-encryption') {
|
|
||||||
// oidutil.log('WARNING: OpenID server sent "no-encryption"'
|
|
||||||
// 'for OpenID 1.X')
|
|
||||||
} else if (($session_type == '') || ($session_type === null)) {
|
|
||||||
// Missing or empty session type is the way to flag a
|
|
||||||
// 'no-encryption' response. Change the session type to
|
|
||||||
// 'no-encryption' so that it can be handled in the same
|
|
||||||
// way as OpenID 2 'no-encryption' respones.
|
|
||||||
$session_type = 'no-encryption';
|
|
||||||
}
|
|
||||||
|
|
||||||
return $session_type;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class represents an authentication request from a consumer to
|
|
||||||
* an OpenID server.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_AuthRequest {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Initialize an authentication request with the specified token,
|
|
||||||
* association, and endpoint.
|
|
||||||
*
|
|
||||||
* Users of this library should not create instances of this
|
|
||||||
* class. Instances of this class are created by the library when
|
|
||||||
* needed.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_AuthRequest(&$endpoint, $assoc)
|
|
||||||
{
|
|
||||||
$this->assoc = $assoc;
|
|
||||||
$this->endpoint =& $endpoint;
|
|
||||||
$this->return_to_args = array();
|
|
||||||
$this->message = new Auth_OpenID_Message();
|
|
||||||
$this->message->setOpenIDNamespace(
|
|
||||||
$endpoint->preferredNamespace());
|
|
||||||
$this->_anonymous = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Add an extension to this checkid request.
|
|
||||||
*
|
|
||||||
* $extension_request: An object that implements the extension
|
|
||||||
* request interface for adding arguments to an OpenID message.
|
|
||||||
*/
|
|
||||||
function addExtension(&$extension_request)
|
|
||||||
{
|
|
||||||
$extension_request->toMessage($this->message);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Add an extension argument to this OpenID authentication
|
|
||||||
* request.
|
|
||||||
*
|
|
||||||
* Use caution when adding arguments, because they will be
|
|
||||||
* URL-escaped and appended to the redirect URL, which can easily
|
|
||||||
* get quite long.
|
|
||||||
*
|
|
||||||
* @param string $namespace The namespace for the extension. For
|
|
||||||
* example, the simple registration extension uses the namespace
|
|
||||||
* 'sreg'.
|
|
||||||
*
|
|
||||||
* @param string $key The key within the extension namespace. For
|
|
||||||
* example, the nickname field in the simple registration
|
|
||||||
* extension's key is 'nickname'.
|
|
||||||
*
|
|
||||||
* @param string $value The value to provide to the server for
|
|
||||||
* this argument.
|
|
||||||
*/
|
|
||||||
function addExtensionArg($namespace, $key, $value)
|
|
||||||
{
|
|
||||||
$this->message->setArg($namespace, $key, $value);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set whether this request should be made anonymously. If a
|
|
||||||
* request is anonymous, the identifier will not be sent in the
|
|
||||||
* request. This is only useful if you are making another kind of
|
|
||||||
* request with an extension in this request.
|
|
||||||
*
|
|
||||||
* Anonymous requests are not allowed when the request is made
|
|
||||||
* with OpenID 1.
|
|
||||||
*/
|
|
||||||
function setAnonymous($is_anonymous)
|
|
||||||
{
|
|
||||||
if ($is_anonymous && $this->message->isOpenID1()) {
|
|
||||||
return false;
|
|
||||||
} else {
|
|
||||||
$this->_anonymous = $is_anonymous;
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Produce a {@link Auth_OpenID_Message} representing this
|
|
||||||
* request.
|
|
||||||
*
|
|
||||||
* @param string $realm The URL (or URL pattern) that identifies
|
|
||||||
* your web site to the user when she is authorizing it.
|
|
||||||
*
|
|
||||||
* @param string $return_to The URL that the OpenID provider will
|
|
||||||
* send the user back to after attempting to verify her identity.
|
|
||||||
*
|
|
||||||
* Not specifying a return_to URL means that the user will not be
|
|
||||||
* returned to the site issuing the request upon its completion.
|
|
||||||
*
|
|
||||||
* @param bool $immediate If true, the OpenID provider is to send
|
|
||||||
* back a response immediately, useful for behind-the-scenes
|
|
||||||
* authentication attempts. Otherwise the OpenID provider may
|
|
||||||
* engage the user before providing a response. This is the
|
|
||||||
* default case, as the user may need to provide credentials or
|
|
||||||
* approve the request before a positive response can be sent.
|
|
||||||
*/
|
|
||||||
function getMessage($realm, $return_to=null, $immediate=false)
|
|
||||||
{
|
|
||||||
if ($return_to) {
|
|
||||||
$return_to = Auth_OpenID::appendArgs($return_to,
|
|
||||||
$this->return_to_args);
|
|
||||||
} else if ($immediate) {
|
|
||||||
// raise ValueError(
|
|
||||||
// '"return_to" is mandatory when
|
|
||||||
//using "checkid_immediate"')
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
"'return_to' is mandatory when using checkid_immediate");
|
|
||||||
} else if ($this->message->isOpenID1()) {
|
|
||||||
// raise ValueError('"return_to" is
|
|
||||||
// mandatory for OpenID 1 requests')
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
"'return_to' is mandatory for OpenID 1 requests");
|
|
||||||
} else if ($this->return_to_args) {
|
|
||||||
// raise ValueError('extra "return_to" arguments
|
|
||||||
// were specified, but no return_to was specified')
|
|
||||||
return new Auth_OpenID_FailureResponse(null,
|
|
||||||
"extra 'return_to' arguments where specified, " .
|
|
||||||
"but no return_to was specified");
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($immediate) {
|
|
||||||
$mode = 'checkid_immediate';
|
|
||||||
} else {
|
|
||||||
$mode = 'checkid_setup';
|
|
||||||
}
|
|
||||||
|
|
||||||
$message = $this->message->copy();
|
|
||||||
if ($message->isOpenID1()) {
|
|
||||||
$realm_key = 'trust_root';
|
|
||||||
} else {
|
|
||||||
$realm_key = 'realm';
|
|
||||||
}
|
|
||||||
|
|
||||||
$message->updateArgs(Auth_OpenID_OPENID_NS,
|
|
||||||
array(
|
|
||||||
$realm_key => $realm,
|
|
||||||
'mode' => $mode,
|
|
||||||
'return_to' => $return_to));
|
|
||||||
|
|
||||||
if (!$this->_anonymous) {
|
|
||||||
if ($this->endpoint->isOPIdentifier()) {
|
|
||||||
// This will never happen when we're in compatibility
|
|
||||||
// mode, as long as isOPIdentifier() returns False
|
|
||||||
// whenever preferredNamespace() returns OPENID1_NS.
|
|
||||||
$claimed_id = $request_identity =
|
|
||||||
Auth_OpenID_IDENTIFIER_SELECT;
|
|
||||||
} else {
|
|
||||||
$request_identity = $this->endpoint->getLocalID();
|
|
||||||
$claimed_id = $this->endpoint->claimed_id;
|
|
||||||
}
|
|
||||||
|
|
||||||
// This is true for both OpenID 1 and 2
|
|
||||||
$message->setArg(Auth_OpenID_OPENID_NS, 'identity',
|
|
||||||
$request_identity);
|
|
||||||
|
|
||||||
if ($message->isOpenID2()) {
|
|
||||||
$message->setArg(Auth_OpenID_OPENID2_NS, 'claimed_id',
|
|
||||||
$claimed_id);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($this->assoc) {
|
|
||||||
$message->setArg(Auth_OpenID_OPENID_NS, 'assoc_handle',
|
|
||||||
$this->assoc->handle);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $message;
|
|
||||||
}
|
|
||||||
|
|
||||||
function redirectURL($realm, $return_to = null,
|
|
||||||
$immediate = false)
|
|
||||||
{
|
|
||||||
$message = $this->getMessage($realm, $return_to, $immediate);
|
|
||||||
|
|
||||||
if (Auth_OpenID::isFailure($message)) {
|
|
||||||
return $message;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $message->toURL($this->endpoint->server_url);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get html for a form to submit this request to the IDP.
|
|
||||||
*
|
|
||||||
* form_tag_attrs: An array of attributes to be added to the form
|
|
||||||
* tag. 'accept-charset' and 'enctype' have defaults that can be
|
|
||||||
* overridden. If a value is supplied for 'action' or 'method', it
|
|
||||||
* will be replaced.
|
|
||||||
*/
|
|
||||||
function formMarkup($realm, $return_to=null, $immediate=false,
|
|
||||||
$form_tag_attrs=null)
|
|
||||||
{
|
|
||||||
$message = $this->getMessage($realm, $return_to, $immediate);
|
|
||||||
|
|
||||||
if (Auth_OpenID::isFailure($message)) {
|
|
||||||
return $message;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $message->toFormMarkup($this->endpoint->server_url,
|
|
||||||
$form_tag_attrs);
|
|
||||||
}
|
|
||||||
|
|
||||||
function shouldSendRedirect()
|
|
||||||
{
|
|
||||||
return $this->endpoint->compatibilityMode();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The base class for responses from the Auth_OpenID_Consumer.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_ConsumerResponse {
|
|
||||||
var $status = null;
|
|
||||||
|
|
||||||
function setEndpoint($endpoint)
|
|
||||||
{
|
|
||||||
$this->endpoint = $endpoint;
|
|
||||||
if ($endpoint === null) {
|
|
||||||
$this->identity_url = null;
|
|
||||||
} else {
|
|
||||||
$this->identity_url = $endpoint->claimed_id;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A response with a status of Auth_OpenID_SUCCESS. Indicates that
|
|
||||||
* this request is a successful acknowledgement from the OpenID server
|
|
||||||
* that the supplied URL is, indeed controlled by the requesting
|
|
||||||
* agent. This has three relevant attributes:
|
|
||||||
*
|
|
||||||
* claimed_id - The identity URL that has been authenticated
|
|
||||||
*
|
|
||||||
* signed_args - The arguments in the server's response that were
|
|
||||||
* signed and verified.
|
|
||||||
*
|
|
||||||
* status - Auth_OpenID_SUCCESS.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_SuccessResponse extends Auth_OpenID_ConsumerResponse {
|
|
||||||
var $status = Auth_OpenID_SUCCESS;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_SuccessResponse($endpoint, $message, $signed_args=null)
|
|
||||||
{
|
|
||||||
$this->endpoint = $endpoint;
|
|
||||||
$this->identity_url = $endpoint->claimed_id;
|
|
||||||
$this->signed_args = $signed_args;
|
|
||||||
$this->message = $message;
|
|
||||||
|
|
||||||
if ($this->signed_args === null) {
|
|
||||||
$this->signed_args = array();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Extract signed extension data from the server's response.
|
|
||||||
*
|
|
||||||
* @param string $prefix The extension namespace from which to
|
|
||||||
* extract the extension data.
|
|
||||||
*/
|
|
||||||
function extensionResponse($namespace_uri, $require_signed)
|
|
||||||
{
|
|
||||||
if ($require_signed) {
|
|
||||||
return $this->getSignedNS($namespace_uri);
|
|
||||||
} else {
|
|
||||||
return $this->message->getArgs($namespace_uri);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function isOpenID1()
|
|
||||||
{
|
|
||||||
return $this->message->isOpenID1();
|
|
||||||
}
|
|
||||||
|
|
||||||
function isSigned($ns_uri, $ns_key)
|
|
||||||
{
|
|
||||||
// Return whether a particular key is signed, regardless of
|
|
||||||
// its namespace alias
|
|
||||||
return in_array($this->message->getKey($ns_uri, $ns_key),
|
|
||||||
$this->signed_args);
|
|
||||||
}
|
|
||||||
|
|
||||||
function getSigned($ns_uri, $ns_key, $default = null)
|
|
||||||
{
|
|
||||||
// Return the specified signed field if available, otherwise
|
|
||||||
// return default
|
|
||||||
if ($this->isSigned($ns_uri, $ns_key)) {
|
|
||||||
return $this->message->getArg($ns_uri, $ns_key, $default);
|
|
||||||
} else {
|
|
||||||
return $default;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function getSignedNS($ns_uri)
|
|
||||||
{
|
|
||||||
$args = array();
|
|
||||||
|
|
||||||
$msg_args = $this->message->getArgs($ns_uri);
|
|
||||||
|
|
||||||
foreach ($msg_args as $key => $value) {
|
|
||||||
if (!$this->isSigned($ns_uri, $key)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $msg_args;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get the openid.return_to argument from this response.
|
|
||||||
*
|
|
||||||
* This is useful for verifying that this request was initiated by
|
|
||||||
* this consumer.
|
|
||||||
*
|
|
||||||
* @return string $return_to The return_to URL supplied to the
|
|
||||||
* server on the initial request, or null if the response did not
|
|
||||||
* contain an 'openid.return_to' argument.
|
|
||||||
*/
|
|
||||||
function getReturnTo()
|
|
||||||
{
|
|
||||||
return $this->getSigned(Auth_OpenID_OPENID_NS, 'return_to');
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A response with a status of Auth_OpenID_FAILURE. Indicates that the
|
|
||||||
* OpenID protocol has failed. This could be locally or remotely
|
|
||||||
* triggered. This has three relevant attributes:
|
|
||||||
*
|
|
||||||
* claimed_id - The identity URL for which authentication was
|
|
||||||
* attempted, if it can be determined. Otherwise, null.
|
|
||||||
*
|
|
||||||
* message - A message indicating why the request failed, if one is
|
|
||||||
* supplied. Otherwise, null.
|
|
||||||
*
|
|
||||||
* status - Auth_OpenID_FAILURE.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_FailureResponse extends Auth_OpenID_ConsumerResponse {
|
|
||||||
var $status = Auth_OpenID_FAILURE;
|
|
||||||
|
|
||||||
function Auth_OpenID_FailureResponse($endpoint, $message = null,
|
|
||||||
$contact = null, $reference = null)
|
|
||||||
{
|
|
||||||
$this->setEndpoint($endpoint);
|
|
||||||
$this->message = $message;
|
|
||||||
$this->contact = $contact;
|
|
||||||
$this->reference = $reference;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A specific, internal failure used to detect type URI mismatch.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_TypeURIMismatch extends Auth_OpenID_FailureResponse {
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Exception that is raised when the server returns a 400 response
|
|
||||||
* code to a direct request.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_ServerErrorContainer {
|
|
||||||
function Auth_OpenID_ServerErrorContainer($error_text,
|
|
||||||
$error_code,
|
|
||||||
$message)
|
|
||||||
{
|
|
||||||
$this->error_text = $error_text;
|
|
||||||
$this->error_code = $error_code;
|
|
||||||
$this->message = $message;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function fromMessage($message)
|
|
||||||
{
|
|
||||||
$error_text = $message->getArg(
|
|
||||||
Auth_OpenID_OPENID_NS, 'error', '<no error message supplied>');
|
|
||||||
$error_code = $message->getArg(Auth_OpenID_OPENID_NS, 'error_code');
|
|
||||||
return new Auth_OpenID_ServerErrorContainer($error_text,
|
|
||||||
$error_code,
|
|
||||||
$message);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A response with a status of Auth_OpenID_CANCEL. Indicates that the
|
|
||||||
* user cancelled the OpenID authentication request. This has two
|
|
||||||
* relevant attributes:
|
|
||||||
*
|
|
||||||
* claimed_id - The identity URL for which authentication was
|
|
||||||
* attempted, if it can be determined. Otherwise, null.
|
|
||||||
*
|
|
||||||
* status - Auth_OpenID_SUCCESS.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_CancelResponse extends Auth_OpenID_ConsumerResponse {
|
|
||||||
var $status = Auth_OpenID_CANCEL;
|
|
||||||
|
|
||||||
function Auth_OpenID_CancelResponse($endpoint)
|
|
||||||
{
|
|
||||||
$this->setEndpoint($endpoint);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A response with a status of Auth_OpenID_SETUP_NEEDED. Indicates
|
|
||||||
* that the request was in immediate mode, and the server is unable to
|
|
||||||
* authenticate the user without further interaction.
|
|
||||||
*
|
|
||||||
* claimed_id - The identity URL for which authentication was
|
|
||||||
* attempted.
|
|
||||||
*
|
|
||||||
* setup_url - A URL that can be used to send the user to the server
|
|
||||||
* to set up for authentication. The user should be redirected in to
|
|
||||||
* the setup_url, either in the current window or in a new browser
|
|
||||||
* window. Null in OpenID 2.
|
|
||||||
*
|
|
||||||
* status - Auth_OpenID_SETUP_NEEDED.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_SetupNeededResponse extends Auth_OpenID_ConsumerResponse {
|
|
||||||
var $status = Auth_OpenID_SETUP_NEEDED;
|
|
||||||
|
|
||||||
function Auth_OpenID_SetupNeededResponse($endpoint,
|
|
||||||
$setup_url = null)
|
|
||||||
{
|
|
||||||
$this->setEndpoint($endpoint);
|
|
||||||
$this->setup_url = $setup_url;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,109 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* CryptUtil: A suite of wrapper utility functions for the OpenID
|
|
||||||
* library.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
if (!defined('Auth_OpenID_RAND_SOURCE')) {
|
|
||||||
/**
|
|
||||||
* The filename for a source of random bytes. Define this yourself
|
|
||||||
* if you have a different source of randomness.
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_RAND_SOURCE', '/dev/urandom');
|
|
||||||
}
|
|
||||||
|
|
||||||
class Auth_OpenID_CryptUtil {
|
|
||||||
/**
|
|
||||||
* Get the specified number of random bytes.
|
|
||||||
*
|
|
||||||
* Attempts to use a cryptographically secure (not predictable)
|
|
||||||
* source of randomness if available. If there is no high-entropy
|
|
||||||
* randomness source available, it will fail. As a last resort,
|
|
||||||
* for non-critical systems, define
|
|
||||||
* <code>Auth_OpenID_RAND_SOURCE</code> as <code>null</code>, and
|
|
||||||
* the code will fall back on a pseudo-random number generator.
|
|
||||||
*
|
|
||||||
* @param int $num_bytes The length of the return value
|
|
||||||
* @return string $bytes random bytes
|
|
||||||
*/
|
|
||||||
function getBytes($num_bytes)
|
|
||||||
{
|
|
||||||
static $f = null;
|
|
||||||
$bytes = '';
|
|
||||||
if ($f === null) {
|
|
||||||
if (Auth_OpenID_RAND_SOURCE === null) {
|
|
||||||
$f = false;
|
|
||||||
} else {
|
|
||||||
$f = @fopen(Auth_OpenID_RAND_SOURCE, "r");
|
|
||||||
if ($f === false) {
|
|
||||||
$msg = 'Define Auth_OpenID_RAND_SOURCE as null to ' .
|
|
||||||
' continue with an insecure random number generator.';
|
|
||||||
trigger_error($msg, E_USER_ERROR);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if ($f === false) {
|
|
||||||
// pseudorandom used
|
|
||||||
$bytes = '';
|
|
||||||
for ($i = 0; $i < $num_bytes; $i += 4) {
|
|
||||||
$bytes .= pack('L', mt_rand());
|
|
||||||
}
|
|
||||||
$bytes = substr($bytes, 0, $num_bytes);
|
|
||||||
} else {
|
|
||||||
$bytes = fread($f, $num_bytes);
|
|
||||||
}
|
|
||||||
return $bytes;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Produce a string of length random bytes, chosen from chrs. If
|
|
||||||
* $chrs is null, the resulting string may contain any characters.
|
|
||||||
*
|
|
||||||
* @param integer $length The length of the resulting
|
|
||||||
* randomly-generated string
|
|
||||||
* @param string $chrs A string of characters from which to choose
|
|
||||||
* to build the new string
|
|
||||||
* @return string $result A string of randomly-chosen characters
|
|
||||||
* from $chrs
|
|
||||||
*/
|
|
||||||
function randomString($length, $population = null)
|
|
||||||
{
|
|
||||||
if ($population === null) {
|
|
||||||
return Auth_OpenID_CryptUtil::getBytes($length);
|
|
||||||
}
|
|
||||||
|
|
||||||
$popsize = strlen($population);
|
|
||||||
|
|
||||||
if ($popsize > 256) {
|
|
||||||
$msg = 'More than 256 characters supplied to ' . __FUNCTION__;
|
|
||||||
trigger_error($msg, E_USER_ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
$duplicate = 256 % $popsize;
|
|
||||||
|
|
||||||
$str = "";
|
|
||||||
for ($i = 0; $i < $length; $i++) {
|
|
||||||
do {
|
|
||||||
$n = ord(Auth_OpenID_CryptUtil::getBytes(1));
|
|
||||||
} while ($n < $duplicate);
|
|
||||||
|
|
||||||
$n %= $popsize;
|
|
||||||
$str .= $population[$n];
|
|
||||||
}
|
|
||||||
|
|
||||||
return $str;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,131 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The Auth_OpenID_DatabaseConnection class, which is used to emulate
|
|
||||||
* a PEAR database connection.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An empty base class intended to emulate PEAR connection
|
|
||||||
* functionality in applications that supply their own database
|
|
||||||
* abstraction mechanisms. See {@link Auth_OpenID_SQLStore} for more
|
|
||||||
* information. You should subclass this class if you need to create
|
|
||||||
* an SQL store that needs to access its database using an
|
|
||||||
* application's database abstraction layer instead of a PEAR database
|
|
||||||
* connection. Any subclass of Auth_OpenID_DatabaseConnection MUST
|
|
||||||
* adhere to the interface specified here.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_DatabaseConnection {
|
|
||||||
/**
|
|
||||||
* Sets auto-commit mode on this database connection.
|
|
||||||
*
|
|
||||||
* @param bool $mode True if auto-commit is to be used; false if
|
|
||||||
* not.
|
|
||||||
*/
|
|
||||||
function autoCommit($mode)
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Run an SQL query with the specified parameters, if any.
|
|
||||||
*
|
|
||||||
* @param string $sql An SQL string with placeholders. The
|
|
||||||
* placeholders are assumed to be specific to the database engine
|
|
||||||
* for this connection.
|
|
||||||
*
|
|
||||||
* @param array $params An array of parameters to insert into the
|
|
||||||
* SQL string using this connection's escaping mechanism.
|
|
||||||
*
|
|
||||||
* @return mixed $result The result of calling this connection's
|
|
||||||
* internal query function. The type of result depends on the
|
|
||||||
* underlying database engine. This method is usually used when
|
|
||||||
* the result of a query is not important, like a DDL query.
|
|
||||||
*/
|
|
||||||
function query($sql, $params = array())
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Starts a transaction on this connection, if supported.
|
|
||||||
*/
|
|
||||||
function begin()
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Commits a transaction on this connection, if supported.
|
|
||||||
*/
|
|
||||||
function commit()
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Performs a rollback on this connection, if supported.
|
|
||||||
*/
|
|
||||||
function rollback()
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Run an SQL query and return the first column of the first row
|
|
||||||
* of the result set, if any.
|
|
||||||
*
|
|
||||||
* @param string $sql An SQL string with placeholders. The
|
|
||||||
* placeholders are assumed to be specific to the database engine
|
|
||||||
* for this connection.
|
|
||||||
*
|
|
||||||
* @param array $params An array of parameters to insert into the
|
|
||||||
* SQL string using this connection's escaping mechanism.
|
|
||||||
*
|
|
||||||
* @return mixed $result The value of the first column of the
|
|
||||||
* first row of the result set. False if no such result was
|
|
||||||
* found.
|
|
||||||
*/
|
|
||||||
function getOne($sql, $params = array())
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Run an SQL query and return the first row of the result set, if
|
|
||||||
* any.
|
|
||||||
*
|
|
||||||
* @param string $sql An SQL string with placeholders. The
|
|
||||||
* placeholders are assumed to be specific to the database engine
|
|
||||||
* for this connection.
|
|
||||||
*
|
|
||||||
* @param array $params An array of parameters to insert into the
|
|
||||||
* SQL string using this connection's escaping mechanism.
|
|
||||||
*
|
|
||||||
* @return array $result The first row of the result set, if any,
|
|
||||||
* keyed on column name. False if no such result was found.
|
|
||||||
*/
|
|
||||||
function getRow($sql, $params = array())
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Run an SQL query with the specified parameters, if any.
|
|
||||||
*
|
|
||||||
* @param string $sql An SQL string with placeholders. The
|
|
||||||
* placeholders are assumed to be specific to the database engine
|
|
||||||
* for this connection.
|
|
||||||
*
|
|
||||||
* @param array $params An array of parameters to insert into the
|
|
||||||
* SQL string using this connection's escaping mechanism.
|
|
||||||
*
|
|
||||||
* @return array $result An array of arrays representing the
|
|
||||||
* result of the query; each array is keyed on column name.
|
|
||||||
*/
|
|
||||||
function getAll($sql, $params = array())
|
|
||||||
{
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,133 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The OpenID library's Diffie-Hellman implementation.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
require_once 'Auth/OpenID.php';
|
|
||||||
require_once 'Auth/OpenID/BigMath.php';
|
|
||||||
require_once 'Auth/OpenID/HMACSHA1.php';
|
|
||||||
|
|
||||||
function Auth_OpenID_getDefaultMod()
|
|
||||||
{
|
|
||||||
return '155172898181473697471232257763715539915724801'.
|
|
||||||
'966915404479707795314057629378541917580651227423'.
|
|
||||||
'698188993727816152646631438561595825688188889951'.
|
|
||||||
'272158842675419950341258706556549803580104870537'.
|
|
||||||
'681476726513255747040765857479291291572334510643'.
|
|
||||||
'245094715007229621094194349783925984760375594985'.
|
|
||||||
'848253359305585439638443';
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getDefaultGen()
|
|
||||||
{
|
|
||||||
return '2';
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The Diffie-Hellman key exchange class. This class relies on
|
|
||||||
* {@link Auth_OpenID_MathLibrary} to perform large number operations.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_DiffieHellman {
|
|
||||||
|
|
||||||
var $mod;
|
|
||||||
var $gen;
|
|
||||||
var $private;
|
|
||||||
var $lib = null;
|
|
||||||
|
|
||||||
function Auth_OpenID_DiffieHellman($mod = null, $gen = null,
|
|
||||||
$private = null, $lib = null)
|
|
||||||
{
|
|
||||||
if ($lib === null) {
|
|
||||||
$this->lib =& Auth_OpenID_getMathLib();
|
|
||||||
} else {
|
|
||||||
$this->lib =& $lib;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($mod === null) {
|
|
||||||
$this->mod = $this->lib->init(Auth_OpenID_getDefaultMod());
|
|
||||||
} else {
|
|
||||||
$this->mod = $mod;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($gen === null) {
|
|
||||||
$this->gen = $this->lib->init(Auth_OpenID_getDefaultGen());
|
|
||||||
} else {
|
|
||||||
$this->gen = $gen;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($private === null) {
|
|
||||||
$r = $this->lib->rand($this->mod);
|
|
||||||
$this->private = $this->lib->add($r, 1);
|
|
||||||
} else {
|
|
||||||
$this->private = $private;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->public = $this->lib->powmod($this->gen, $this->private,
|
|
||||||
$this->mod);
|
|
||||||
}
|
|
||||||
|
|
||||||
function getSharedSecret($composite)
|
|
||||||
{
|
|
||||||
return $this->lib->powmod($composite, $this->private, $this->mod);
|
|
||||||
}
|
|
||||||
|
|
||||||
function getPublicKey()
|
|
||||||
{
|
|
||||||
return $this->public;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Generate the arguments for an OpenID Diffie-Hellman association
|
|
||||||
* request
|
|
||||||
*/
|
|
||||||
function getAssocArgs()
|
|
||||||
{
|
|
||||||
$cpub = $this->lib->longToBase64($this->getPublicKey());
|
|
||||||
$args = array(
|
|
||||||
'openid.dh_consumer_public' => $cpub,
|
|
||||||
'openid.session_type' => 'DH-SHA1'
|
|
||||||
);
|
|
||||||
|
|
||||||
if ($this->lib->cmp($this->mod, Auth_OpenID_getDefaultMod()) ||
|
|
||||||
$this->lib->cmp($this->gen, Auth_OpenID_getDefaultGen())) {
|
|
||||||
$args['openid.dh_modulus'] = $this->lib->longToBase64($this->mod);
|
|
||||||
$args['openid.dh_gen'] = $this->lib->longToBase64($this->gen);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $args;
|
|
||||||
}
|
|
||||||
|
|
||||||
function usingDefaultValues()
|
|
||||||
{
|
|
||||||
return ($this->mod == Auth_OpenID_getDefaultMod() &&
|
|
||||||
$this->gen == Auth_OpenID_getDefaultGen());
|
|
||||||
}
|
|
||||||
|
|
||||||
function xorSecret($composite, $secret, $hash_func)
|
|
||||||
{
|
|
||||||
$dh_shared = $this->getSharedSecret($composite);
|
|
||||||
$dh_shared_str = $this->lib->longToBinary($dh_shared);
|
|
||||||
$hash_dh_shared = $hash_func($dh_shared_str);
|
|
||||||
|
|
||||||
$xsecret = "";
|
|
||||||
for ($i = 0; $i < Auth_OpenID::bytes($secret); $i++) {
|
|
||||||
$xsecret .= chr(ord($secret[$i]) ^ ord($hash_dh_shared[$i]));
|
|
||||||
}
|
|
||||||
|
|
||||||
return $xsecret;
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,468 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The OpenID and Yadis discovery implementation for OpenID 1.2.
|
|
||||||
*/
|
|
||||||
|
|
||||||
require_once "Auth/OpenID.php";
|
|
||||||
require_once "Auth/OpenID/Parse.php";
|
|
||||||
require_once "Auth/OpenID/Message.php";
|
|
||||||
require_once "Auth/Yadis/XRIRes.php";
|
|
||||||
require_once "Auth/Yadis/Yadis.php";
|
|
||||||
|
|
||||||
// XML namespace value
|
|
||||||
define('Auth_OpenID_XMLNS_1_0', 'http://openid.net/xmlns/1.0');
|
|
||||||
|
|
||||||
// Yadis service types
|
|
||||||
define('Auth_OpenID_TYPE_1_2', 'http://openid.net/signon/1.2');
|
|
||||||
define('Auth_OpenID_TYPE_1_1', 'http://openid.net/signon/1.1');
|
|
||||||
define('Auth_OpenID_TYPE_1_0', 'http://openid.net/signon/1.0');
|
|
||||||
define('Auth_OpenID_TYPE_2_0_IDP', 'http://specs.openid.net/auth/2.0/server');
|
|
||||||
define('Auth_OpenID_TYPE_2_0', 'http://specs.openid.net/auth/2.0/signon');
|
|
||||||
|
|
||||||
function Auth_OpenID_getOpenIDTypeURIs()
|
|
||||||
{
|
|
||||||
return array(Auth_OpenID_TYPE_2_0_IDP,
|
|
||||||
Auth_OpenID_TYPE_2_0,
|
|
||||||
Auth_OpenID_TYPE_1_2,
|
|
||||||
Auth_OpenID_TYPE_1_1,
|
|
||||||
Auth_OpenID_TYPE_1_0);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Object representing an OpenID service endpoint.
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_ServiceEndpoint {
|
|
||||||
function Auth_OpenID_ServiceEndpoint()
|
|
||||||
{
|
|
||||||
$this->claimed_id = null;
|
|
||||||
$this->server_url = null;
|
|
||||||
$this->type_uris = array();
|
|
||||||
$this->local_id = null;
|
|
||||||
$this->canonicalID = null;
|
|
||||||
$this->used_yadis = false; // whether this came from an XRDS
|
|
||||||
}
|
|
||||||
|
|
||||||
function usesExtension($extension_uri)
|
|
||||||
{
|
|
||||||
return in_array($extension_uri, $this->type_uris);
|
|
||||||
}
|
|
||||||
|
|
||||||
function preferredNamespace()
|
|
||||||
{
|
|
||||||
if (in_array(Auth_OpenID_TYPE_2_0_IDP, $this->type_uris) ||
|
|
||||||
in_array(Auth_OpenID_TYPE_2_0, $this->type_uris)) {
|
|
||||||
return Auth_OpenID_OPENID2_NS;
|
|
||||||
} else {
|
|
||||||
return Auth_OpenID_OPENID1_NS;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function supportsType($type_uri)
|
|
||||||
{
|
|
||||||
// Does this endpoint support this type?
|
|
||||||
return ((in_array($type_uri, $this->type_uris)) ||
|
|
||||||
(($type_uri == Auth_OpenID_TYPE_2_0) &&
|
|
||||||
$this->isOPIdentifier()));
|
|
||||||
}
|
|
||||||
|
|
||||||
function compatibilityMode()
|
|
||||||
{
|
|
||||||
return $this->preferredNamespace() != Auth_OpenID_OPENID2_NS;
|
|
||||||
}
|
|
||||||
|
|
||||||
function isOPIdentifier()
|
|
||||||
{
|
|
||||||
return in_array(Auth_OpenID_TYPE_2_0_IDP, $this->type_uris);
|
|
||||||
}
|
|
||||||
|
|
||||||
function fromOPEndpointURL($op_endpoint_url)
|
|
||||||
{
|
|
||||||
// Construct an OP-Identifier OpenIDServiceEndpoint object for
|
|
||||||
// a given OP Endpoint URL
|
|
||||||
$obj = new Auth_OpenID_ServiceEndpoint();
|
|
||||||
$obj->server_url = $op_endpoint_url;
|
|
||||||
$obj->type_uris = array(Auth_OpenID_TYPE_2_0_IDP);
|
|
||||||
return $obj;
|
|
||||||
}
|
|
||||||
|
|
||||||
function parseService($yadis_url, $uri, $type_uris, $service_element)
|
|
||||||
{
|
|
||||||
// Set the state of this object based on the contents of the
|
|
||||||
// service element. Return true if successful, false if not
|
|
||||||
// (if findOPLocalIdentifier returns false).
|
|
||||||
$this->type_uris = $type_uris;
|
|
||||||
$this->server_url = $uri;
|
|
||||||
$this->used_yadis = true;
|
|
||||||
|
|
||||||
if (!$this->isOPIdentifier()) {
|
|
||||||
$this->claimed_id = $yadis_url;
|
|
||||||
$this->local_id = Auth_OpenID_findOPLocalIdentifier(
|
|
||||||
$service_element,
|
|
||||||
$this->type_uris);
|
|
||||||
if ($this->local_id === false) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
function getLocalID()
|
|
||||||
{
|
|
||||||
// Return the identifier that should be sent as the
|
|
||||||
// openid.identity_url parameter to the server.
|
|
||||||
if ($this->local_id === null && $this->canonicalID === null) {
|
|
||||||
return $this->claimed_id;
|
|
||||||
} else {
|
|
||||||
if ($this->local_id) {
|
|
||||||
return $this->local_id;
|
|
||||||
} else {
|
|
||||||
return $this->canonicalID;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function fromHTML($uri, $html)
|
|
||||||
{
|
|
||||||
$discovery_types = array(
|
|
||||||
array(Auth_OpenID_TYPE_2_0,
|
|
||||||
'openid2.provider', 'openid2.local_id'),
|
|
||||||
array(Auth_OpenID_TYPE_1_1,
|
|
||||||
'openid.server', 'openid.delegate')
|
|
||||||
);
|
|
||||||
|
|
||||||
$services = array();
|
|
||||||
|
|
||||||
foreach ($discovery_types as $triple) {
|
|
||||||
list($type_uri, $server_rel, $delegate_rel) = $triple;
|
|
||||||
|
|
||||||
$urls = Auth_OpenID_legacy_discover($html, $server_rel,
|
|
||||||
$delegate_rel);
|
|
||||||
|
|
||||||
if ($urls === false) {
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
list($delegate_url, $server_url) = $urls;
|
|
||||||
|
|
||||||
$service = new Auth_OpenID_ServiceEndpoint();
|
|
||||||
$service->claimed_id = $uri;
|
|
||||||
$service->local_id = $delegate_url;
|
|
||||||
$service->server_url = $server_url;
|
|
||||||
$service->type_uris = array($type_uri);
|
|
||||||
|
|
||||||
$services[] = $service;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $services;
|
|
||||||
}
|
|
||||||
|
|
||||||
function copy()
|
|
||||||
{
|
|
||||||
$x = new Auth_OpenID_ServiceEndpoint();
|
|
||||||
|
|
||||||
$x->claimed_id = $this->claimed_id;
|
|
||||||
$x->server_url = $this->server_url;
|
|
||||||
$x->type_uris = $this->type_uris;
|
|
||||||
$x->local_id = $this->local_id;
|
|
||||||
$x->canonicalID = $this->canonicalID;
|
|
||||||
$x->used_yadis = $this->used_yadis;
|
|
||||||
|
|
||||||
return $x;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_findOPLocalIdentifier($service, $type_uris)
|
|
||||||
{
|
|
||||||
// Extract a openid:Delegate value from a Yadis Service element.
|
|
||||||
// If no delegate is found, returns null. Returns false on
|
|
||||||
// discovery failure (when multiple delegate/localID tags have
|
|
||||||
// different values).
|
|
||||||
|
|
||||||
$service->parser->registerNamespace('openid',
|
|
||||||
Auth_OpenID_XMLNS_1_0);
|
|
||||||
|
|
||||||
$service->parser->registerNamespace('xrd',
|
|
||||||
Auth_Yadis_XMLNS_XRD_2_0);
|
|
||||||
|
|
||||||
$parser =& $service->parser;
|
|
||||||
|
|
||||||
$permitted_tags = array();
|
|
||||||
|
|
||||||
if (in_array(Auth_OpenID_TYPE_1_1, $type_uris) ||
|
|
||||||
in_array(Auth_OpenID_TYPE_1_0, $type_uris)) {
|
|
||||||
$permitted_tags[] = 'openid:Delegate';
|
|
||||||
}
|
|
||||||
|
|
||||||
if (in_array(Auth_OpenID_TYPE_2_0, $type_uris)) {
|
|
||||||
$permitted_tags[] = 'xrd:LocalID';
|
|
||||||
}
|
|
||||||
|
|
||||||
$local_id = null;
|
|
||||||
|
|
||||||
foreach ($permitted_tags as $tag_name) {
|
|
||||||
$tags = $service->getElements($tag_name);
|
|
||||||
|
|
||||||
foreach ($tags as $tag) {
|
|
||||||
$content = $parser->content($tag);
|
|
||||||
|
|
||||||
if ($local_id === null) {
|
|
||||||
$local_id = $content;
|
|
||||||
} else if ($local_id != $content) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $local_id;
|
|
||||||
}
|
|
||||||
|
|
||||||
function filter_MatchesAnyOpenIDType(&$service)
|
|
||||||
{
|
|
||||||
$uris = $service->getTypes();
|
|
||||||
|
|
||||||
foreach ($uris as $uri) {
|
|
||||||
if (in_array($uri, Auth_OpenID_getOpenIDTypeURIs())) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_bestMatchingService($service, $preferred_types)
|
|
||||||
{
|
|
||||||
// Return the index of the first matching type, or something
|
|
||||||
// higher if no type matches.
|
|
||||||
//
|
|
||||||
// This provides an ordering in which service elements that
|
|
||||||
// contain a type that comes earlier in the preferred types list
|
|
||||||
// come before service elements that come later. If a service
|
|
||||||
// element has more than one type, the most preferred one wins.
|
|
||||||
|
|
||||||
foreach ($preferred_types as $index => $typ) {
|
|
||||||
if (in_array($typ, $service->type_uris)) {
|
|
||||||
return $index;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return count($preferred_types);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_arrangeByType($service_list, $preferred_types)
|
|
||||||
{
|
|
||||||
// Rearrange service_list in a new list so services are ordered by
|
|
||||||
// types listed in preferred_types. Return the new list.
|
|
||||||
|
|
||||||
// Build a list with the service elements in tuples whose
|
|
||||||
// comparison will prefer the one with the best matching service
|
|
||||||
$prio_services = array();
|
|
||||||
foreach ($service_list as $index => $service) {
|
|
||||||
$prio_services[] = array(Auth_OpenID_bestMatchingService($service,
|
|
||||||
$preferred_types),
|
|
||||||
$index, $service);
|
|
||||||
}
|
|
||||||
|
|
||||||
sort($prio_services);
|
|
||||||
|
|
||||||
// Now that the services are sorted by priority, remove the sort
|
|
||||||
// keys from the list.
|
|
||||||
foreach ($prio_services as $index => $s) {
|
|
||||||
$prio_services[$index] = $prio_services[$index][2];
|
|
||||||
}
|
|
||||||
|
|
||||||
return $prio_services;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Extract OP Identifier services. If none found, return the rest,
|
|
||||||
// sorted with most preferred first according to
|
|
||||||
// OpenIDServiceEndpoint.openid_type_uris.
|
|
||||||
//
|
|
||||||
// openid_services is a list of OpenIDServiceEndpoint objects.
|
|
||||||
//
|
|
||||||
// Returns a list of OpenIDServiceEndpoint objects."""
|
|
||||||
function Auth_OpenID_getOPOrUserServices($openid_services)
|
|
||||||
{
|
|
||||||
$op_services = Auth_OpenID_arrangeByType($openid_services,
|
|
||||||
array(Auth_OpenID_TYPE_2_0_IDP));
|
|
||||||
|
|
||||||
$openid_services = Auth_OpenID_arrangeByType($openid_services,
|
|
||||||
Auth_OpenID_getOpenIDTypeURIs());
|
|
||||||
|
|
||||||
if ($op_services) {
|
|
||||||
return $op_services;
|
|
||||||
} else {
|
|
||||||
return $openid_services;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_makeOpenIDEndpoints($uri, $yadis_services)
|
|
||||||
{
|
|
||||||
$s = array();
|
|
||||||
|
|
||||||
if (!$yadis_services) {
|
|
||||||
return $s;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($yadis_services as $service) {
|
|
||||||
$type_uris = $service->getTypes();
|
|
||||||
$uris = $service->getURIs();
|
|
||||||
|
|
||||||
// If any Type URIs match and there is an endpoint URI
|
|
||||||
// specified, then this is an OpenID endpoint
|
|
||||||
if ($type_uris &&
|
|
||||||
$uris) {
|
|
||||||
foreach ($uris as $service_uri) {
|
|
||||||
$openid_endpoint = new Auth_OpenID_ServiceEndpoint();
|
|
||||||
if ($openid_endpoint->parseService($uri,
|
|
||||||
$service_uri,
|
|
||||||
$type_uris,
|
|
||||||
$service)) {
|
|
||||||
$s[] = $openid_endpoint;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $s;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_discoverWithYadis($uri, &$fetcher)
|
|
||||||
{
|
|
||||||
// Discover OpenID services for a URI. Tries Yadis and falls back
|
|
||||||
// on old-style <link rel='...'> discovery if Yadis fails.
|
|
||||||
|
|
||||||
// Might raise a yadis.discover.DiscoveryFailure if no document
|
|
||||||
// came back for that URI at all. I don't think falling back to
|
|
||||||
// OpenID 1.0 discovery on the same URL will help, so don't bother
|
|
||||||
// to catch it.
|
|
||||||
$openid_services = array();
|
|
||||||
$response = Auth_Yadis_Yadis::discover($uri, $fetcher);
|
|
||||||
$yadis_url = $response->normalized_uri;
|
|
||||||
$yadis_services = array();
|
|
||||||
|
|
||||||
if ($response->isFailure()) {
|
|
||||||
return array($uri, array());
|
|
||||||
}
|
|
||||||
|
|
||||||
$xrds =& Auth_Yadis_XRDS::parseXRDS($response->response_text);
|
|
||||||
|
|
||||||
if ($xrds) {
|
|
||||||
$yadis_services =
|
|
||||||
$xrds->services(array('filter_MatchesAnyOpenIDType'));
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$yadis_services) {
|
|
||||||
if ($response->isXRDS()) {
|
|
||||||
return Auth_OpenID_discoverWithoutYadis($uri,
|
|
||||||
$fetcher);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Try to parse the response as HTML to get OpenID 1.0/1.1
|
|
||||||
// <link rel="...">
|
|
||||||
$openid_services = Auth_OpenID_ServiceEndpoint::fromHTML(
|
|
||||||
$yadis_url,
|
|
||||||
$response->response_text);
|
|
||||||
} else {
|
|
||||||
$openid_services = Auth_OpenID_makeOpenIDEndpoints($yadis_url,
|
|
||||||
$yadis_services);
|
|
||||||
}
|
|
||||||
|
|
||||||
$openid_services = Auth_OpenID_getOPOrUserServices($openid_services);
|
|
||||||
return array($yadis_url, $openid_services);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_discoverURI($uri, &$fetcher)
|
|
||||||
{
|
|
||||||
$parsed = parse_url($uri);
|
|
||||||
|
|
||||||
if ($parsed && isset($parsed['scheme']) &&
|
|
||||||
isset($parsed['host'])) {
|
|
||||||
if (!in_array($parsed['scheme'], array('http', 'https'))) {
|
|
||||||
// raise DiscoveryFailure('URI scheme is not HTTP or HTTPS', None)
|
|
||||||
return array($uri, array());
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$uri = 'http://' . $uri;
|
|
||||||
}
|
|
||||||
|
|
||||||
$uri = Auth_OpenID::normalizeUrl($uri);
|
|
||||||
return Auth_OpenID_discoverWithYadis($uri,
|
|
||||||
$fetcher);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_discoverWithoutYadis($uri, &$fetcher)
|
|
||||||
{
|
|
||||||
$http_resp = @$fetcher->get($uri);
|
|
||||||
|
|
||||||
if ($http_resp->status != 200) {
|
|
||||||
return array($uri, array());
|
|
||||||
}
|
|
||||||
|
|
||||||
$identity_url = $http_resp->final_url;
|
|
||||||
|
|
||||||
// Try to parse the response as HTML to get OpenID 1.0/1.1 <link
|
|
||||||
// rel="...">
|
|
||||||
$openid_services = Auth_OpenID_ServiceEndpoint::fromHTML(
|
|
||||||
$identity_url,
|
|
||||||
$http_resp->body);
|
|
||||||
|
|
||||||
return array($identity_url, $openid_services);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_discoverXRI($iname, &$fetcher)
|
|
||||||
{
|
|
||||||
$resolver = new Auth_Yadis_ProxyResolver($fetcher);
|
|
||||||
list($canonicalID, $yadis_services) =
|
|
||||||
$resolver->query($iname,
|
|
||||||
Auth_OpenID_getOpenIDTypeURIs(),
|
|
||||||
array('filter_MatchesAnyOpenIDType'));
|
|
||||||
|
|
||||||
$openid_services = Auth_OpenID_makeOpenIDEndpoints($iname,
|
|
||||||
$yadis_services);
|
|
||||||
|
|
||||||
$openid_services = Auth_OpenID_getOPOrUserServices($openid_services);
|
|
||||||
|
|
||||||
for ($i = 0; $i < count($openid_services); $i++) {
|
|
||||||
$openid_services[$i]->canonicalID = $canonicalID;
|
|
||||||
$openid_services[$i]->claimed_id = $canonicalID;
|
|
||||||
}
|
|
||||||
|
|
||||||
// FIXME: returned xri should probably be in some normal form
|
|
||||||
return array($iname, $openid_services);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_discover($uri, &$fetcher)
|
|
||||||
{
|
|
||||||
// If the fetcher (i.e., PHP) doesn't support SSL, we can't do
|
|
||||||
// discovery on an HTTPS URL.
|
|
||||||
if ($fetcher->isHTTPS($uri) && !$fetcher->supportsSSL()) {
|
|
||||||
return array($uri, array());
|
|
||||||
}
|
|
||||||
|
|
||||||
if (Auth_Yadis_identifierScheme($uri) == 'XRI') {
|
|
||||||
$result = Auth_OpenID_discoverXRI($uri, $fetcher);
|
|
||||||
} else {
|
|
||||||
$result = Auth_OpenID_discoverURI($uri, $fetcher);
|
|
||||||
}
|
|
||||||
|
|
||||||
// If the fetcher doesn't support SSL, we can't interact with
|
|
||||||
// HTTPS server URLs; remove those endpoints from the list.
|
|
||||||
if (!$fetcher->supportsSSL()) {
|
|
||||||
$http_endpoints = array();
|
|
||||||
list($new_uri, $endpoints) = $result;
|
|
||||||
|
|
||||||
foreach ($endpoints as $e) {
|
|
||||||
if (!$fetcher->isHTTPS($e->server_url)) {
|
|
||||||
$http_endpoints[] = $e;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$result = array($new_uri, $http_endpoints);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,100 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This file supplies a dumb store backend for OpenID servers and
|
|
||||||
* consumers.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Import the interface for creating a new store class.
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID/Interface.php';
|
|
||||||
require_once 'Auth/OpenID/HMACSHA1.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is a store for use in the worst case, when you have no way of
|
|
||||||
* saving state on the consumer site. Using this store makes the
|
|
||||||
* consumer vulnerable to replay attacks, as it's unable to use
|
|
||||||
* nonces. Avoid using this store if it is at all possible.
|
|
||||||
*
|
|
||||||
* Most of the methods of this class are implementation details.
|
|
||||||
* Users of this class need to worry only about the constructor.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_DumbStore extends Auth_OpenID_OpenIDStore {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates a new {@link Auth_OpenID_DumbStore} instance. For the security
|
|
||||||
* of the tokens generated by the library, this class attempts to
|
|
||||||
* at least have a secure implementation of getAuthKey.
|
|
||||||
*
|
|
||||||
* When you create an instance of this class, pass in a secret
|
|
||||||
* phrase. The phrase is hashed with sha1 to make it the correct
|
|
||||||
* length and form for an auth key. That allows you to use a long
|
|
||||||
* string as the secret phrase, which means you can make it very
|
|
||||||
* difficult to guess.
|
|
||||||
*
|
|
||||||
* Each {@link Auth_OpenID_DumbStore} instance that is created for use by
|
|
||||||
* your consumer site needs to use the same $secret_phrase.
|
|
||||||
*
|
|
||||||
* @param string secret_phrase The phrase used to create the auth
|
|
||||||
* key returned by getAuthKey
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_DumbStore($secret_phrase)
|
|
||||||
{
|
|
||||||
$this->auth_key = Auth_OpenID_SHA1($secret_phrase);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This implementation does nothing.
|
|
||||||
*/
|
|
||||||
function storeAssociation($server_url, $association)
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This implementation always returns null.
|
|
||||||
*/
|
|
||||||
function getAssociation($server_url, $handle = null)
|
|
||||||
{
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This implementation always returns false.
|
|
||||||
*/
|
|
||||||
function removeAssociation($server_url, $handle)
|
|
||||||
{
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* In a system truly limited to dumb mode, nonces must all be
|
|
||||||
* accepted. This therefore always returns true, which makes
|
|
||||||
* replay attacks feasible.
|
|
||||||
*/
|
|
||||||
function useNonce($server_url, $timestamp, $salt)
|
|
||||||
{
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This method returns the auth key generated by the constructor.
|
|
||||||
*/
|
|
||||||
function getAuthKey()
|
|
||||||
{
|
|
||||||
return $this->auth_key;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,58 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An interface for OpenID extensions.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the Message implementation.
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID/Message.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A base class for accessing extension request and response data for
|
|
||||||
* the OpenID 2 protocol.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_Extension {
|
|
||||||
/**
|
|
||||||
* ns_uri: The namespace to which to add the arguments for this
|
|
||||||
* extension
|
|
||||||
*/
|
|
||||||
var $ns_uri = null;
|
|
||||||
var $ns_alias = null;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get the string arguments that should be added to an OpenID
|
|
||||||
* message for this extension.
|
|
||||||
*/
|
|
||||||
function getExtensionArgs()
|
|
||||||
{
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Add the arguments from this extension to the provided message.
|
|
||||||
*
|
|
||||||
* Returns the message with the extension arguments added.
|
|
||||||
*/
|
|
||||||
function toMessage(&$message)
|
|
||||||
{
|
|
||||||
if ($message->namespaces->addAlias($this->ns_uri,
|
|
||||||
$this->ns_alias) === null) {
|
|
||||||
if ($message->namespaces->getAlias($this->ns_uri) !=
|
|
||||||
$this->ns_alias) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$message->updateArgs($this->ns_uri,
|
|
||||||
$this->getExtensionArgs());
|
|
||||||
return $message;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,589 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This file supplies a Memcached store backend for OpenID servers and
|
|
||||||
* consumers.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require base class for creating a new interface.
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID.php';
|
|
||||||
require_once 'Auth/OpenID/Interface.php';
|
|
||||||
require_once 'Auth/OpenID/HMACSHA1.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is a filesystem-based store for OpenID associations and
|
|
||||||
* nonces. This store should be safe for use in concurrent systems on
|
|
||||||
* both windows and unix (excluding NFS filesystems). There are a
|
|
||||||
* couple race conditions in the system, but those failure cases have
|
|
||||||
* been set up in such a way that the worst-case behavior is someone
|
|
||||||
* having to try to log in a second time.
|
|
||||||
*
|
|
||||||
* Most of the methods of this class are implementation details.
|
|
||||||
* People wishing to just use this store need only pay attention to
|
|
||||||
* the constructor.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_FileStore extends Auth_OpenID_OpenIDStore {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Initializes a new {@link Auth_OpenID_FileStore}. This
|
|
||||||
* initializes the nonce and association directories, which are
|
|
||||||
* subdirectories of the directory passed in.
|
|
||||||
*
|
|
||||||
* @param string $directory This is the directory to put the store
|
|
||||||
* directories in.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_FileStore($directory)
|
|
||||||
{
|
|
||||||
if (!Auth_OpenID::ensureDir($directory)) {
|
|
||||||
trigger_error('Not a directory and failed to create: '
|
|
||||||
. $directory, E_USER_ERROR);
|
|
||||||
}
|
|
||||||
$directory = realpath($directory);
|
|
||||||
|
|
||||||
$this->directory = $directory;
|
|
||||||
$this->active = true;
|
|
||||||
|
|
||||||
$this->nonce_dir = $directory . DIRECTORY_SEPARATOR . 'nonces';
|
|
||||||
|
|
||||||
$this->association_dir = $directory . DIRECTORY_SEPARATOR .
|
|
||||||
'associations';
|
|
||||||
|
|
||||||
// Temp dir must be on the same filesystem as the assciations
|
|
||||||
// $directory.
|
|
||||||
$this->temp_dir = $directory . DIRECTORY_SEPARATOR . 'temp';
|
|
||||||
|
|
||||||
$this->max_nonce_age = 6 * 60 * 60; // Six hours, in seconds
|
|
||||||
|
|
||||||
if (!$this->_setup()) {
|
|
||||||
trigger_error('Failed to initialize OpenID file store in ' .
|
|
||||||
$directory, E_USER_ERROR);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function destroy()
|
|
||||||
{
|
|
||||||
Auth_OpenID_FileStore::_rmtree($this->directory);
|
|
||||||
$this->active = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Make sure that the directories in which we store our data
|
|
||||||
* exist.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _setup()
|
|
||||||
{
|
|
||||||
return (Auth_OpenID::ensureDir($this->nonce_dir) &&
|
|
||||||
Auth_OpenID::ensureDir($this->association_dir) &&
|
|
||||||
Auth_OpenID::ensureDir($this->temp_dir));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create a temporary file on the same filesystem as
|
|
||||||
* $this->association_dir.
|
|
||||||
*
|
|
||||||
* The temporary directory should not be cleaned if there are any
|
|
||||||
* processes using the store. If there is no active process using
|
|
||||||
* the store, it is safe to remove all of the files in the
|
|
||||||
* temporary directory.
|
|
||||||
*
|
|
||||||
* @return array ($fd, $filename)
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _mktemp()
|
|
||||||
{
|
|
||||||
$name = Auth_OpenID_FileStore::_mkstemp($dir = $this->temp_dir);
|
|
||||||
$file_obj = @fopen($name, 'wb');
|
|
||||||
if ($file_obj !== false) {
|
|
||||||
return array($file_obj, $name);
|
|
||||||
} else {
|
|
||||||
Auth_OpenID_FileStore::_removeIfPresent($name);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create a unique filename for a given server url and
|
|
||||||
* handle. This implementation does not assume anything about the
|
|
||||||
* format of the handle. The filename that is returned will
|
|
||||||
* contain the domain name from the server URL for ease of human
|
|
||||||
* inspection of the data directory.
|
|
||||||
*
|
|
||||||
* @return string $filename
|
|
||||||
*/
|
|
||||||
function getAssociationFilename($server_url, $handle)
|
|
||||||
{
|
|
||||||
if (!$this->active) {
|
|
||||||
trigger_error("FileStore no longer active", E_USER_ERROR);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (strpos($server_url, '://') === false) {
|
|
||||||
trigger_error(sprintf("Bad server URL: %s", $server_url),
|
|
||||||
E_USER_WARNING);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
list($proto, $rest) = explode('://', $server_url, 2);
|
|
||||||
$parts = explode('/', $rest);
|
|
||||||
$domain = Auth_OpenID_FileStore::_filenameEscape($parts[0]);
|
|
||||||
$url_hash = Auth_OpenID_FileStore::_safe64($server_url);
|
|
||||||
if ($handle) {
|
|
||||||
$handle_hash = Auth_OpenID_FileStore::_safe64($handle);
|
|
||||||
} else {
|
|
||||||
$handle_hash = '';
|
|
||||||
}
|
|
||||||
|
|
||||||
$filename = sprintf('%s-%s-%s-%s', $proto, $domain, $url_hash,
|
|
||||||
$handle_hash);
|
|
||||||
|
|
||||||
return $this->association_dir. DIRECTORY_SEPARATOR . $filename;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Store an association in the association directory.
|
|
||||||
*/
|
|
||||||
function storeAssociation($server_url, $association)
|
|
||||||
{
|
|
||||||
if (!$this->active) {
|
|
||||||
trigger_error("FileStore no longer active", E_USER_ERROR);
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$association_s = $association->serialize();
|
|
||||||
$filename = $this->getAssociationFilename($server_url,
|
|
||||||
$association->handle);
|
|
||||||
list($tmp_file, $tmp) = $this->_mktemp();
|
|
||||||
|
|
||||||
if (!$tmp_file) {
|
|
||||||
trigger_error("_mktemp didn't return a valid file descriptor",
|
|
||||||
E_USER_WARNING);
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
fwrite($tmp_file, $association_s);
|
|
||||||
|
|
||||||
fflush($tmp_file);
|
|
||||||
|
|
||||||
fclose($tmp_file);
|
|
||||||
|
|
||||||
if (@rename($tmp, $filename)) {
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
// In case we are running on Windows, try unlinking the
|
|
||||||
// file in case it exists.
|
|
||||||
@unlink($filename);
|
|
||||||
|
|
||||||
// Now the target should not exist. Try renaming again,
|
|
||||||
// giving up if it fails.
|
|
||||||
if (@rename($tmp, $filename)) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// If there was an error, don't leave the temporary file
|
|
||||||
// around.
|
|
||||||
Auth_OpenID_FileStore::_removeIfPresent($tmp);
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Retrieve an association. If no handle is specified, return the
|
|
||||||
* association with the most recent issue time.
|
|
||||||
*
|
|
||||||
* @return mixed $association
|
|
||||||
*/
|
|
||||||
function getAssociation($server_url, $handle = null)
|
|
||||||
{
|
|
||||||
if (!$this->active) {
|
|
||||||
trigger_error("FileStore no longer active", E_USER_ERROR);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($handle === null) {
|
|
||||||
$handle = '';
|
|
||||||
}
|
|
||||||
|
|
||||||
// The filename with the empty handle is a prefix of all other
|
|
||||||
// associations for the given server URL.
|
|
||||||
$filename = $this->getAssociationFilename($server_url, $handle);
|
|
||||||
|
|
||||||
if ($handle) {
|
|
||||||
return $this->_getAssociation($filename);
|
|
||||||
} else {
|
|
||||||
$association_files =
|
|
||||||
Auth_OpenID_FileStore::_listdir($this->association_dir);
|
|
||||||
$matching_files = array();
|
|
||||||
|
|
||||||
// strip off the path to do the comparison
|
|
||||||
$name = basename($filename);
|
|
||||||
foreach ($association_files as $association_file) {
|
|
||||||
if (strpos($association_file, $name) === 0) {
|
|
||||||
$matching_files[] = $association_file;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$matching_associations = array();
|
|
||||||
// read the matching files and sort by time issued
|
|
||||||
foreach ($matching_files as $name) {
|
|
||||||
$full_name = $this->association_dir . DIRECTORY_SEPARATOR .
|
|
||||||
$name;
|
|
||||||
$association = $this->_getAssociation($full_name);
|
|
||||||
if ($association !== null) {
|
|
||||||
$matching_associations[] = array($association->issued,
|
|
||||||
$association);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$issued = array();
|
|
||||||
$assocs = array();
|
|
||||||
foreach ($matching_associations as $key => $assoc) {
|
|
||||||
$issued[$key] = $assoc[0];
|
|
||||||
$assocs[$key] = $assoc[1];
|
|
||||||
}
|
|
||||||
|
|
||||||
array_multisort($issued, SORT_DESC, $assocs, SORT_DESC,
|
|
||||||
$matching_associations);
|
|
||||||
|
|
||||||
// return the most recently issued one.
|
|
||||||
if ($matching_associations) {
|
|
||||||
list($issued, $assoc) = $matching_associations[0];
|
|
||||||
return $assoc;
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _getAssociation($filename)
|
|
||||||
{
|
|
||||||
if (!$this->active) {
|
|
||||||
trigger_error("FileStore no longer active", E_USER_ERROR);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$assoc_file = @fopen($filename, 'rb');
|
|
||||||
|
|
||||||
if ($assoc_file === false) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$assoc_s = fread($assoc_file, filesize($filename));
|
|
||||||
fclose($assoc_file);
|
|
||||||
|
|
||||||
if (!$assoc_s) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$association =
|
|
||||||
Auth_OpenID_Association::deserialize('Auth_OpenID_Association',
|
|
||||||
$assoc_s);
|
|
||||||
|
|
||||||
if (!$association) {
|
|
||||||
Auth_OpenID_FileStore::_removeIfPresent($filename);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($association->getExpiresIn() == 0) {
|
|
||||||
Auth_OpenID_FileStore::_removeIfPresent($filename);
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
return $association;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Remove an association if it exists. Do nothing if it does not.
|
|
||||||
*
|
|
||||||
* @return bool $success
|
|
||||||
*/
|
|
||||||
function removeAssociation($server_url, $handle)
|
|
||||||
{
|
|
||||||
if (!$this->active) {
|
|
||||||
trigger_error("FileStore no longer active", E_USER_ERROR);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$assoc = $this->getAssociation($server_url, $handle);
|
|
||||||
if ($assoc === null) {
|
|
||||||
return false;
|
|
||||||
} else {
|
|
||||||
$filename = $this->getAssociationFilename($server_url, $handle);
|
|
||||||
return Auth_OpenID_FileStore::_removeIfPresent($filename);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return whether this nonce is present. As a side effect, mark it
|
|
||||||
* as no longer present.
|
|
||||||
*
|
|
||||||
* @return bool $present
|
|
||||||
*/
|
|
||||||
function useNonce($server_url, $timestamp, $salt)
|
|
||||||
{
|
|
||||||
if (!$this->active) {
|
|
||||||
trigger_error("FileStore no longer active", E_USER_ERROR);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($server_url) {
|
|
||||||
list($proto, $rest) = explode('://', $server_url, 2);
|
|
||||||
} else {
|
|
||||||
$proto = '';
|
|
||||||
$rest = '';
|
|
||||||
}
|
|
||||||
|
|
||||||
$parts = explode('/', $rest, 2);
|
|
||||||
$domain = $this->_filenameEscape($parts[0]);
|
|
||||||
$url_hash = $this->_safe64($server_url);
|
|
||||||
$salt_hash = $this->_safe64($salt);
|
|
||||||
|
|
||||||
$filename = sprintf('%08x-%s-%s-%s-%s', $timestamp, $proto,
|
|
||||||
$domain, $url_hash, $salt_hash);
|
|
||||||
$filename = $this->nonce_dir . DIRECTORY_SEPARATOR . $filename;
|
|
||||||
|
|
||||||
$result = @fopen($filename, 'x');
|
|
||||||
|
|
||||||
if ($result === false) {
|
|
||||||
return false;
|
|
||||||
} else {
|
|
||||||
fclose($result);
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Remove expired entries from the database. This is potentially
|
|
||||||
* expensive, so only run when it is acceptable to take time.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _allAssocs()
|
|
||||||
{
|
|
||||||
$all_associations = array();
|
|
||||||
|
|
||||||
$association_filenames =
|
|
||||||
Auth_OpenID_FileStore::_listdir($this->association_dir);
|
|
||||||
|
|
||||||
foreach ($association_filenames as $association_filename) {
|
|
||||||
$association_file = fopen($association_filename, 'rb');
|
|
||||||
|
|
||||||
if ($association_file !== false) {
|
|
||||||
$assoc_s = fread($association_file,
|
|
||||||
filesize($association_filename));
|
|
||||||
fclose($association_file);
|
|
||||||
|
|
||||||
// Remove expired or corrupted associations
|
|
||||||
$association =
|
|
||||||
Auth_OpenID_Association::deserialize(
|
|
||||||
'Auth_OpenID_Association', $assoc_s);
|
|
||||||
|
|
||||||
if ($association === null) {
|
|
||||||
Auth_OpenID_FileStore::_removeIfPresent(
|
|
||||||
$association_filename);
|
|
||||||
} else {
|
|
||||||
if ($association->getExpiresIn() == 0) {
|
|
||||||
$all_associations[] = array($association_filename,
|
|
||||||
$association);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $all_associations;
|
|
||||||
}
|
|
||||||
|
|
||||||
function clean()
|
|
||||||
{
|
|
||||||
if (!$this->active) {
|
|
||||||
trigger_error("FileStore no longer active", E_USER_ERROR);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$nonces = Auth_OpenID_FileStore::_listdir($this->nonce_dir);
|
|
||||||
$now = time();
|
|
||||||
|
|
||||||
// Check all nonces for expiry
|
|
||||||
foreach ($nonces as $nonce) {
|
|
||||||
if (!Auth_OpenID_checkTimestamp($nonce, $now)) {
|
|
||||||
$filename = $this->nonce_dir . DIRECTORY_SEPARATOR . $nonce;
|
|
||||||
Auth_OpenID_FileStore::_removeIfPresent($filename);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($this->_allAssocs() as $pair) {
|
|
||||||
list($assoc_filename, $assoc) = $pair;
|
|
||||||
if ($assoc->getExpiresIn() == 0) {
|
|
||||||
Auth_OpenID_FileStore::_removeIfPresent($assoc_filename);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function getExpired()
|
|
||||||
{
|
|
||||||
$urls = array();
|
|
||||||
foreach ($this->_allAssocs() as $pair) {
|
|
||||||
list($_, $assoc) = $pair;
|
|
||||||
if ($assoc->getExpiresIn() <= 0) {
|
|
||||||
$urls[] = $assoc->server_url;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return $urls;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _rmtree($dir)
|
|
||||||
{
|
|
||||||
if ($dir[strlen($dir) - 1] != DIRECTORY_SEPARATOR) {
|
|
||||||
$dir .= DIRECTORY_SEPARATOR;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($handle = opendir($dir)) {
|
|
||||||
while ($item = readdir($handle)) {
|
|
||||||
if (!in_array($item, array('.', '..'))) {
|
|
||||||
if (is_dir($dir . $item)) {
|
|
||||||
|
|
||||||
if (!Auth_OpenID_FileStore::_rmtree($dir . $item)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} else if (is_file($dir . $item)) {
|
|
||||||
if (!unlink($dir . $item)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
closedir($handle);
|
|
||||||
|
|
||||||
if (!@rmdir($dir)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
// Couldn't open directory.
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _mkstemp($dir)
|
|
||||||
{
|
|
||||||
foreach (range(0, 4) as $i) {
|
|
||||||
$name = tempnam($dir, "php_openid_filestore_");
|
|
||||||
|
|
||||||
if ($name !== false) {
|
|
||||||
return $name;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _mkdtemp($dir)
|
|
||||||
{
|
|
||||||
foreach (range(0, 4) as $i) {
|
|
||||||
$name = $dir . strval(DIRECTORY_SEPARATOR) . strval(getmypid()) .
|
|
||||||
"-" . strval(rand(1, time()));
|
|
||||||
if (!mkdir($name, 0700)) {
|
|
||||||
return false;
|
|
||||||
} else {
|
|
||||||
return $name;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _listdir($dir)
|
|
||||||
{
|
|
||||||
$handle = opendir($dir);
|
|
||||||
$files = array();
|
|
||||||
while (false !== ($filename = readdir($handle))) {
|
|
||||||
if (!in_array($filename, array('.', '..'))) {
|
|
||||||
$files[] = $filename;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return $files;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _isFilenameSafe($char)
|
|
||||||
{
|
|
||||||
$_Auth_OpenID_filename_allowed = Auth_OpenID_letters .
|
|
||||||
Auth_OpenID_digits . ".";
|
|
||||||
return (strpos($_Auth_OpenID_filename_allowed, $char) !== false);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _safe64($str)
|
|
||||||
{
|
|
||||||
$h64 = base64_encode(Auth_OpenID_SHA1($str));
|
|
||||||
$h64 = str_replace('+', '_', $h64);
|
|
||||||
$h64 = str_replace('/', '.', $h64);
|
|
||||||
$h64 = str_replace('=', '', $h64);
|
|
||||||
return $h64;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _filenameEscape($str)
|
|
||||||
{
|
|
||||||
$filename = "";
|
|
||||||
$b = Auth_OpenID::toBytes($str);
|
|
||||||
|
|
||||||
for ($i = 0; $i < count($b); $i++) {
|
|
||||||
$c = $b[$i];
|
|
||||||
if (Auth_OpenID_FileStore::_isFilenameSafe($c)) {
|
|
||||||
$filename .= $c;
|
|
||||||
} else {
|
|
||||||
$filename .= sprintf("_%02X", ord($c));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return $filename;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Attempt to remove a file, returning whether the file existed at
|
|
||||||
* the time of the call.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @return bool $result True if the file was present, false if not.
|
|
||||||
*/
|
|
||||||
function _removeIfPresent($filename)
|
|
||||||
{
|
|
||||||
return @unlink($filename);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,99 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the HMACSHA1 implementation for the OpenID library.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
require_once 'Auth/OpenID.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* SHA1_BLOCKSIZE is this module's SHA1 blocksize used by the fallback
|
|
||||||
* implementation.
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_SHA1_BLOCKSIZE', 64);
|
|
||||||
|
|
||||||
function Auth_OpenID_SHA1($text)
|
|
||||||
{
|
|
||||||
if (function_exists('hash') &&
|
|
||||||
function_exists('hash_algos') &&
|
|
||||||
(in_array('sha1', hash_algos()))) {
|
|
||||||
// PHP 5 case (sometimes): 'hash' available and 'sha1' algo
|
|
||||||
// supported.
|
|
||||||
return hash('sha1', $text, true);
|
|
||||||
} else if (function_exists('sha1')) {
|
|
||||||
// PHP 4 case: 'sha1' available.
|
|
||||||
$hex = sha1($text);
|
|
||||||
$raw = '';
|
|
||||||
for ($i = 0; $i < 40; $i += 2) {
|
|
||||||
$hexcode = substr($hex, $i, 2);
|
|
||||||
$charcode = (int)base_convert($hexcode, 16, 10);
|
|
||||||
$raw .= chr($charcode);
|
|
||||||
}
|
|
||||||
return $raw;
|
|
||||||
} else {
|
|
||||||
// Explode.
|
|
||||||
trigger_error('No SHA1 function found', E_USER_ERROR);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Compute an HMAC/SHA1 hash.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param string $key The HMAC key
|
|
||||||
* @param string $text The message text to hash
|
|
||||||
* @return string $mac The MAC
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_HMACSHA1($key, $text)
|
|
||||||
{
|
|
||||||
if (Auth_OpenID::bytes($key) > Auth_OpenID_SHA1_BLOCKSIZE) {
|
|
||||||
$key = Auth_OpenID_SHA1($key, true);
|
|
||||||
}
|
|
||||||
|
|
||||||
$key = str_pad($key, Auth_OpenID_SHA1_BLOCKSIZE, chr(0x00));
|
|
||||||
$ipad = str_repeat(chr(0x36), Auth_OpenID_SHA1_BLOCKSIZE);
|
|
||||||
$opad = str_repeat(chr(0x5c), Auth_OpenID_SHA1_BLOCKSIZE);
|
|
||||||
$hash1 = Auth_OpenID_SHA1(($key ^ $ipad) . $text, true);
|
|
||||||
$hmac = Auth_OpenID_SHA1(($key ^ $opad) . $hash1, true);
|
|
||||||
return $hmac;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (function_exists('hash') &&
|
|
||||||
function_exists('hash_algos') &&
|
|
||||||
(in_array('sha256', hash_algos()))) {
|
|
||||||
function Auth_OpenID_SHA256($text)
|
|
||||||
{
|
|
||||||
// PHP 5 case: 'hash' available and 'sha256' algo supported.
|
|
||||||
return hash('sha256', $text, true);
|
|
||||||
}
|
|
||||||
define('Auth_OpenID_SHA256_SUPPORTED', true);
|
|
||||||
} else {
|
|
||||||
define('Auth_OpenID_SHA256_SUPPORTED', false);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (function_exists('hash_hmac') &&
|
|
||||||
function_exists('hash_algos') &&
|
|
||||||
(in_array('sha256', hash_algos()))) {
|
|
||||||
|
|
||||||
function Auth_OpenID_HMACSHA256($key, $text)
|
|
||||||
{
|
|
||||||
// Return raw MAC (not hex string).
|
|
||||||
return hash_hmac('sha256', $key, $text, true);
|
|
||||||
}
|
|
||||||
|
|
||||||
define('Auth_OpenID_HMACSHA256_SUPPORTED', true);
|
|
||||||
} else {
|
|
||||||
define('Auth_OpenID_HMACSHA256_SUPPORTED', false);
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,152 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This file specifies the interface for PHP OpenID store implementations.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the interface for the store objects the OpenID library
|
|
||||||
* uses. It is a single class that provides all of the persistence
|
|
||||||
* mechanisms that the OpenID library needs, for both servers and
|
|
||||||
* consumers. If you want to create an SQL-driven store, please see
|
|
||||||
* then {@link Auth_OpenID_SQLStore} class.
|
|
||||||
*
|
|
||||||
* Change: Version 2.0 removed the storeNonce and getAuthKey methods,
|
|
||||||
* and changed the behavior of the useNonce method to support one-way
|
|
||||||
* nonces.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_OpenIDStore {
|
|
||||||
/**
|
|
||||||
* This method puts an Association object into storage,
|
|
||||||
* retrievable by server URL and handle.
|
|
||||||
*
|
|
||||||
* @param string $server_url The URL of the identity server that
|
|
||||||
* this association is with. Because of the way the server portion
|
|
||||||
* of the library uses this interface, don't assume there are any
|
|
||||||
* limitations on the character set of the input string. In
|
|
||||||
* particular, expect to see unescaped non-url-safe characters in
|
|
||||||
* the server_url field.
|
|
||||||
*
|
|
||||||
* @param Association $association The Association to store.
|
|
||||||
*/
|
|
||||||
function storeAssociation($server_url, $association)
|
|
||||||
{
|
|
||||||
trigger_error("Auth_OpenID_OpenIDStore::storeAssociation ".
|
|
||||||
"not implemented", E_USER_ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This method returns an Association object from storage that
|
|
||||||
* matches the server URL and, if specified, handle. It returns
|
|
||||||
* null if no such association is found or if the matching
|
|
||||||
* association is expired.
|
|
||||||
*
|
|
||||||
* If no handle is specified, the store may return any association
|
|
||||||
* which matches the server URL. If multiple associations are
|
|
||||||
* valid, the recommended return value for this method is the one
|
|
||||||
* that will remain valid for the longest duration.
|
|
||||||
*
|
|
||||||
* This method is allowed (and encouraged) to garbage collect
|
|
||||||
* expired associations when found. This method must not return
|
|
||||||
* expired associations.
|
|
||||||
*
|
|
||||||
* @param string $server_url The URL of the identity server to get
|
|
||||||
* the association for. Because of the way the server portion of
|
|
||||||
* the library uses this interface, don't assume there are any
|
|
||||||
* limitations on the character set of the input string. In
|
|
||||||
* particular, expect to see unescaped non-url-safe characters in
|
|
||||||
* the server_url field.
|
|
||||||
*
|
|
||||||
* @param mixed $handle This optional parameter is the handle of
|
|
||||||
* the specific association to get. If no specific handle is
|
|
||||||
* provided, any valid association matching the server URL is
|
|
||||||
* returned.
|
|
||||||
*
|
|
||||||
* @return Association The Association for the given identity
|
|
||||||
* server.
|
|
||||||
*/
|
|
||||||
function getAssociation($server_url, $handle = null)
|
|
||||||
{
|
|
||||||
trigger_error("Auth_OpenID_OpenIDStore::getAssociation ".
|
|
||||||
"not implemented", E_USER_ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This method removes the matching association if it's found, and
|
|
||||||
* returns whether the association was removed or not.
|
|
||||||
*
|
|
||||||
* @param string $server_url The URL of the identity server the
|
|
||||||
* association to remove belongs to. Because of the way the server
|
|
||||||
* portion of the library uses this interface, don't assume there
|
|
||||||
* are any limitations on the character set of the input
|
|
||||||
* string. In particular, expect to see unescaped non-url-safe
|
|
||||||
* characters in the server_url field.
|
|
||||||
*
|
|
||||||
* @param string $handle This is the handle of the association to
|
|
||||||
* remove. If there isn't an association found that matches both
|
|
||||||
* the given URL and handle, then there was no matching handle
|
|
||||||
* found.
|
|
||||||
*
|
|
||||||
* @return mixed Returns whether or not the given association existed.
|
|
||||||
*/
|
|
||||||
function removeAssociation($server_url, $handle)
|
|
||||||
{
|
|
||||||
trigger_error("Auth_OpenID_OpenIDStore::removeAssociation ".
|
|
||||||
"not implemented", E_USER_ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Called when using a nonce.
|
|
||||||
*
|
|
||||||
* This method should return C{True} if the nonce has not been
|
|
||||||
* used before, and store it for a while to make sure nobody
|
|
||||||
* tries to use the same value again. If the nonce has already
|
|
||||||
* been used, return C{False}.
|
|
||||||
*
|
|
||||||
* Change: In earlier versions, round-trip nonces were used and a
|
|
||||||
* nonce was only valid if it had been previously stored with
|
|
||||||
* storeNonce. Version 2.0 uses one-way nonces, requiring a
|
|
||||||
* different implementation here that does not depend on a
|
|
||||||
* storeNonce call. (storeNonce is no longer part of the
|
|
||||||
* interface.
|
|
||||||
*
|
|
||||||
* @param string $nonce The nonce to use.
|
|
||||||
*
|
|
||||||
* @return bool Whether or not the nonce was valid.
|
|
||||||
*/
|
|
||||||
function useNonce($server_url, $timestamp, $salt)
|
|
||||||
{
|
|
||||||
trigger_error("Auth_OpenID_OpenIDStore::useNonce ".
|
|
||||||
"not implemented", E_USER_ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return all server URLs that have expired associations.
|
|
||||||
*/
|
|
||||||
function getExpired()
|
|
||||||
{
|
|
||||||
trigger_error("Auth_OpenID_OpenIDStore::getExpired ".
|
|
||||||
"not implemented", E_USER_ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Removes all entries from the store; implementation is optional.
|
|
||||||
*/
|
|
||||||
function reset()
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
?>
|
|
@ -1,112 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* OpenID protocol key-value/comma-newline format parsing and
|
|
||||||
* serialization
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Container for key-value/comma-newline OpenID format and parsing
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_KVForm {
|
|
||||||
/**
|
|
||||||
* Convert an OpenID colon/newline separated string into an
|
|
||||||
* associative array
|
|
||||||
*
|
|
||||||
* @static
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function toArray($kvs, $strict=false)
|
|
||||||
{
|
|
||||||
$lines = explode("\n", $kvs);
|
|
||||||
|
|
||||||
$last = array_pop($lines);
|
|
||||||
if ($last !== '') {
|
|
||||||
array_push($lines, $last);
|
|
||||||
if ($strict) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$values = array();
|
|
||||||
|
|
||||||
for ($lineno = 0; $lineno < count($lines); $lineno++) {
|
|
||||||
$line = $lines[$lineno];
|
|
||||||
$kv = explode(':', $line, 2);
|
|
||||||
if (count($kv) != 2) {
|
|
||||||
if ($strict) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
$key = $kv[0];
|
|
||||||
$tkey = trim($key);
|
|
||||||
if ($tkey != $key) {
|
|
||||||
if ($strict) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$value = $kv[1];
|
|
||||||
$tval = trim($value);
|
|
||||||
if ($tval != $value) {
|
|
||||||
if ($strict) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$values[$tkey] = $tval;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $values;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Convert an array into an OpenID colon/newline separated string
|
|
||||||
*
|
|
||||||
* @static
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function fromArray($values)
|
|
||||||
{
|
|
||||||
if ($values === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
ksort($values);
|
|
||||||
|
|
||||||
$serialized = '';
|
|
||||||
foreach ($values as $key => $value) {
|
|
||||||
if (is_array($value)) {
|
|
||||||
list($key, $value) = array($value[0], $value[1]);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (strpos($key, ':') !== false) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (strpos($key, "\n") !== false) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (strpos($value, "\n") !== false) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
$serialized .= "$key:$value\n";
|
|
||||||
}
|
|
||||||
return $serialized;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,884 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Extension argument processing code
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Import tools needed to deal with messages.
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID.php';
|
|
||||||
require_once 'Auth/OpenID/KVForm.php';
|
|
||||||
require_once 'Auth/Yadis/XML.php';
|
|
||||||
|
|
||||||
// This doesn't REALLY belong here, but where is better?
|
|
||||||
define('Auth_OpenID_IDENTIFIER_SELECT',
|
|
||||||
"http://specs.openid.net/auth/2.0/identifier_select");
|
|
||||||
|
|
||||||
// URI for Simple Registration extension, the only commonly deployed
|
|
||||||
// OpenID 1.x extension, and so a special case
|
|
||||||
define('Auth_OpenID_SREG_URI', 'http://openid.net/sreg/1.0');
|
|
||||||
|
|
||||||
// The OpenID 1.X namespace URI
|
|
||||||
define('Auth_OpenID_OPENID1_NS', 'http://openid.net/signon/1.0');
|
|
||||||
|
|
||||||
// The OpenID 2.0 namespace URI
|
|
||||||
define('Auth_OpenID_OPENID2_NS', 'http://specs.openid.net/auth/2.0');
|
|
||||||
|
|
||||||
// The namespace consisting of pairs with keys that are prefixed with
|
|
||||||
// "openid." but not in another namespace.
|
|
||||||
define('Auth_OpenID_NULL_NAMESPACE', 'Null namespace');
|
|
||||||
|
|
||||||
// The null namespace, when it is an allowed OpenID namespace
|
|
||||||
define('Auth_OpenID_OPENID_NS', 'OpenID namespace');
|
|
||||||
|
|
||||||
// The top-level namespace, excluding all pairs with keys that start
|
|
||||||
// with "openid."
|
|
||||||
define('Auth_OpenID_BARE_NS', 'Bare namespace');
|
|
||||||
|
|
||||||
// Sentinel for Message implementation to indicate that getArg should
|
|
||||||
// return null instead of returning a default.
|
|
||||||
define('Auth_OpenID_NO_DEFAULT', 'NO DEFAULT ALLOWED');
|
|
||||||
|
|
||||||
// All OpenID protocol fields. Used to check namespace aliases.
|
|
||||||
global $Auth_OpenID_OPENID_PROTOCOL_FIELDS;
|
|
||||||
$Auth_OpenID_OPENID_PROTOCOL_FIELDS = array(
|
|
||||||
'ns', 'mode', 'error', 'return_to', 'contact', 'reference',
|
|
||||||
'signed', 'assoc_type', 'session_type', 'dh_modulus', 'dh_gen',
|
|
||||||
'dh_consumer_public', 'claimed_id', 'identity', 'realm',
|
|
||||||
'invalidate_handle', 'op_endpoint', 'response_nonce', 'sig',
|
|
||||||
'assoc_handle', 'trust_root', 'openid');
|
|
||||||
|
|
||||||
// Global namespace / alias registration map. See
|
|
||||||
// Auth_OpenID_registerNamespaceAlias.
|
|
||||||
global $Auth_OpenID_registered_aliases;
|
|
||||||
$Auth_OpenID_registered_aliases = array();
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Registers a (namespace URI, alias) mapping in a global namespace
|
|
||||||
* alias map. Raises NamespaceAliasRegistrationError if either the
|
|
||||||
* namespace URI or alias has already been registered with a different
|
|
||||||
* value. This function is required if you want to use a namespace
|
|
||||||
* with an OpenID 1 message.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_registerNamespaceAlias($namespace_uri, $alias)
|
|
||||||
{
|
|
||||||
global $Auth_OpenID_registered_aliases;
|
|
||||||
|
|
||||||
if (Auth_OpenID::arrayGet($Auth_OpenID_registered_aliases,
|
|
||||||
$alias) == $namespace_uri) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (in_array($namespace_uri,
|
|
||||||
array_values($Auth_OpenID_registered_aliases))) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (in_array($alias, array_keys($Auth_OpenID_registered_aliases))) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$Auth_OpenID_registered_aliases[$alias] = $namespace_uri;
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Removes a (namespace_uri, alias) registration from the global
|
|
||||||
* namespace alias map. Returns true if the removal succeeded; false
|
|
||||||
* if not (if the mapping did not exist).
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_removeNamespaceAlias($namespace_uri, $alias)
|
|
||||||
{
|
|
||||||
global $Auth_OpenID_registered_aliases;
|
|
||||||
|
|
||||||
if (Auth_OpenID::arrayGet($Auth_OpenID_registered_aliases,
|
|
||||||
$alias) === $namespace_uri) {
|
|
||||||
unset($Auth_OpenID_registered_aliases[$alias]);
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An Auth_OpenID_Mapping maintains a mapping from arbitrary keys to
|
|
||||||
* arbitrary values. (This is unlike an ordinary PHP array, whose
|
|
||||||
* keys may be only simple scalars.)
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_Mapping {
|
|
||||||
/**
|
|
||||||
* Initialize a mapping. If $classic_array is specified, its keys
|
|
||||||
* and values are used to populate the mapping.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_Mapping($classic_array = null)
|
|
||||||
{
|
|
||||||
$this->keys = array();
|
|
||||||
$this->values = array();
|
|
||||||
|
|
||||||
if (is_array($classic_array)) {
|
|
||||||
foreach ($classic_array as $key => $value) {
|
|
||||||
$this->set($key, $value);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns true if $thing is an Auth_OpenID_Mapping object; false
|
|
||||||
* if not.
|
|
||||||
*/
|
|
||||||
function isA($thing)
|
|
||||||
{
|
|
||||||
return (is_object($thing) &&
|
|
||||||
strtolower(get_class($thing)) == 'auth_openid_mapping');
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an array of the keys in the mapping.
|
|
||||||
*/
|
|
||||||
function keys()
|
|
||||||
{
|
|
||||||
return $this->keys;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an array of values in the mapping.
|
|
||||||
*/
|
|
||||||
function values()
|
|
||||||
{
|
|
||||||
return $this->values;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an array of (key, value) pairs in the mapping.
|
|
||||||
*/
|
|
||||||
function items()
|
|
||||||
{
|
|
||||||
$temp = array();
|
|
||||||
|
|
||||||
for ($i = 0; $i < count($this->keys); $i++) {
|
|
||||||
$temp[] = array($this->keys[$i],
|
|
||||||
$this->values[$i]);
|
|
||||||
}
|
|
||||||
return $temp;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the "length" of the mapping, or the number of keys.
|
|
||||||
*/
|
|
||||||
function len()
|
|
||||||
{
|
|
||||||
return count($this->keys);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Sets a key-value pair in the mapping. If the key already
|
|
||||||
* exists, its value is replaced with the new value.
|
|
||||||
*/
|
|
||||||
function set($key, $value)
|
|
||||||
{
|
|
||||||
$index = array_search($key, $this->keys);
|
|
||||||
|
|
||||||
if ($index !== false) {
|
|
||||||
$this->values[$index] = $value;
|
|
||||||
} else {
|
|
||||||
$this->keys[] = $key;
|
|
||||||
$this->values[] = $value;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Gets a specified value from the mapping, associated with the
|
|
||||||
* specified key. If the key does not exist in the mapping,
|
|
||||||
* $default is returned instead.
|
|
||||||
*/
|
|
||||||
function get($key, $default = null)
|
|
||||||
{
|
|
||||||
$index = array_search($key, $this->keys);
|
|
||||||
|
|
||||||
if ($index !== false) {
|
|
||||||
return $this->values[$index];
|
|
||||||
} else {
|
|
||||||
return $default;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _reflow()
|
|
||||||
{
|
|
||||||
// PHP is broken yet again. Sort the arrays to remove the
|
|
||||||
// hole in the numeric indexes that make up the array.
|
|
||||||
$old_keys = $this->keys;
|
|
||||||
$old_values = $this->values;
|
|
||||||
|
|
||||||
$this->keys = array();
|
|
||||||
$this->values = array();
|
|
||||||
|
|
||||||
foreach ($old_keys as $k) {
|
|
||||||
$this->keys[] = $k;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($old_values as $v) {
|
|
||||||
$this->values[] = $v;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Deletes a key-value pair from the mapping with the specified
|
|
||||||
* key.
|
|
||||||
*/
|
|
||||||
function del($key)
|
|
||||||
{
|
|
||||||
$index = array_search($key, $this->keys);
|
|
||||||
|
|
||||||
if ($index !== false) {
|
|
||||||
unset($this->keys[$index]);
|
|
||||||
unset($this->values[$index]);
|
|
||||||
$this->_reflow();
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns true if the specified value has a key in the mapping;
|
|
||||||
* false if not.
|
|
||||||
*/
|
|
||||||
function contains($value)
|
|
||||||
{
|
|
||||||
return (array_search($value, $this->keys) !== false);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Maintains a bijective map between namespace uris and aliases.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_NamespaceMap {
|
|
||||||
function Auth_OpenID_NamespaceMap()
|
|
||||||
{
|
|
||||||
$this->alias_to_namespace = new Auth_OpenID_Mapping();
|
|
||||||
$this->namespace_to_alias = new Auth_OpenID_Mapping();
|
|
||||||
}
|
|
||||||
|
|
||||||
function getAlias($namespace_uri)
|
|
||||||
{
|
|
||||||
return $this->namespace_to_alias->get($namespace_uri);
|
|
||||||
}
|
|
||||||
|
|
||||||
function getNamespaceURI($alias)
|
|
||||||
{
|
|
||||||
return $this->alias_to_namespace->get($alias);
|
|
||||||
}
|
|
||||||
|
|
||||||
function iterNamespaceURIs()
|
|
||||||
{
|
|
||||||
// Return an iterator over the namespace URIs
|
|
||||||
return $this->namespace_to_alias->keys();
|
|
||||||
}
|
|
||||||
|
|
||||||
function iterAliases()
|
|
||||||
{
|
|
||||||
// Return an iterator over the aliases"""
|
|
||||||
return $this->alias_to_namespace->keys();
|
|
||||||
}
|
|
||||||
|
|
||||||
function iteritems()
|
|
||||||
{
|
|
||||||
return $this->namespace_to_alias->items();
|
|
||||||
}
|
|
||||||
|
|
||||||
function addAlias($namespace_uri, $desired_alias)
|
|
||||||
{
|
|
||||||
// Add an alias from this namespace URI to the desired alias
|
|
||||||
global $Auth_OpenID_OPENID_PROTOCOL_FIELDS;
|
|
||||||
|
|
||||||
// Check that desired_alias is not an openid protocol field as
|
|
||||||
// per the spec.
|
|
||||||
if (in_array($desired_alias, $Auth_OpenID_OPENID_PROTOCOL_FIELDS)) {
|
|
||||||
// "%r is not an allowed namespace alias" % (desired_alias,);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check that desired_alias does not contain a period as per
|
|
||||||
// the spec.
|
|
||||||
if (strpos($desired_alias, '.') !== false) {
|
|
||||||
// "%r must not contain a dot" % (desired_alias,)
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check that there is not a namespace already defined for the
|
|
||||||
// desired alias
|
|
||||||
$current_namespace_uri =
|
|
||||||
$this->alias_to_namespace->get($desired_alias);
|
|
||||||
|
|
||||||
if (($current_namespace_uri !== null) &&
|
|
||||||
($current_namespace_uri != $namespace_uri)) {
|
|
||||||
// Cannot map because previous mapping exists
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check that there is not already a (different) alias for
|
|
||||||
// this namespace URI
|
|
||||||
$alias = $this->namespace_to_alias->get($namespace_uri);
|
|
||||||
|
|
||||||
if (($alias !== null) && ($alias != $desired_alias)) {
|
|
||||||
// fmt = ('Cannot map %r to alias %r. '
|
|
||||||
// 'It is already mapped to alias %r')
|
|
||||||
// raise KeyError(fmt % (namespace_uri, desired_alias, alias))
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
assert((Auth_OpenID_NULL_NAMESPACE === $desired_alias) ||
|
|
||||||
is_string($desired_alias));
|
|
||||||
|
|
||||||
$this->alias_to_namespace->set($desired_alias, $namespace_uri);
|
|
||||||
$this->namespace_to_alias->set($namespace_uri, $desired_alias);
|
|
||||||
|
|
||||||
return $desired_alias;
|
|
||||||
}
|
|
||||||
|
|
||||||
function add($namespace_uri)
|
|
||||||
{
|
|
||||||
// Add this namespace URI to the mapping, without caring what
|
|
||||||
// alias it ends up with
|
|
||||||
|
|
||||||
// See if this namespace is already mapped to an alias
|
|
||||||
$alias = $this->namespace_to_alias->get($namespace_uri);
|
|
||||||
|
|
||||||
if ($alias !== null) {
|
|
||||||
return $alias;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Fall back to generating a numerical alias
|
|
||||||
$i = 0;
|
|
||||||
while (1) {
|
|
||||||
$alias = 'ext' . strval($i);
|
|
||||||
if ($this->addAlias($namespace_uri, $alias) === null) {
|
|
||||||
$i += 1;
|
|
||||||
} else {
|
|
||||||
return $alias;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Should NEVER be reached!
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
function contains($namespace_uri)
|
|
||||||
{
|
|
||||||
return $this->isDefined($namespace_uri);
|
|
||||||
}
|
|
||||||
|
|
||||||
function isDefined($namespace_uri)
|
|
||||||
{
|
|
||||||
return $this->namespace_to_alias->contains($namespace_uri);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* In the implementation of this object, null represents the global
|
|
||||||
* namespace as well as a namespace with no key.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_Message {
|
|
||||||
|
|
||||||
function Auth_OpenID_Message($openid_namespace = null)
|
|
||||||
{
|
|
||||||
// Create an empty Message
|
|
||||||
$this->allowed_openid_namespaces = array(
|
|
||||||
Auth_OpenID_OPENID1_NS,
|
|
||||||
Auth_OpenID_OPENID2_NS);
|
|
||||||
|
|
||||||
$this->args = new Auth_OpenID_Mapping();
|
|
||||||
$this->namespaces = new Auth_OpenID_NamespaceMap();
|
|
||||||
if ($openid_namespace === null) {
|
|
||||||
$this->_openid_ns_uri = null;
|
|
||||||
} else {
|
|
||||||
$this->setOpenIDNamespace($openid_namespace);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function isOpenID1()
|
|
||||||
{
|
|
||||||
return $this->getOpenIDNamespace() == Auth_OpenID_OPENID1_NS;
|
|
||||||
}
|
|
||||||
|
|
||||||
function isOpenID2()
|
|
||||||
{
|
|
||||||
return $this->getOpenIDNamespace() == Auth_OpenID_OPENID2_NS;
|
|
||||||
}
|
|
||||||
|
|
||||||
function fromPostArgs($args)
|
|
||||||
{
|
|
||||||
// Construct a Message containing a set of POST arguments
|
|
||||||
$obj = new Auth_OpenID_Message();
|
|
||||||
|
|
||||||
// Partition into "openid." args and bare args
|
|
||||||
$openid_args = array();
|
|
||||||
foreach ($args as $key => $value) {
|
|
||||||
|
|
||||||
if (is_array($value)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$parts = explode('.', $key, 2);
|
|
||||||
|
|
||||||
if (count($parts) == 2) {
|
|
||||||
list($prefix, $rest) = $parts;
|
|
||||||
} else {
|
|
||||||
$prefix = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($prefix != 'openid') {
|
|
||||||
$obj->args->set(array(Auth_OpenID_BARE_NS, $key), $value);
|
|
||||||
} else {
|
|
||||||
$openid_args[$rest] = $value;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($obj->_fromOpenIDArgs($openid_args)) {
|
|
||||||
return $obj;
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function fromOpenIDArgs($openid_args)
|
|
||||||
{
|
|
||||||
// Takes an array.
|
|
||||||
|
|
||||||
// Construct a Message from a parsed KVForm message
|
|
||||||
$obj = new Auth_OpenID_Message();
|
|
||||||
if ($obj->_fromOpenIDArgs($openid_args)) {
|
|
||||||
return $obj;
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _fromOpenIDArgs($openid_args)
|
|
||||||
{
|
|
||||||
global $Auth_OpenID_registered_aliases;
|
|
||||||
|
|
||||||
// Takes an Auth_OpenID_Mapping instance OR an array.
|
|
||||||
|
|
||||||
if (!Auth_OpenID_Mapping::isA($openid_args)) {
|
|
||||||
$openid_args = new Auth_OpenID_Mapping($openid_args);
|
|
||||||
}
|
|
||||||
|
|
||||||
$ns_args = array();
|
|
||||||
|
|
||||||
// Resolve namespaces
|
|
||||||
foreach ($openid_args->items() as $pair) {
|
|
||||||
list($rest, $value) = $pair;
|
|
||||||
|
|
||||||
$parts = explode('.', $rest, 2);
|
|
||||||
|
|
||||||
if (count($parts) == 2) {
|
|
||||||
list($ns_alias, $ns_key) = $parts;
|
|
||||||
} else {
|
|
||||||
$ns_alias = Auth_OpenID_NULL_NAMESPACE;
|
|
||||||
$ns_key = $rest;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($ns_alias == 'ns') {
|
|
||||||
if ($this->namespaces->addAlias($value, $ns_key) === null) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} else if (($ns_alias == Auth_OpenID_NULL_NAMESPACE) &&
|
|
||||||
($ns_key == 'ns')) {
|
|
||||||
// null namespace
|
|
||||||
if ($this->namespaces->addAlias($value,
|
|
||||||
Auth_OpenID_NULL_NAMESPACE) === null) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$ns_args[] = array($ns_alias, $ns_key, $value);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Ensure that there is an OpenID namespace definition
|
|
||||||
$openid_ns_uri =
|
|
||||||
$this->namespaces->getNamespaceURI(Auth_OpenID_NULL_NAMESPACE);
|
|
||||||
|
|
||||||
if ($openid_ns_uri === null) {
|
|
||||||
$openid_ns_uri = Auth_OpenID_OPENID1_NS;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->setOpenIDNamespace($openid_ns_uri);
|
|
||||||
|
|
||||||
// Actually put the pairs into the appropriate namespaces
|
|
||||||
foreach ($ns_args as $triple) {
|
|
||||||
list($ns_alias, $ns_key, $value) = $triple;
|
|
||||||
$ns_uri = $this->namespaces->getNamespaceURI($ns_alias);
|
|
||||||
if ($ns_uri === null) {
|
|
||||||
// Only try to map an alias to a default if it's an
|
|
||||||
// OpenID 1.x message.
|
|
||||||
if ($openid_ns_uri == Auth_OpenID_OPENID1_NS) {
|
|
||||||
foreach ($Auth_OpenID_registered_aliases
|
|
||||||
as $alias => $uri) {
|
|
||||||
if ($alias == $ns_alias) {
|
|
||||||
$ns_uri = $uri;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($ns_uri === null) {
|
|
||||||
$ns_uri = $openid_ns_uri;
|
|
||||||
$ns_key = sprintf('%s.%s', $ns_alias, $ns_key);
|
|
||||||
} else {
|
|
||||||
$this->namespaces->addAlias($ns_uri, $ns_alias);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->setArg($ns_uri, $ns_key, $value);
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
function setOpenIDNamespace($openid_ns_uri)
|
|
||||||
{
|
|
||||||
if (!in_array($openid_ns_uri, $this->allowed_openid_namespaces)) {
|
|
||||||
// raise ValueError('Invalid null namespace: %r' % (openid_ns_uri,))
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->namespaces->addAlias($openid_ns_uri,
|
|
||||||
Auth_OpenID_NULL_NAMESPACE);
|
|
||||||
$this->_openid_ns_uri = $openid_ns_uri;
|
|
||||||
}
|
|
||||||
|
|
||||||
function getOpenIDNamespace()
|
|
||||||
{
|
|
||||||
return $this->_openid_ns_uri;
|
|
||||||
}
|
|
||||||
|
|
||||||
function fromKVForm($kvform_string)
|
|
||||||
{
|
|
||||||
// Create a Message from a KVForm string
|
|
||||||
return Auth_OpenID_Message::fromOpenIDArgs(
|
|
||||||
Auth_OpenID_KVForm::toArray($kvform_string));
|
|
||||||
}
|
|
||||||
|
|
||||||
function copy()
|
|
||||||
{
|
|
||||||
return $this;
|
|
||||||
}
|
|
||||||
|
|
||||||
function toPostArgs()
|
|
||||||
{
|
|
||||||
// Return all arguments with openid. in front of namespaced
|
|
||||||
// arguments.
|
|
||||||
|
|
||||||
$args = array();
|
|
||||||
|
|
||||||
// Add namespace definitions to the output
|
|
||||||
foreach ($this->namespaces->iteritems() as $pair) {
|
|
||||||
list($ns_uri, $alias) = $pair;
|
|
||||||
|
|
||||||
if ($alias == Auth_OpenID_NULL_NAMESPACE) {
|
|
||||||
if ($ns_uri != Auth_OpenID_OPENID1_NS) {
|
|
||||||
$args['openid.ns'] = $ns_uri;
|
|
||||||
} else {
|
|
||||||
// drop the default null namespace
|
|
||||||
// definition. This potentially changes a message
|
|
||||||
// since we have no way of knowing whether it was
|
|
||||||
// explicitly specified at the time the message
|
|
||||||
// was parsed. The vast majority of the time, this
|
|
||||||
// will be the right thing to do. Possibly this
|
|
||||||
// could look in the signed list.
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if ($this->getOpenIDNamespace() != Auth_OpenID_OPENID1_NS) {
|
|
||||||
$ns_key = 'openid.ns.' . $alias;
|
|
||||||
$args[$ns_key] = $ns_uri;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($this->args->items() as $pair) {
|
|
||||||
list($ns_parts, $value) = $pair;
|
|
||||||
list($ns_uri, $ns_key) = $ns_parts;
|
|
||||||
$key = $this->getKey($ns_uri, $ns_key);
|
|
||||||
$args[$key] = $value;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $args;
|
|
||||||
}
|
|
||||||
|
|
||||||
function toArgs()
|
|
||||||
{
|
|
||||||
// Return all namespaced arguments, failing if any
|
|
||||||
// non-namespaced arguments exist.
|
|
||||||
$post_args = $this->toPostArgs();
|
|
||||||
$kvargs = array();
|
|
||||||
foreach ($post_args as $k => $v) {
|
|
||||||
if (strpos($k, 'openid.') !== 0) {
|
|
||||||
// raise ValueError(
|
|
||||||
// 'This message can only be encoded as a POST, because it '
|
|
||||||
// 'contains arguments that are not prefixed with "openid."')
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
$kvargs[substr($k, 7)] = $v;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $kvargs;
|
|
||||||
}
|
|
||||||
|
|
||||||
function toFormMarkup($action_url, $form_tag_attrs = null,
|
|
||||||
$submit_text = "Continue")
|
|
||||||
{
|
|
||||||
$form = "<form accept-charset=\"UTF-8\" ".
|
|
||||||
"enctype=\"application/x-www-form-urlencoded\"";
|
|
||||||
|
|
||||||
if (!$form_tag_attrs) {
|
|
||||||
$form_tag_attrs = array();
|
|
||||||
}
|
|
||||||
|
|
||||||
$form_tag_attrs['action'] = $action_url;
|
|
||||||
$form_tag_attrs['method'] = 'post';
|
|
||||||
|
|
||||||
unset($form_tag_attrs['enctype']);
|
|
||||||
unset($form_tag_attrs['accept-charset']);
|
|
||||||
|
|
||||||
if ($form_tag_attrs) {
|
|
||||||
foreach ($form_tag_attrs as $name => $attr) {
|
|
||||||
$form .= sprintf(" %s=\"%s\"", $name, $attr);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$form .= ">\n";
|
|
||||||
|
|
||||||
foreach ($this->toPostArgs() as $name => $value) {
|
|
||||||
$form .= sprintf(
|
|
||||||
"<input type=\"hidden\" name=\"%s\" value=\"%s\" />\n",
|
|
||||||
$name, $value);
|
|
||||||
}
|
|
||||||
|
|
||||||
$form .= sprintf("<input type=\"submit\" value=\"%s\" />\n",
|
|
||||||
$submit_text);
|
|
||||||
|
|
||||||
$form .= "</form>\n";
|
|
||||||
|
|
||||||
return $form;
|
|
||||||
}
|
|
||||||
|
|
||||||
function toURL($base_url)
|
|
||||||
{
|
|
||||||
// Generate a GET URL with the parameters in this message
|
|
||||||
// attached as query parameters.
|
|
||||||
return Auth_OpenID::appendArgs($base_url, $this->toPostArgs());
|
|
||||||
}
|
|
||||||
|
|
||||||
function toKVForm()
|
|
||||||
{
|
|
||||||
// Generate a KVForm string that contains the parameters in
|
|
||||||
// this message. This will fail if the message contains
|
|
||||||
// arguments outside of the 'openid.' prefix.
|
|
||||||
return Auth_OpenID_KVForm::fromArray($this->toArgs());
|
|
||||||
}
|
|
||||||
|
|
||||||
function toURLEncoded()
|
|
||||||
{
|
|
||||||
// Generate an x-www-urlencoded string
|
|
||||||
$args = array();
|
|
||||||
|
|
||||||
foreach ($this->toPostArgs() as $k => $v) {
|
|
||||||
$args[] = array($k, $v);
|
|
||||||
}
|
|
||||||
|
|
||||||
sort($args);
|
|
||||||
return Auth_OpenID::httpBuildQuery($args);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _fixNS($namespace)
|
|
||||||
{
|
|
||||||
// Convert an input value into the internally used values of
|
|
||||||
// this object
|
|
||||||
|
|
||||||
if ($namespace == Auth_OpenID_OPENID_NS) {
|
|
||||||
if ($this->_openid_ns_uri === null) {
|
|
||||||
// raise UndefinedOpenIDNamespace('OpenID namespace not set')
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
$namespace = $this->_openid_ns_uri;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (($namespace != Auth_OpenID_BARE_NS) &&
|
|
||||||
(!is_string($namespace))) {
|
|
||||||
// raise TypeError(
|
|
||||||
// "Namespace must be BARE_NS, OPENID_NS or a string. got %r"
|
|
||||||
// % (namespace,))
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (($namespace != Auth_OpenID_BARE_NS) &&
|
|
||||||
(strpos($namespace, ':') === false)) {
|
|
||||||
// fmt = 'OpenID 2.0 namespace identifiers SHOULD be URIs. Got %r'
|
|
||||||
// warnings.warn(fmt % (namespace,), DeprecationWarning)
|
|
||||||
|
|
||||||
if ($namespace == 'sreg') {
|
|
||||||
// fmt = 'Using %r instead of "sreg" as namespace'
|
|
||||||
// warnings.warn(fmt % (SREG_URI,), DeprecationWarning,)
|
|
||||||
return Auth_OpenID_SREG_URI;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $namespace;
|
|
||||||
}
|
|
||||||
|
|
||||||
function hasKey($namespace, $ns_key)
|
|
||||||
{
|
|
||||||
$namespace = $this->_fixNS($namespace);
|
|
||||||
if ($namespace !== null) {
|
|
||||||
return $this->args->contains(array($namespace, $ns_key));
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function getKey($namespace, $ns_key)
|
|
||||||
{
|
|
||||||
// Get the key for a particular namespaced argument
|
|
||||||
$namespace = $this->_fixNS($namespace);
|
|
||||||
if ($namespace == Auth_OpenID_BARE_NS) {
|
|
||||||
return $ns_key;
|
|
||||||
}
|
|
||||||
|
|
||||||
$ns_alias = $this->namespaces->getAlias($namespace);
|
|
||||||
|
|
||||||
// No alias is defined, so no key can exist
|
|
||||||
if ($ns_alias === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($ns_alias == Auth_OpenID_NULL_NAMESPACE) {
|
|
||||||
$tail = $ns_key;
|
|
||||||
} else {
|
|
||||||
$tail = sprintf('%s.%s', $ns_alias, $ns_key);
|
|
||||||
}
|
|
||||||
|
|
||||||
return 'openid.' . $tail;
|
|
||||||
}
|
|
||||||
|
|
||||||
function getArg($namespace, $key, $default = null)
|
|
||||||
{
|
|
||||||
// Get a value for a namespaced key.
|
|
||||||
$namespace = $this->_fixNS($namespace);
|
|
||||||
|
|
||||||
if ($namespace !== null) {
|
|
||||||
if ((!$this->args->contains(array($namespace, $key))) &&
|
|
||||||
($default == Auth_OpenID_NO_DEFAULT)) {
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
return $this->args->get(array($namespace, $key), $default);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function getArgs($namespace)
|
|
||||||
{
|
|
||||||
// Get the arguments that are defined for this namespace URI
|
|
||||||
|
|
||||||
$namespace = $this->_fixNS($namespace);
|
|
||||||
if ($namespace !== null) {
|
|
||||||
$stuff = array();
|
|
||||||
foreach ($this->args->items() as $pair) {
|
|
||||||
list($key, $value) = $pair;
|
|
||||||
list($pair_ns, $ns_key) = $key;
|
|
||||||
if ($pair_ns == $namespace) {
|
|
||||||
$stuff[$ns_key] = $value;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $stuff;
|
|
||||||
}
|
|
||||||
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
|
|
||||||
function updateArgs($namespace, $updates)
|
|
||||||
{
|
|
||||||
// Set multiple key/value pairs in one call
|
|
||||||
|
|
||||||
$namespace = $this->_fixNS($namespace);
|
|
||||||
|
|
||||||
if ($namespace !== null) {
|
|
||||||
foreach ($updates as $k => $v) {
|
|
||||||
$this->setArg($namespace, $k, $v);
|
|
||||||
}
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function setArg($namespace, $key, $value)
|
|
||||||
{
|
|
||||||
// Set a single argument in this namespace
|
|
||||||
$namespace = $this->_fixNS($namespace);
|
|
||||||
|
|
||||||
if ($namespace !== null) {
|
|
||||||
$this->args->set(array($namespace, $key), $value);
|
|
||||||
if ($namespace !== Auth_OpenID_BARE_NS) {
|
|
||||||
$this->namespaces->add($namespace);
|
|
||||||
}
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function delArg($namespace, $key)
|
|
||||||
{
|
|
||||||
$namespace = $this->_fixNS($namespace);
|
|
||||||
|
|
||||||
if ($namespace !== null) {
|
|
||||||
return $this->args->del(array($namespace, $key));
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function getAliasedArg($aliased_key, $default = null)
|
|
||||||
{
|
|
||||||
$parts = explode('.', $aliased_key, 2);
|
|
||||||
|
|
||||||
if (count($parts) != 2) {
|
|
||||||
$ns = null;
|
|
||||||
} else {
|
|
||||||
list($alias, $key) = $parts;
|
|
||||||
$ns = $this->namespaces->getNamespaceURI($alias);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($ns === null) {
|
|
||||||
$key = $aliased_key;
|
|
||||||
$ns = $this->getOpenIDNamespace();
|
|
||||||
}
|
|
||||||
|
|
||||||
return $this->getArg($ns, $key, $default);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,74 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A MySQL store.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the base class file.
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID/SQLStore.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An SQL store that uses MySQL as its backend.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_MySQLStore extends Auth_OpenID_SQLStore {
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function setSQL()
|
|
||||||
{
|
|
||||||
$this->sql['nonce_table'] =
|
|
||||||
"CREATE TABLE %s (\n".
|
|
||||||
" server_url VARCHAR(2047),\n".
|
|
||||||
" timestamp INTEGER,\n".
|
|
||||||
" salt CHAR(40),\n".
|
|
||||||
" UNIQUE (server_url(255), timestamp, salt)\n".
|
|
||||||
") TYPE=InnoDB";
|
|
||||||
|
|
||||||
$this->sql['assoc_table'] =
|
|
||||||
"CREATE TABLE %s (\n".
|
|
||||||
" server_url BLOB,\n".
|
|
||||||
" handle VARCHAR(255),\n".
|
|
||||||
" secret BLOB,\n".
|
|
||||||
" issued INTEGER,\n".
|
|
||||||
" lifetime INTEGER,\n".
|
|
||||||
" assoc_type VARCHAR(64),\n".
|
|
||||||
" PRIMARY KEY (server_url(255), handle)\n".
|
|
||||||
") TYPE=InnoDB";
|
|
||||||
|
|
||||||
$this->sql['set_assoc'] =
|
|
||||||
"REPLACE INTO %s VALUES (?, ?, !, ?, ?, ?)";
|
|
||||||
|
|
||||||
$this->sql['get_assocs'] =
|
|
||||||
"SELECT handle, secret, issued, lifetime, assoc_type FROM %s ".
|
|
||||||
"WHERE server_url = ?";
|
|
||||||
|
|
||||||
$this->sql['get_assoc'] =
|
|
||||||
"SELECT handle, secret, issued, lifetime, assoc_type FROM %s ".
|
|
||||||
"WHERE server_url = ? AND handle = ?";
|
|
||||||
|
|
||||||
$this->sql['remove_assoc'] =
|
|
||||||
"DELETE FROM %s WHERE server_url = ? AND handle = ?";
|
|
||||||
|
|
||||||
$this->sql['add_nonce'] =
|
|
||||||
"INSERT INTO %s (server_url, timestamp, salt) VALUES (?, ?, ?)";
|
|
||||||
|
|
||||||
$this->sql['get_expired'] =
|
|
||||||
"SELECT server_url FROM %s WHERE issued + lifetime < ?";
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function blobEncode($blob)
|
|
||||||
{
|
|
||||||
return "0x" . bin2hex($blob);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,105 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Nonce-related functionality.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Need CryptUtil to generate random strings.
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID/CryptUtil.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the characters that the nonces are made from.
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID_Nonce_CHRS',"abcdefghijklmnopqrstuvwxyz" .
|
|
||||||
"ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789");
|
|
||||||
|
|
||||||
// Keep nonces for five hours (allow five hours for the combination of
|
|
||||||
// request time and clock skew). This is probably way more than is
|
|
||||||
// necessary, but there is not much overhead in storing nonces.
|
|
||||||
global $Auth_OpenID_SKEW;
|
|
||||||
$Auth_OpenID_SKEW = 60 * 60 * 5;
|
|
||||||
|
|
||||||
define('Auth_OpenID_Nonce_REGEX',
|
|
||||||
'/(\d{4})-(\d\d)-(\d\d)T(\d\d):(\d\d):(\d\d)Z(.*)/');
|
|
||||||
|
|
||||||
define('Auth_OpenID_Nonce_TIME_FMT',
|
|
||||||
'%Y-%m-%dT%H:%M:%SZ');
|
|
||||||
|
|
||||||
function Auth_OpenID_splitNonce($nonce_string)
|
|
||||||
{
|
|
||||||
// Extract a timestamp from the given nonce string
|
|
||||||
$result = preg_match(Auth_OpenID_Nonce_REGEX, $nonce_string, $matches);
|
|
||||||
if ($result != 1 || count($matches) != 8) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
list($unused,
|
|
||||||
$tm_year,
|
|
||||||
$tm_mon,
|
|
||||||
$tm_mday,
|
|
||||||
$tm_hour,
|
|
||||||
$tm_min,
|
|
||||||
$tm_sec,
|
|
||||||
$uniquifier) = $matches;
|
|
||||||
|
|
||||||
$timestamp =
|
|
||||||
@gmmktime($tm_hour, $tm_min, $tm_sec, $tm_mon, $tm_mday, $tm_year);
|
|
||||||
|
|
||||||
if ($timestamp === false || $timestamp < 0) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
return array($timestamp, $uniquifier);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_checkTimestamp($nonce_string,
|
|
||||||
$allowed_skew = null,
|
|
||||||
$now = null)
|
|
||||||
{
|
|
||||||
// Is the timestamp that is part of the specified nonce string
|
|
||||||
// within the allowed clock-skew of the current time?
|
|
||||||
global $Auth_OpenID_SKEW;
|
|
||||||
|
|
||||||
if ($allowed_skew === null) {
|
|
||||||
$allowed_skew = $Auth_OpenID_SKEW;
|
|
||||||
}
|
|
||||||
|
|
||||||
$parts = Auth_OpenID_splitNonce($nonce_string);
|
|
||||||
if ($parts == null) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($now === null) {
|
|
||||||
$now = time();
|
|
||||||
}
|
|
||||||
|
|
||||||
$stamp = $parts[0];
|
|
||||||
|
|
||||||
// Time after which we should not use the nonce
|
|
||||||
$past = $now - $allowed_skew;
|
|
||||||
|
|
||||||
// Time that is too far in the future for us to allow
|
|
||||||
$future = $now + $allowed_skew;
|
|
||||||
|
|
||||||
// the stamp is not too far in the future and is not too far
|
|
||||||
// in the past
|
|
||||||
return (($past <= $stamp) && ($stamp <= $future));
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_mkNonce($when = null)
|
|
||||||
{
|
|
||||||
// Generate a nonce with the current timestamp
|
|
||||||
$salt = Auth_OpenID_CryptUtil::randomString(
|
|
||||||
6, Auth_OpenID_Nonce_CHRS);
|
|
||||||
if ($when === null) {
|
|
||||||
$when = gmmktime();
|
|
||||||
}
|
|
||||||
$time_str = gmstrftime(Auth_OpenID_Nonce_TIME_FMT, $when);
|
|
||||||
return $time_str . $salt;
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,309 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This module implements a VERY limited parser that finds <link> tags
|
|
||||||
* in the head of HTML or XHTML documents and parses out their
|
|
||||||
* attributes according to the OpenID spec. It is a liberal parser,
|
|
||||||
* but it requires these things from the data in order to work:
|
|
||||||
*
|
|
||||||
* - There must be an open <html> tag
|
|
||||||
*
|
|
||||||
* - There must be an open <head> tag inside of the <html> tag
|
|
||||||
*
|
|
||||||
* - Only <link>s that are found inside of the <head> tag are parsed
|
|
||||||
* (this is by design)
|
|
||||||
*
|
|
||||||
* - The parser follows the OpenID specification in resolving the
|
|
||||||
* attributes of the link tags. This means that the attributes DO
|
|
||||||
* NOT get resolved as they would by an XML or HTML parser. In
|
|
||||||
* particular, only certain entities get replaced, and href
|
|
||||||
* attributes do not get resolved relative to a base URL.
|
|
||||||
*
|
|
||||||
* From http://openid.net/specs.bml:
|
|
||||||
*
|
|
||||||
* - The openid.server URL MUST be an absolute URL. OpenID consumers
|
|
||||||
* MUST NOT attempt to resolve relative URLs.
|
|
||||||
*
|
|
||||||
* - The openid.server URL MUST NOT include entities other than &,
|
|
||||||
* <, >, and ".
|
|
||||||
*
|
|
||||||
* The parser ignores SGML comments and <![CDATA[blocks]]>. Both kinds
|
|
||||||
* of quoting are allowed for attributes.
|
|
||||||
*
|
|
||||||
* The parser deals with invalid markup in these ways:
|
|
||||||
*
|
|
||||||
* - Tag names are not case-sensitive
|
|
||||||
*
|
|
||||||
* - The <html> tag is accepted even when it is not at the top level
|
|
||||||
*
|
|
||||||
* - The <head> tag is accepted even when it is not a direct child of
|
|
||||||
* the <html> tag, but a <html> tag must be an ancestor of the
|
|
||||||
* <head> tag
|
|
||||||
*
|
|
||||||
* - <link> tags are accepted even when they are not direct children
|
|
||||||
* of the <head> tag, but a <head> tag must be an ancestor of the
|
|
||||||
* <link> tag
|
|
||||||
*
|
|
||||||
* - If there is no closing tag for an open <html> or <head> tag, the
|
|
||||||
* remainder of the document is viewed as being inside of the
|
|
||||||
* tag. If there is no closing tag for a <link> tag, the link tag is
|
|
||||||
* treated as a short tag. Exceptions to this rule are that <html>
|
|
||||||
* closes <html> and <body> or <head> closes <head>
|
|
||||||
*
|
|
||||||
* - Attributes of the <link> tag are not required to be quoted.
|
|
||||||
*
|
|
||||||
* - In the case of duplicated attribute names, the attribute coming
|
|
||||||
* last in the tag will be the value returned.
|
|
||||||
*
|
|
||||||
* - Any text that does not parse as an attribute within a link tag
|
|
||||||
* will be ignored. (e.g. <link pumpkin rel='openid.server' /> will
|
|
||||||
* ignore pumpkin)
|
|
||||||
*
|
|
||||||
* - If there are more than one <html> or <head> tag, the parser only
|
|
||||||
* looks inside of the first one.
|
|
||||||
*
|
|
||||||
* - The contents of <script> tags are ignored entirely, except
|
|
||||||
* unclosed <script> tags. Unclosed <script> tags are ignored.
|
|
||||||
*
|
|
||||||
* - Any other invalid markup is ignored, including unclosed SGML
|
|
||||||
* comments and unclosed <![CDATA[blocks.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require Auth_OpenID::arrayGet().
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID.php";
|
|
||||||
|
|
||||||
class Auth_OpenID_Parse {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Specify some flags for use with regex matching.
|
|
||||||
*/
|
|
||||||
var $_re_flags = "si";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Stuff to remove before we start looking for tags
|
|
||||||
*/
|
|
||||||
var $_removed_re =
|
|
||||||
"<!--.*?-->|<!\[CDATA\[.*?\]\]>|<script\b(?!:)[^>]*>.*?<\/script>";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Starts with the tag name at a word boundary, where the tag name
|
|
||||||
* is not a namespace
|
|
||||||
*/
|
|
||||||
var $_tag_expr = "<%s\b(?!:)([^>]*?)(?:\/>|>(.*?)(?:<\/?%s\s*>|\Z))";
|
|
||||||
|
|
||||||
var $_attr_find = '\b(\w+)=("[^"]*"|\'[^\']*\'|[^\'"\s\/<>]+)';
|
|
||||||
|
|
||||||
function Auth_OpenID_Parse()
|
|
||||||
{
|
|
||||||
$this->_link_find = sprintf("/<link\b(?!:)([^>]*)(?!<)>/%s",
|
|
||||||
$this->_re_flags);
|
|
||||||
|
|
||||||
$this->_entity_replacements = array(
|
|
||||||
'amp' => '&',
|
|
||||||
'lt' => '<',
|
|
||||||
'gt' => '>',
|
|
||||||
'quot' => '"'
|
|
||||||
);
|
|
||||||
|
|
||||||
$this->_attr_find = sprintf("/%s/%s",
|
|
||||||
$this->_attr_find,
|
|
||||||
$this->_re_flags);
|
|
||||||
|
|
||||||
$this->_removed_re = sprintf("/%s/%s",
|
|
||||||
$this->_removed_re,
|
|
||||||
$this->_re_flags);
|
|
||||||
|
|
||||||
$this->_ent_replace =
|
|
||||||
sprintf("&(%s);", implode("|",
|
|
||||||
$this->_entity_replacements));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a regular expression that will match a given tag in an
|
|
||||||
* SGML string.
|
|
||||||
*/
|
|
||||||
function tagMatcher($tag_name, $close_tags = null)
|
|
||||||
{
|
|
||||||
if ($close_tags) {
|
|
||||||
$options = implode("|", array_merge(array($tag_name), $close_tags));
|
|
||||||
$closer = sprintf("(?:%s)", $options);
|
|
||||||
} else {
|
|
||||||
$closer = $tag_name;
|
|
||||||
}
|
|
||||||
|
|
||||||
$expr = sprintf($this->_tag_expr, $tag_name, $closer);
|
|
||||||
return sprintf("/%s/%s", $expr, $this->_re_flags);
|
|
||||||
}
|
|
||||||
|
|
||||||
function htmlFind()
|
|
||||||
{
|
|
||||||
return $this->tagMatcher('html');
|
|
||||||
}
|
|
||||||
|
|
||||||
function headFind()
|
|
||||||
{
|
|
||||||
return $this->tagMatcher('head', array('body'));
|
|
||||||
}
|
|
||||||
|
|
||||||
function replaceEntities($str)
|
|
||||||
{
|
|
||||||
foreach ($this->_entity_replacements as $old => $new) {
|
|
||||||
$str = preg_replace(sprintf("/&%s;/", $old), $new, $str);
|
|
||||||
}
|
|
||||||
return $str;
|
|
||||||
}
|
|
||||||
|
|
||||||
function removeQuotes($str)
|
|
||||||
{
|
|
||||||
$matches = array();
|
|
||||||
$double = '/^"(.*)"$/';
|
|
||||||
$single = "/^\'(.*)\'$/";
|
|
||||||
|
|
||||||
if (preg_match($double, $str, $matches)) {
|
|
||||||
return $matches[1];
|
|
||||||
} else if (preg_match($single, $str, $matches)) {
|
|
||||||
return $matches[1];
|
|
||||||
} else {
|
|
||||||
return $str;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Find all link tags in a string representing a HTML document and
|
|
||||||
* return a list of their attributes.
|
|
||||||
*
|
|
||||||
* @param string $html The text to parse
|
|
||||||
* @return array $list An array of arrays of attributes, one for each
|
|
||||||
* link tag
|
|
||||||
*/
|
|
||||||
function parseLinkAttrs($html)
|
|
||||||
{
|
|
||||||
$stripped = preg_replace($this->_removed_re,
|
|
||||||
"",
|
|
||||||
$html);
|
|
||||||
|
|
||||||
// Try to find the <HTML> tag.
|
|
||||||
$html_re = $this->htmlFind();
|
|
||||||
$html_matches = array();
|
|
||||||
if (!preg_match($html_re, $stripped, $html_matches)) {
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
|
|
||||||
// Try to find the <HEAD> tag.
|
|
||||||
$head_re = $this->headFind();
|
|
||||||
$head_matches = array();
|
|
||||||
if (!preg_match($head_re, $html_matches[0], $head_matches)) {
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
|
|
||||||
$link_data = array();
|
|
||||||
$link_matches = array();
|
|
||||||
|
|
||||||
if (!preg_match_all($this->_link_find, $head_matches[0],
|
|
||||||
$link_matches)) {
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($link_matches[0] as $link) {
|
|
||||||
$attr_matches = array();
|
|
||||||
preg_match_all($this->_attr_find, $link, $attr_matches);
|
|
||||||
$link_attrs = array();
|
|
||||||
foreach ($attr_matches[0] as $index => $full_match) {
|
|
||||||
$name = $attr_matches[1][$index];
|
|
||||||
$value = $this->replaceEntities(
|
|
||||||
$this->removeQuotes($attr_matches[2][$index]));
|
|
||||||
|
|
||||||
$link_attrs[strtolower($name)] = $value;
|
|
||||||
}
|
|
||||||
$link_data[] = $link_attrs;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $link_data;
|
|
||||||
}
|
|
||||||
|
|
||||||
function relMatches($rel_attr, $target_rel)
|
|
||||||
{
|
|
||||||
// Does this target_rel appear in the rel_str?
|
|
||||||
// XXX: TESTME
|
|
||||||
$rels = preg_split("/\s+/", trim($rel_attr));
|
|
||||||
foreach ($rels as $rel) {
|
|
||||||
$rel = strtolower($rel);
|
|
||||||
if ($rel == $target_rel) {
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
function linkHasRel($link_attrs, $target_rel)
|
|
||||||
{
|
|
||||||
// Does this link have target_rel as a relationship?
|
|
||||||
// XXX: TESTME
|
|
||||||
$rel_attr = Auth_OpeniD::arrayGet($link_attrs, 'rel', null);
|
|
||||||
return ($rel_attr && $this->relMatches($rel_attr,
|
|
||||||
$target_rel));
|
|
||||||
}
|
|
||||||
|
|
||||||
function findLinksRel($link_attrs_list, $target_rel)
|
|
||||||
{
|
|
||||||
// Filter the list of link attributes on whether it has
|
|
||||||
// target_rel as a relationship.
|
|
||||||
// XXX: TESTME
|
|
||||||
$result = array();
|
|
||||||
foreach ($link_attrs_list as $attr) {
|
|
||||||
if ($this->linkHasRel($attr, $target_rel)) {
|
|
||||||
$result[] = $attr;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
function findFirstHref($link_attrs_list, $target_rel)
|
|
||||||
{
|
|
||||||
// Return the value of the href attribute for the first link
|
|
||||||
// tag in the list that has target_rel as a relationship.
|
|
||||||
// XXX: TESTME
|
|
||||||
$matches = $this->findLinksRel($link_attrs_list,
|
|
||||||
$target_rel);
|
|
||||||
if (!$matches) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
$first = $matches[0];
|
|
||||||
return Auth_OpenID::arrayGet($first, 'href', null);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_legacy_discover($html_text, $server_rel,
|
|
||||||
$delegate_rel)
|
|
||||||
{
|
|
||||||
$p = new Auth_OpenID_Parse();
|
|
||||||
|
|
||||||
$link_attrs = $p->parseLinkAttrs($html_text);
|
|
||||||
|
|
||||||
$server_url = $p->findFirstHref($link_attrs,
|
|
||||||
$server_rel);
|
|
||||||
|
|
||||||
if ($server_url === null) {
|
|
||||||
return false;
|
|
||||||
} else {
|
|
||||||
$delegate_url = $p->findFirstHref($link_attrs,
|
|
||||||
$delegate_rel);
|
|
||||||
return array($delegate_url, $server_url);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,104 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A PostgreSQL store.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the base class file.
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID/SQLStore.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An SQL store that uses PostgreSQL as its backend.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_PostgreSQLStore extends Auth_OpenID_SQLStore {
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function setSQL()
|
|
||||||
{
|
|
||||||
$this->sql['nonce_table'] =
|
|
||||||
"CREATE TABLE %s (server_url VARCHAR(2047), timestamp INTEGER, ".
|
|
||||||
"salt CHAR(40), UNIQUE (server_url, timestamp, salt))";
|
|
||||||
|
|
||||||
$this->sql['assoc_table'] =
|
|
||||||
"CREATE TABLE %s (server_url VARCHAR(2047), handle VARCHAR(255), ".
|
|
||||||
"secret BYTEA, issued INTEGER, lifetime INTEGER, ".
|
|
||||||
"assoc_type VARCHAR(64), PRIMARY KEY (server_url, handle), ".
|
|
||||||
"CONSTRAINT secret_length_constraint CHECK ".
|
|
||||||
"(LENGTH(secret) <= 128))";
|
|
||||||
|
|
||||||
$this->sql['set_assoc'] =
|
|
||||||
array(
|
|
||||||
'insert_assoc' => "INSERT INTO %s (server_url, handle, ".
|
|
||||||
"secret, issued, lifetime, assoc_type) VALUES ".
|
|
||||||
"(?, ?, '!', ?, ?, ?)",
|
|
||||||
'update_assoc' => "UPDATE %s SET secret = '!', issued = ?, ".
|
|
||||||
"lifetime = ?, assoc_type = ? WHERE server_url = ? AND ".
|
|
||||||
"handle = ?"
|
|
||||||
);
|
|
||||||
|
|
||||||
$this->sql['get_assocs'] =
|
|
||||||
"SELECT handle, secret, issued, lifetime, assoc_type FROM %s ".
|
|
||||||
"WHERE server_url = ?";
|
|
||||||
|
|
||||||
$this->sql['get_assoc'] =
|
|
||||||
"SELECT handle, secret, issued, lifetime, assoc_type FROM %s ".
|
|
||||||
"WHERE server_url = ? AND handle = ?";
|
|
||||||
|
|
||||||
$this->sql['remove_assoc'] =
|
|
||||||
"DELETE FROM %s WHERE server_url = ? AND handle = ?";
|
|
||||||
|
|
||||||
$this->sql['get_expired'] =
|
|
||||||
"SELECT server_url FROM %s WHERE issued + lifetime < ?";
|
|
||||||
|
|
||||||
$this->sql['add_nonce'] =
|
|
||||||
"INSERT INTO %s (server_url, timestamp, salt) VALUES ".
|
|
||||||
"(?, ?, ?)"
|
|
||||||
;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _set_assoc($server_url, $handle, $secret, $issued, $lifetime,
|
|
||||||
$assoc_type)
|
|
||||||
{
|
|
||||||
$result = $this->_get_assoc($server_url, $handle);
|
|
||||||
if ($result) {
|
|
||||||
// Update the table since this associations already exists.
|
|
||||||
$this->connection->query($this->sql['set_assoc']['update_assoc'],
|
|
||||||
array($secret, $issued, $lifetime,
|
|
||||||
$assoc_type, $server_url, $handle));
|
|
||||||
} else {
|
|
||||||
// Insert a new record because this association wasn't
|
|
||||||
// found.
|
|
||||||
$this->connection->query($this->sql['set_assoc']['insert_assoc'],
|
|
||||||
array($server_url, $handle, $secret,
|
|
||||||
$issued, $lifetime, $assoc_type));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function blobEncode($blob)
|
|
||||||
{
|
|
||||||
return $this->_octify($blob);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function blobDecode($blob)
|
|
||||||
{
|
|
||||||
return $this->_unoctify($blob);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,551 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* SQL-backed OpenID stores.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the PEAR DB module because we'll need it for the SQL-based
|
|
||||||
* stores implemented here. We silence any errors from the inclusion
|
|
||||||
* because it might not be present, and a user of the SQL stores may
|
|
||||||
* supply an Auth_OpenID_DatabaseConnection instance that implements
|
|
||||||
* its own storage.
|
|
||||||
*/
|
|
||||||
global $__Auth_OpenID_PEAR_AVAILABLE;
|
|
||||||
$__Auth_OpenID_PEAR_AVAILABLE = @include_once 'DB.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID/Interface.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the parent class for the SQL stores, which contains the
|
|
||||||
* logic common to all of the SQL stores.
|
|
||||||
*
|
|
||||||
* The table names used are determined by the class variables
|
|
||||||
* associations_table_name and nonces_table_name. To change the name
|
|
||||||
* of the tables used, pass new table names into the constructor.
|
|
||||||
*
|
|
||||||
* To create the tables with the proper schema, see the createTables
|
|
||||||
* method.
|
|
||||||
*
|
|
||||||
* This class shouldn't be used directly. Use one of its subclasses
|
|
||||||
* instead, as those contain the code necessary to use a specific
|
|
||||||
* database. If you're an OpenID integrator and you'd like to create
|
|
||||||
* an SQL-driven store that wraps an application's database
|
|
||||||
* abstraction, be sure to create a subclass of
|
|
||||||
* {@link Auth_OpenID_DatabaseConnection} that calls the application's
|
|
||||||
* database abstraction calls. Then, pass an instance of your new
|
|
||||||
* database connection class to your SQLStore subclass constructor.
|
|
||||||
*
|
|
||||||
* All methods other than the constructor and createTables should be
|
|
||||||
* considered implementation details.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_SQLStore extends Auth_OpenID_OpenIDStore {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This creates a new SQLStore instance. It requires an
|
|
||||||
* established database connection be given to it, and it allows
|
|
||||||
* overriding the default table names.
|
|
||||||
*
|
|
||||||
* @param connection $connection This must be an established
|
|
||||||
* connection to a database of the correct type for the SQLStore
|
|
||||||
* subclass you're using. This must either be an PEAR DB
|
|
||||||
* connection handle or an instance of a subclass of
|
|
||||||
* Auth_OpenID_DatabaseConnection.
|
|
||||||
*
|
|
||||||
* @param associations_table: This is an optional parameter to
|
|
||||||
* specify the name of the table used for storing associations.
|
|
||||||
* The default value is 'oid_associations'.
|
|
||||||
*
|
|
||||||
* @param nonces_table: This is an optional parameter to specify
|
|
||||||
* the name of the table used for storing nonces. The default
|
|
||||||
* value is 'oid_nonces'.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_SQLStore($connection,
|
|
||||||
$associations_table = null,
|
|
||||||
$nonces_table = null)
|
|
||||||
{
|
|
||||||
global $__Auth_OpenID_PEAR_AVAILABLE;
|
|
||||||
|
|
||||||
$this->associations_table_name = "oid_associations";
|
|
||||||
$this->nonces_table_name = "oid_nonces";
|
|
||||||
|
|
||||||
// Check the connection object type to be sure it's a PEAR
|
|
||||||
// database connection.
|
|
||||||
if (!(is_object($connection) &&
|
|
||||||
(is_subclass_of($connection, 'db_common') ||
|
|
||||||
is_subclass_of($connection,
|
|
||||||
'auth_openid_databaseconnection')))) {
|
|
||||||
trigger_error("Auth_OpenID_SQLStore expected PEAR connection " .
|
|
||||||
"object (got ".get_class($connection).")",
|
|
||||||
E_USER_ERROR);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->connection = $connection;
|
|
||||||
|
|
||||||
// Be sure to set the fetch mode so the results are keyed on
|
|
||||||
// column name instead of column index. This is a PEAR
|
|
||||||
// constant, so only try to use it if PEAR is present. Note
|
|
||||||
// that Auth_Openid_Databaseconnection instances need not
|
|
||||||
// implement ::setFetchMode for this reason.
|
|
||||||
if ($__Auth_OpenID_PEAR_AVAILABLE) {
|
|
||||||
$this->connection->setFetchMode(DB_FETCHMODE_ASSOC);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($associations_table) {
|
|
||||||
$this->associations_table_name = $associations_table;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($nonces_table) {
|
|
||||||
$this->nonces_table_name = $nonces_table;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->max_nonce_age = 6 * 60 * 60;
|
|
||||||
|
|
||||||
// Be sure to run the database queries with auto-commit mode
|
|
||||||
// turned OFF, because we want every function to run in a
|
|
||||||
// transaction, implicitly. As a rule, methods named with a
|
|
||||||
// leading underscore will NOT control transaction behavior.
|
|
||||||
// Callers of these methods will worry about transactions.
|
|
||||||
$this->connection->autoCommit(false);
|
|
||||||
|
|
||||||
// Create an empty SQL strings array.
|
|
||||||
$this->sql = array();
|
|
||||||
|
|
||||||
// Call this method (which should be overridden by subclasses)
|
|
||||||
// to populate the $this->sql array with SQL strings.
|
|
||||||
$this->setSQL();
|
|
||||||
|
|
||||||
// Verify that all required SQL statements have been set, and
|
|
||||||
// raise an error if any expected SQL strings were either
|
|
||||||
// absent or empty.
|
|
||||||
list($missing, $empty) = $this->_verifySQL();
|
|
||||||
|
|
||||||
if ($missing) {
|
|
||||||
trigger_error("Expected keys in SQL query list: " .
|
|
||||||
implode(", ", $missing),
|
|
||||||
E_USER_ERROR);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($empty) {
|
|
||||||
trigger_error("SQL list keys have no SQL strings: " .
|
|
||||||
implode(", ", $empty),
|
|
||||||
E_USER_ERROR);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Add table names to queries.
|
|
||||||
$this->_fixSQL();
|
|
||||||
}
|
|
||||||
|
|
||||||
function tableExists($table_name)
|
|
||||||
{
|
|
||||||
return !$this->isError(
|
|
||||||
$this->connection->query(
|
|
||||||
sprintf("SELECT * FROM %s LIMIT 0",
|
|
||||||
$table_name)));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns true if $value constitutes a database error; returns
|
|
||||||
* false otherwise.
|
|
||||||
*/
|
|
||||||
function isError($value)
|
|
||||||
{
|
|
||||||
return PEAR::isError($value);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Converts a query result to a boolean. If the result is a
|
|
||||||
* database error according to $this->isError(), this returns
|
|
||||||
* false; otherwise, this returns true.
|
|
||||||
*/
|
|
||||||
function resultToBool($obj)
|
|
||||||
{
|
|
||||||
if ($this->isError($obj)) {
|
|
||||||
return false;
|
|
||||||
} else {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This method should be overridden by subclasses. This method is
|
|
||||||
* called by the constructor to set values in $this->sql, which is
|
|
||||||
* an array keyed on sql name.
|
|
||||||
*/
|
|
||||||
function setSQL()
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Resets the store by removing all records from the store's
|
|
||||||
* tables.
|
|
||||||
*/
|
|
||||||
function reset()
|
|
||||||
{
|
|
||||||
$this->connection->query(sprintf("DELETE FROM %s",
|
|
||||||
$this->associations_table_name));
|
|
||||||
|
|
||||||
$this->connection->query(sprintf("DELETE FROM %s",
|
|
||||||
$this->nonces_table_name));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _verifySQL()
|
|
||||||
{
|
|
||||||
$missing = array();
|
|
||||||
$empty = array();
|
|
||||||
|
|
||||||
$required_sql_keys = array(
|
|
||||||
'nonce_table',
|
|
||||||
'assoc_table',
|
|
||||||
'set_assoc',
|
|
||||||
'get_assoc',
|
|
||||||
'get_assocs',
|
|
||||||
'remove_assoc',
|
|
||||||
'get_expired',
|
|
||||||
);
|
|
||||||
|
|
||||||
foreach ($required_sql_keys as $key) {
|
|
||||||
if (!array_key_exists($key, $this->sql)) {
|
|
||||||
$missing[] = $key;
|
|
||||||
} else if (!$this->sql[$key]) {
|
|
||||||
$empty[] = $key;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return array($missing, $empty);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _fixSQL()
|
|
||||||
{
|
|
||||||
$replacements = array(
|
|
||||||
array(
|
|
||||||
'value' => $this->nonces_table_name,
|
|
||||||
'keys' => array('nonce_table',
|
|
||||||
'add_nonce')
|
|
||||||
),
|
|
||||||
array(
|
|
||||||
'value' => $this->associations_table_name,
|
|
||||||
'keys' => array('assoc_table',
|
|
||||||
'set_assoc',
|
|
||||||
'get_assoc',
|
|
||||||
'get_assocs',
|
|
||||||
'remove_assoc',
|
|
||||||
'get_expired')
|
|
||||||
)
|
|
||||||
);
|
|
||||||
|
|
||||||
foreach ($replacements as $item) {
|
|
||||||
$value = $item['value'];
|
|
||||||
$keys = $item['keys'];
|
|
||||||
|
|
||||||
foreach ($keys as $k) {
|
|
||||||
if (is_array($this->sql[$k])) {
|
|
||||||
foreach ($this->sql[$k] as $part_key => $part_value) {
|
|
||||||
$this->sql[$k][$part_key] = sprintf($part_value,
|
|
||||||
$value);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$this->sql[$k] = sprintf($this->sql[$k], $value);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function blobDecode($blob)
|
|
||||||
{
|
|
||||||
return $blob;
|
|
||||||
}
|
|
||||||
|
|
||||||
function blobEncode($str)
|
|
||||||
{
|
|
||||||
return $str;
|
|
||||||
}
|
|
||||||
|
|
||||||
function createTables()
|
|
||||||
{
|
|
||||||
$this->connection->autoCommit(true);
|
|
||||||
$n = $this->create_nonce_table();
|
|
||||||
$a = $this->create_assoc_table();
|
|
||||||
$this->connection->autoCommit(false);
|
|
||||||
|
|
||||||
if ($n && $a) {
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function create_nonce_table()
|
|
||||||
{
|
|
||||||
if (!$this->tableExists($this->nonces_table_name)) {
|
|
||||||
$r = $this->connection->query($this->sql['nonce_table']);
|
|
||||||
return $this->resultToBool($r);
|
|
||||||
}
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
function create_assoc_table()
|
|
||||||
{
|
|
||||||
if (!$this->tableExists($this->associations_table_name)) {
|
|
||||||
$r = $this->connection->query($this->sql['assoc_table']);
|
|
||||||
return $this->resultToBool($r);
|
|
||||||
}
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _set_assoc($server_url, $handle, $secret, $issued,
|
|
||||||
$lifetime, $assoc_type)
|
|
||||||
{
|
|
||||||
return $this->connection->query($this->sql['set_assoc'],
|
|
||||||
array(
|
|
||||||
$server_url,
|
|
||||||
$handle,
|
|
||||||
$secret,
|
|
||||||
$issued,
|
|
||||||
$lifetime,
|
|
||||||
$assoc_type));
|
|
||||||
}
|
|
||||||
|
|
||||||
function storeAssociation($server_url, $association)
|
|
||||||
{
|
|
||||||
if ($this->resultToBool($this->_set_assoc(
|
|
||||||
$server_url,
|
|
||||||
$association->handle,
|
|
||||||
$this->blobEncode(
|
|
||||||
$association->secret),
|
|
||||||
$association->issued,
|
|
||||||
$association->lifetime,
|
|
||||||
$association->assoc_type
|
|
||||||
))) {
|
|
||||||
$this->connection->commit();
|
|
||||||
} else {
|
|
||||||
$this->connection->rollback();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _get_assoc($server_url, $handle)
|
|
||||||
{
|
|
||||||
$result = $this->connection->getRow($this->sql['get_assoc'],
|
|
||||||
array($server_url, $handle));
|
|
||||||
if ($this->isError($result)) {
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _get_assocs($server_url)
|
|
||||||
{
|
|
||||||
$result = $this->connection->getAll($this->sql['get_assocs'],
|
|
||||||
array($server_url));
|
|
||||||
|
|
||||||
if ($this->isError($result)) {
|
|
||||||
return array();
|
|
||||||
} else {
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function removeAssociation($server_url, $handle)
|
|
||||||
{
|
|
||||||
if ($this->_get_assoc($server_url, $handle) == null) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($this->resultToBool($this->connection->query(
|
|
||||||
$this->sql['remove_assoc'],
|
|
||||||
array($server_url, $handle)))) {
|
|
||||||
$this->connection->commit();
|
|
||||||
} else {
|
|
||||||
$this->connection->rollback();
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
function getExpired()
|
|
||||||
{
|
|
||||||
$sql = $this->sql['get_expired'];
|
|
||||||
$result = $this->connection->getAll($sql, array(time()));
|
|
||||||
|
|
||||||
$expired = array();
|
|
||||||
|
|
||||||
foreach ($result as $row) {
|
|
||||||
$expired[] = $row['server_url'];
|
|
||||||
}
|
|
||||||
|
|
||||||
return $expired;
|
|
||||||
}
|
|
||||||
|
|
||||||
function getAssociation($server_url, $handle = null)
|
|
||||||
{
|
|
||||||
if ($handle !== null) {
|
|
||||||
$assoc = $this->_get_assoc($server_url, $handle);
|
|
||||||
|
|
||||||
$assocs = array();
|
|
||||||
if ($assoc) {
|
|
||||||
$assocs[] = $assoc;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$assocs = $this->_get_assocs($server_url);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$assocs || (count($assocs) == 0)) {
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
$associations = array();
|
|
||||||
|
|
||||||
foreach ($assocs as $assoc_row) {
|
|
||||||
$assoc = new Auth_OpenID_Association($assoc_row['handle'],
|
|
||||||
$assoc_row['secret'],
|
|
||||||
$assoc_row['issued'],
|
|
||||||
$assoc_row['lifetime'],
|
|
||||||
$assoc_row['assoc_type']);
|
|
||||||
|
|
||||||
$assoc->secret = $this->blobDecode($assoc->secret);
|
|
||||||
|
|
||||||
if ($assoc->getExpiresIn() == 0) {
|
|
||||||
$this->removeAssociation($server_url, $assoc->handle);
|
|
||||||
} else {
|
|
||||||
$associations[] = array($assoc->issued, $assoc);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($associations) {
|
|
||||||
$issued = array();
|
|
||||||
$assocs = array();
|
|
||||||
foreach ($associations as $key => $assoc) {
|
|
||||||
$issued[$key] = $assoc[0];
|
|
||||||
$assocs[$key] = $assoc[1];
|
|
||||||
}
|
|
||||||
|
|
||||||
array_multisort($issued, SORT_DESC, $assocs, SORT_DESC,
|
|
||||||
$associations);
|
|
||||||
|
|
||||||
// return the most recently issued one.
|
|
||||||
list($issued, $assoc) = $associations[0];
|
|
||||||
return $assoc;
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _add_nonce($server_url, $timestamp, $salt)
|
|
||||||
{
|
|
||||||
$sql = $this->sql['add_nonce'];
|
|
||||||
$result = $this->connection->query($sql, array($server_url,
|
|
||||||
$timestamp,
|
|
||||||
$salt));
|
|
||||||
if ($this->isError($result)) {
|
|
||||||
$this->connection->rollback();
|
|
||||||
} else {
|
|
||||||
$this->connection->commit();
|
|
||||||
}
|
|
||||||
return $this->resultToBool($result);
|
|
||||||
}
|
|
||||||
|
|
||||||
function useNonce($server_url, $timestamp, $salt)
|
|
||||||
{
|
|
||||||
return $this->_add_nonce($server_url, $timestamp, $salt);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* "Octifies" a binary string by returning a string with escaped
|
|
||||||
* octal bytes. This is used for preparing binary data for
|
|
||||||
* PostgreSQL BYTEA fields.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _octify($str)
|
|
||||||
{
|
|
||||||
$result = "";
|
|
||||||
for ($i = 0; $i < Auth_OpenID::bytes($str); $i++) {
|
|
||||||
$ch = substr($str, $i, 1);
|
|
||||||
if ($ch == "\\") {
|
|
||||||
$result .= "\\\\\\\\";
|
|
||||||
} else if (ord($ch) == 0) {
|
|
||||||
$result .= "\\\\000";
|
|
||||||
} else {
|
|
||||||
$result .= "\\" . strval(decoct(ord($ch)));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* "Unoctifies" octal-escaped data from PostgreSQL and returns the
|
|
||||||
* resulting ASCII (possibly binary) string.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _unoctify($str)
|
|
||||||
{
|
|
||||||
$result = "";
|
|
||||||
$i = 0;
|
|
||||||
while ($i < strlen($str)) {
|
|
||||||
$char = $str[$i];
|
|
||||||
if ($char == "\\") {
|
|
||||||
// Look to see if the next char is a backslash and
|
|
||||||
// append it.
|
|
||||||
if ($str[$i + 1] != "\\") {
|
|
||||||
$octal_digits = substr($str, $i + 1, 3);
|
|
||||||
$dec = octdec($octal_digits);
|
|
||||||
$char = chr($dec);
|
|
||||||
$i += 4;
|
|
||||||
} else {
|
|
||||||
$char = "\\";
|
|
||||||
$i += 2;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$i += 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
$result .= $char;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,68 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An SQLite store.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the base class file.
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID/SQLStore.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An SQL store that uses SQLite as its backend.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_SQLiteStore extends Auth_OpenID_SQLStore {
|
|
||||||
function setSQL()
|
|
||||||
{
|
|
||||||
$this->sql['nonce_table'] =
|
|
||||||
"CREATE TABLE %s (server_url VARCHAR(2047), timestamp INTEGER, ".
|
|
||||||
"salt CHAR(40), UNIQUE (server_url, timestamp, salt))";
|
|
||||||
|
|
||||||
$this->sql['assoc_table'] =
|
|
||||||
"CREATE TABLE %s (server_url VARCHAR(2047), handle VARCHAR(255), ".
|
|
||||||
"secret BLOB(128), issued INTEGER, lifetime INTEGER, ".
|
|
||||||
"assoc_type VARCHAR(64), PRIMARY KEY (server_url, handle))";
|
|
||||||
|
|
||||||
$this->sql['set_assoc'] =
|
|
||||||
"INSERT OR REPLACE INTO %s VALUES (?, ?, ?, ?, ?, ?)";
|
|
||||||
|
|
||||||
$this->sql['get_assocs'] =
|
|
||||||
"SELECT handle, secret, issued, lifetime, assoc_type FROM %s ".
|
|
||||||
"WHERE server_url = ?";
|
|
||||||
|
|
||||||
$this->sql['get_expired'] =
|
|
||||||
"SELECT server_url FROM %s WHERE issued + lifetime < ?";
|
|
||||||
|
|
||||||
$this->sql['get_assoc'] =
|
|
||||||
"SELECT handle, secret, issued, lifetime, assoc_type FROM %s ".
|
|
||||||
"WHERE server_url = ? AND handle = ?";
|
|
||||||
|
|
||||||
$this->sql['remove_assoc'] =
|
|
||||||
"DELETE FROM %s WHERE server_url = ? AND handle = ?";
|
|
||||||
|
|
||||||
$this->sql['add_nonce'] =
|
|
||||||
"INSERT INTO %s (server_url, timestamp, salt) VALUES (?, ?, ?)";
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _add_nonce($server_url, $timestamp, $salt)
|
|
||||||
{
|
|
||||||
// PECL SQLite extensions 1.0.3 and older (1.0.3 is the
|
|
||||||
// current release at the time of this writing) have a broken
|
|
||||||
// sqlite_escape_string function that breaks when passed the
|
|
||||||
// empty string. Prefixing all strings with one character
|
|
||||||
// keeps them unique and avoids this bug. The nonce table is
|
|
||||||
// write-only, so we don't have to worry about updating other
|
|
||||||
// functions with this same bad hack.
|
|
||||||
return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,541 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Simple registration request and response parsing and object
|
|
||||||
* representation.
|
|
||||||
*
|
|
||||||
* This module contains objects representing simple registration
|
|
||||||
* requests and responses that can be used with both OpenID relying
|
|
||||||
* parties and OpenID providers.
|
|
||||||
*
|
|
||||||
* 1. The relying party creates a request object and adds it to the
|
|
||||||
* {@link Auth_OpenID_AuthRequest} object before making the
|
|
||||||
* checkid request to the OpenID provider:
|
|
||||||
*
|
|
||||||
* $sreg_req = Auth_OpenID_SRegRequest::build(array('email'));
|
|
||||||
* $auth_request->addExtension($sreg_req);
|
|
||||||
*
|
|
||||||
* 2. The OpenID provider extracts the simple registration request
|
|
||||||
* from the OpenID request using {@link
|
|
||||||
* Auth_OpenID_SRegRequest::fromOpenIDRequest}, gets the user's
|
|
||||||
* approval and data, creates an {@link Auth_OpenID_SRegResponse}
|
|
||||||
* object and adds it to the id_res response:
|
|
||||||
*
|
|
||||||
* $sreg_req = Auth_OpenID_SRegRequest::fromOpenIDRequest(
|
|
||||||
* $checkid_request->message);
|
|
||||||
* // [ get the user's approval and data, informing the user that
|
|
||||||
* // the fields in sreg_response were requested ]
|
|
||||||
* $sreg_resp = Auth_OpenID_SRegResponse::extractResponse(
|
|
||||||
* $sreg_req, $user_data);
|
|
||||||
* $sreg_resp->toMessage($openid_response->fields);
|
|
||||||
*
|
|
||||||
* 3. The relying party uses {@link
|
|
||||||
* Auth_OpenID_SRegResponse::fromSuccessResponse} to extract the data
|
|
||||||
* from the OpenID response:
|
|
||||||
*
|
|
||||||
* $sreg_resp = Auth_OpenID_SRegResponse::fromSuccessResponse(
|
|
||||||
* $success_response);
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Import message and extension internals.
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID/Message.php';
|
|
||||||
require_once 'Auth/OpenID/Extension.php';
|
|
||||||
|
|
||||||
// The data fields that are listed in the sreg spec
|
|
||||||
global $Auth_OpenID_sreg_data_fields;
|
|
||||||
$Auth_OpenID_sreg_data_fields = array(
|
|
||||||
'fullname' => 'Full Name',
|
|
||||||
'nickname' => 'Nickname',
|
|
||||||
'dob' => 'Date of Birth',
|
|
||||||
'email' => 'E-mail Address',
|
|
||||||
'gender' => 'Gender',
|
|
||||||
'postcode' => 'Postal Code',
|
|
||||||
'country' => 'Country',
|
|
||||||
'language' => 'Language',
|
|
||||||
'timezone' => 'Time Zone');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Check to see that the given value is a valid simple registration
|
|
||||||
* data field name. Return true if so, false if not.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_checkFieldName($field_name)
|
|
||||||
{
|
|
||||||
global $Auth_OpenID_sreg_data_fields;
|
|
||||||
|
|
||||||
if (!in_array($field_name, array_keys($Auth_OpenID_sreg_data_fields))) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// URI used in the wild for Yadis documents advertising simple
|
|
||||||
// registration support
|
|
||||||
define('Auth_OpenID_SREG_NS_URI_1_0', 'http://openid.net/sreg/1.0');
|
|
||||||
|
|
||||||
// URI in the draft specification for simple registration 1.1
|
|
||||||
// <http://openid.net/specs/openid-simple-registration-extension-1_1-01.html>
|
|
||||||
define('Auth_OpenID_SREG_NS_URI_1_1', 'http://openid.net/extensions/sreg/1.1');
|
|
||||||
|
|
||||||
// This attribute will always hold the preferred URI to use when
|
|
||||||
// adding sreg support to an XRDS file or in an OpenID namespace
|
|
||||||
// declaration.
|
|
||||||
define('Auth_OpenID_SREG_NS_URI', Auth_OpenID_SREG_NS_URI_1_1);
|
|
||||||
|
|
||||||
Auth_OpenID_registerNamespaceAlias(Auth_OpenID_SREG_NS_URI_1_1, 'sreg');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Does the given endpoint advertise support for simple
|
|
||||||
* registration?
|
|
||||||
*
|
|
||||||
* $endpoint: The endpoint object as returned by OpenID discovery.
|
|
||||||
* returns whether an sreg type was advertised by the endpoint
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_supportsSReg(&$endpoint)
|
|
||||||
{
|
|
||||||
return ($endpoint->usesExtension(Auth_OpenID_SREG_NS_URI_1_1) ||
|
|
||||||
$endpoint->usesExtension(Auth_OpenID_SREG_NS_URI_1_0));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A base class for classes dealing with Simple Registration protocol
|
|
||||||
* messages.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_SRegBase extends Auth_OpenID_Extension {
|
|
||||||
/**
|
|
||||||
* Extract the simple registration namespace URI from the given
|
|
||||||
* OpenID message. Handles OpenID 1 and 2, as well as both sreg
|
|
||||||
* namespace URIs found in the wild, as well as missing namespace
|
|
||||||
* definitions (for OpenID 1)
|
|
||||||
*
|
|
||||||
* $message: The OpenID message from which to parse simple
|
|
||||||
* registration fields. This may be a request or response message.
|
|
||||||
*
|
|
||||||
* Returns the sreg namespace URI for the supplied message. The
|
|
||||||
* message may be modified to define a simple registration
|
|
||||||
* namespace.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _getSRegNS(&$message)
|
|
||||||
{
|
|
||||||
$alias = null;
|
|
||||||
$found_ns_uri = null;
|
|
||||||
|
|
||||||
// See if there exists an alias for one of the two defined
|
|
||||||
// simple registration types.
|
|
||||||
foreach (array(Auth_OpenID_SREG_NS_URI_1_1,
|
|
||||||
Auth_OpenID_SREG_NS_URI_1_0) as $sreg_ns_uri) {
|
|
||||||
$alias = $message->namespaces->getAlias($sreg_ns_uri);
|
|
||||||
if ($alias !== null) {
|
|
||||||
$found_ns_uri = $sreg_ns_uri;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($alias === null) {
|
|
||||||
// There is no alias for either of the types, so try to
|
|
||||||
// add one. We default to using the modern value (1.1)
|
|
||||||
$found_ns_uri = Auth_OpenID_SREG_NS_URI_1_1;
|
|
||||||
if ($message->namespaces->addAlias(Auth_OpenID_SREG_NS_URI_1_1,
|
|
||||||
'sreg') === null) {
|
|
||||||
// An alias for the string 'sreg' already exists, but
|
|
||||||
// it's defined for something other than simple
|
|
||||||
// registration
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $found_ns_uri;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An object to hold the state of a simple registration request.
|
|
||||||
*
|
|
||||||
* required: A list of the required fields in this simple registration
|
|
||||||
* request
|
|
||||||
*
|
|
||||||
* optional: A list of the optional fields in this simple registration
|
|
||||||
* request
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_SRegRequest extends Auth_OpenID_SRegBase {
|
|
||||||
|
|
||||||
var $ns_alias = 'sreg';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Initialize an empty simple registration request.
|
|
||||||
*/
|
|
||||||
function build($required=null, $optional=null,
|
|
||||||
$policy_url=null,
|
|
||||||
$sreg_ns_uri=Auth_OpenID_SREG_NS_URI)
|
|
||||||
{
|
|
||||||
$obj = new Auth_OpenID_SRegRequest();
|
|
||||||
|
|
||||||
$obj->required = array();
|
|
||||||
$obj->optional = array();
|
|
||||||
$obj->policy_url = $policy_url;
|
|
||||||
$obj->ns_uri = $sreg_ns_uri;
|
|
||||||
|
|
||||||
if ($required) {
|
|
||||||
if (!$obj->requestFields($required, true, true)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($optional) {
|
|
||||||
if (!$obj->requestFields($optional, false, true)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $obj;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create a simple registration request that contains the fields
|
|
||||||
* that were requested in the OpenID request with the given
|
|
||||||
* arguments
|
|
||||||
*
|
|
||||||
* $message: The arguments that were given for this OpenID
|
|
||||||
* authentication request
|
|
||||||
*
|
|
||||||
* Returns the newly created simple registration request
|
|
||||||
*/
|
|
||||||
function fromOpenIDRequest($message)
|
|
||||||
{
|
|
||||||
$obj = Auth_OpenID_SRegRequest::build();
|
|
||||||
|
|
||||||
// Since we're going to mess with namespace URI mapping, don't
|
|
||||||
// mutate the object that was passed in.
|
|
||||||
$m = $message;
|
|
||||||
|
|
||||||
$obj->ns_uri = $obj->_getSRegNS($m);
|
|
||||||
$args = $m->getArgs($obj->ns_uri);
|
|
||||||
|
|
||||||
if ($args === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$obj->parseExtensionArgs($args);
|
|
||||||
|
|
||||||
return $obj;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Parse the unqualified simple registration request parameters
|
|
||||||
* and add them to this object.
|
|
||||||
*
|
|
||||||
* This method is essentially the inverse of
|
|
||||||
* getExtensionArgs. This method restores the serialized simple
|
|
||||||
* registration request fields.
|
|
||||||
*
|
|
||||||
* If you are extracting arguments from a standard OpenID
|
|
||||||
* checkid_* request, you probably want to use fromOpenIDRequest,
|
|
||||||
* which will extract the sreg namespace and arguments from the
|
|
||||||
* OpenID request. This method is intended for cases where the
|
|
||||||
* OpenID server needs more control over how the arguments are
|
|
||||||
* parsed than that method provides.
|
|
||||||
*
|
|
||||||
* $args == $message->getArgs($ns_uri);
|
|
||||||
* $request->parseExtensionArgs($args);
|
|
||||||
*
|
|
||||||
* $args: The unqualified simple registration arguments
|
|
||||||
*
|
|
||||||
* strict: Whether requests with fields that are not defined in
|
|
||||||
* the simple registration specification should be tolerated (and
|
|
||||||
* ignored)
|
|
||||||
*/
|
|
||||||
function parseExtensionArgs($args, $strict=false)
|
|
||||||
{
|
|
||||||
foreach (array('required', 'optional') as $list_name) {
|
|
||||||
$required = ($list_name == 'required');
|
|
||||||
$items = Auth_OpenID::arrayGet($args, $list_name);
|
|
||||||
if ($items) {
|
|
||||||
foreach (explode(',', $items) as $field_name) {
|
|
||||||
if (!$this->requestField($field_name, $required, $strict)) {
|
|
||||||
if ($strict) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->policy_url = Auth_OpenID::arrayGet($args, 'policy_url');
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A list of all of the simple registration fields that were
|
|
||||||
* requested, whether they were required or optional.
|
|
||||||
*/
|
|
||||||
function allRequestedFields()
|
|
||||||
{
|
|
||||||
return array_merge($this->required, $this->optional);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Have any simple registration fields been requested?
|
|
||||||
*/
|
|
||||||
function wereFieldsRequested()
|
|
||||||
{
|
|
||||||
return count($this->allRequestedFields());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Was this field in the request?
|
|
||||||
*/
|
|
||||||
function contains($field_name)
|
|
||||||
{
|
|
||||||
return (in_array($field_name, $this->required) ||
|
|
||||||
in_array($field_name, $this->optional));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Request the specified field from the OpenID user
|
|
||||||
*
|
|
||||||
* $field_name: the unqualified simple registration field name
|
|
||||||
*
|
|
||||||
* required: whether the given field should be presented to the
|
|
||||||
* user as being a required to successfully complete the request
|
|
||||||
*
|
|
||||||
* strict: whether to raise an exception when a field is added to
|
|
||||||
* a request more than once
|
|
||||||
*/
|
|
||||||
function requestField($field_name,
|
|
||||||
$required=false, $strict=false)
|
|
||||||
{
|
|
||||||
if (!Auth_OpenID_checkFieldName($field_name)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($strict) {
|
|
||||||
if ($this->contains($field_name)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if (in_array($field_name, $this->required)) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (in_array($field_name, $this->optional)) {
|
|
||||||
if ($required) {
|
|
||||||
unset($this->optional[array_search($field_name,
|
|
||||||
$this->optional)]);
|
|
||||||
} else {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($required) {
|
|
||||||
$this->required[] = $field_name;
|
|
||||||
} else {
|
|
||||||
$this->optional[] = $field_name;
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Add the given list of fields to the request
|
|
||||||
*
|
|
||||||
* field_names: The simple registration data fields to request
|
|
||||||
*
|
|
||||||
* required: Whether these values should be presented to the user
|
|
||||||
* as required
|
|
||||||
*
|
|
||||||
* strict: whether to raise an exception when a field is added to
|
|
||||||
* a request more than once
|
|
||||||
*/
|
|
||||||
function requestFields($field_names, $required=false, $strict=false)
|
|
||||||
{
|
|
||||||
if (!is_array($field_names)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($field_names as $field_name) {
|
|
||||||
if (!$this->requestField($field_name, $required, $strict=$strict)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get a dictionary of unqualified simple registration arguments
|
|
||||||
* representing this request.
|
|
||||||
*
|
|
||||||
* This method is essentially the inverse of
|
|
||||||
* C{L{parseExtensionArgs}}. This method serializes the simple
|
|
||||||
* registration request fields.
|
|
||||||
*/
|
|
||||||
function getExtensionArgs()
|
|
||||||
{
|
|
||||||
$args = array();
|
|
||||||
|
|
||||||
if ($this->required) {
|
|
||||||
$args['required'] = implode(',', $this->required);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($this->optional) {
|
|
||||||
$args['optional'] = implode(',', $this->optional);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($this->policy_url) {
|
|
||||||
$args['policy_url'] = $this->policy_url;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $args;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Represents the data returned in a simple registration response
|
|
||||||
* inside of an OpenID C{id_res} response. This object will be created
|
|
||||||
* by the OpenID server, added to the C{id_res} response object, and
|
|
||||||
* then extracted from the C{id_res} message by the Consumer.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_SRegResponse extends Auth_OpenID_SRegBase {
|
|
||||||
|
|
||||||
var $ns_alias = 'sreg';
|
|
||||||
|
|
||||||
function Auth_OpenID_SRegResponse($data=null,
|
|
||||||
$sreg_ns_uri=Auth_OpenID_SREG_NS_URI)
|
|
||||||
{
|
|
||||||
if ($data === null) {
|
|
||||||
$this->data = array();
|
|
||||||
} else {
|
|
||||||
$this->data = $data;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->ns_uri = $sreg_ns_uri;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Take a C{L{SRegRequest}} and a dictionary of simple
|
|
||||||
* registration values and create a C{L{SRegResponse}} object
|
|
||||||
* containing that data.
|
|
||||||
*
|
|
||||||
* request: The simple registration request object
|
|
||||||
*
|
|
||||||
* data: The simple registration data for this response, as a
|
|
||||||
* dictionary from unqualified simple registration field name to
|
|
||||||
* string (unicode) value. For instance, the nickname should be
|
|
||||||
* stored under the key 'nickname'.
|
|
||||||
*/
|
|
||||||
function extractResponse($request, $data)
|
|
||||||
{
|
|
||||||
$obj = new Auth_OpenID_SRegResponse();
|
|
||||||
$obj->ns_uri = $request->ns_uri;
|
|
||||||
|
|
||||||
foreach ($request->allRequestedFields() as $field) {
|
|
||||||
$value = Auth_OpenID::arrayGet($data, $field);
|
|
||||||
if ($value !== null) {
|
|
||||||
$obj->data[$field] = $value;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $obj;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create a C{L{SRegResponse}} object from a successful OpenID
|
|
||||||
* library response
|
|
||||||
* (C{L{openid.consumer.consumer.SuccessResponse}}) response
|
|
||||||
* message
|
|
||||||
*
|
|
||||||
* success_response: A SuccessResponse from consumer.complete()
|
|
||||||
*
|
|
||||||
* signed_only: Whether to process only data that was
|
|
||||||
* signed in the id_res message from the server.
|
|
||||||
*
|
|
||||||
* Returns a simple registration response containing the data that
|
|
||||||
* was supplied with the C{id_res} response.
|
|
||||||
*/
|
|
||||||
function fromSuccessResponse(&$success_response, $signed_only=true)
|
|
||||||
{
|
|
||||||
global $Auth_OpenID_sreg_data_fields;
|
|
||||||
|
|
||||||
$obj = new Auth_OpenID_SRegResponse();
|
|
||||||
$obj->ns_uri = $obj->_getSRegNS($success_response->message);
|
|
||||||
|
|
||||||
if ($signed_only) {
|
|
||||||
$args = $success_response->getSignedNS($obj->ns_uri);
|
|
||||||
} else {
|
|
||||||
$args = $success_response->message->getArgs($obj->ns_uri);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($args === null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($Auth_OpenID_sreg_data_fields as $field_name => $desc) {
|
|
||||||
if (in_array($field_name, array_keys($args))) {
|
|
||||||
$obj->data[$field_name] = $args[$field_name];
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $obj;
|
|
||||||
}
|
|
||||||
|
|
||||||
function getExtensionArgs()
|
|
||||||
{
|
|
||||||
return $this->data;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Read-only dictionary interface
|
|
||||||
function get($field_name, $default=null)
|
|
||||||
{
|
|
||||||
if (!Auth_OpenID_checkFieldName($field_name)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
return Auth_OpenID::arrayGet($this->data, $field_name, $default);
|
|
||||||
}
|
|
||||||
|
|
||||||
function contents()
|
|
||||||
{
|
|
||||||
return $this->data;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Convenience function for copying all the sreg data that was
|
|
||||||
* requested from a supplied set of sreg data into the response
|
|
||||||
* message. If no data were requested, no data will be sent.
|
|
||||||
*
|
|
||||||
* openid_request: The OpenID (checkid_*) request that may be
|
|
||||||
* requesting sreg data.
|
|
||||||
*
|
|
||||||
* data: The simple registration data to send. All requested fields
|
|
||||||
* that are present in this dictionary will be added to the response
|
|
||||||
* message.
|
|
||||||
*
|
|
||||||
* openid_response: The OpenID C{id_res} response to which the simple
|
|
||||||
* registration data should be added
|
|
||||||
*
|
|
||||||
* Does not return a value; updates the openid_response instead.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_sendSRegFields(&$openid_request, $data, &$openid_response)
|
|
||||||
{
|
|
||||||
$sreg_request = Auth_OpenID_SRegRequest::fromOpenIDRequest(
|
|
||||||
$openid_request->message);
|
|
||||||
$sreg_response = Auth_OpenID_SRegResponse::extractResponse(
|
|
||||||
$sreg_request, $data);
|
|
||||||
$sreg_response->toMessage($openid_response->fields);
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,1637 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* OpenID server protocol and logic.
|
|
||||||
*
|
|
||||||
* Overview
|
|
||||||
*
|
|
||||||
* An OpenID server must perform three tasks:
|
|
||||||
*
|
|
||||||
* 1. Examine the incoming request to determine its nature and validity.
|
|
||||||
* 2. Make a decision about how to respond to this request.
|
|
||||||
* 3. Format the response according to the protocol.
|
|
||||||
*
|
|
||||||
* The first and last of these tasks may performed by the {@link
|
|
||||||
* Auth_OpenID_Server::decodeRequest()} and {@link
|
|
||||||
* Auth_OpenID_Server::encodeResponse} methods. Who gets to do the
|
|
||||||
* intermediate task -- deciding how to respond to the request -- will
|
|
||||||
* depend on what type of request it is.
|
|
||||||
*
|
|
||||||
* If it's a request to authenticate a user (a 'checkid_setup' or
|
|
||||||
* 'checkid_immediate' request), you need to decide if you will assert
|
|
||||||
* that this user may claim the identity in question. Exactly how you
|
|
||||||
* do that is a matter of application policy, but it generally
|
|
||||||
* involves making sure the user has an account with your system and
|
|
||||||
* is logged in, checking to see if that identity is hers to claim,
|
|
||||||
* and verifying with the user that she does consent to releasing that
|
|
||||||
* information to the party making the request.
|
|
||||||
*
|
|
||||||
* Examine the properties of the {@link Auth_OpenID_CheckIDRequest}
|
|
||||||
* object, and if and when you've come to a decision, form a response
|
|
||||||
* by calling {@link Auth_OpenID_CheckIDRequest::answer()}.
|
|
||||||
*
|
|
||||||
* Other types of requests relate to establishing associations between
|
|
||||||
* client and server and verifing the authenticity of previous
|
|
||||||
* communications. {@link Auth_OpenID_Server} contains all the logic
|
|
||||||
* and data necessary to respond to such requests; just pass it to
|
|
||||||
* {@link Auth_OpenID_Server::handleRequest()}.
|
|
||||||
*
|
|
||||||
* OpenID Extensions
|
|
||||||
*
|
|
||||||
* Do you want to provide other information for your users in addition
|
|
||||||
* to authentication? Version 1.2 of the OpenID protocol allows
|
|
||||||
* consumers to add extensions to their requests. For example, with
|
|
||||||
* sites using the Simple Registration
|
|
||||||
* Extension
|
|
||||||
* (http://www.openidenabled.com/openid/simple-registration-extension/),
|
|
||||||
* a user can agree to have their nickname and e-mail address sent to
|
|
||||||
* a site when they sign up.
|
|
||||||
*
|
|
||||||
* Since extensions do not change the way OpenID authentication works,
|
|
||||||
* code to handle extension requests may be completely separate from
|
|
||||||
* the {@link Auth_OpenID_Request} class here. But you'll likely want
|
|
||||||
* data sent back by your extension to be signed. {@link
|
|
||||||
* Auth_OpenID_ServerResponse} provides methods with which you can add
|
|
||||||
* data to it which can be signed with the other data in the OpenID
|
|
||||||
* signature.
|
|
||||||
*
|
|
||||||
* For example:
|
|
||||||
*
|
|
||||||
* <pre> // when request is a checkid_* request
|
|
||||||
* $response = $request->answer(true);
|
|
||||||
* // this will a signed 'openid.sreg.timezone' parameter to the response
|
|
||||||
* response.addField('sreg', 'timezone', 'America/Los_Angeles')</pre>
|
|
||||||
*
|
|
||||||
* Stores
|
|
||||||
*
|
|
||||||
* The OpenID server needs to maintain state between requests in order
|
|
||||||
* to function. Its mechanism for doing this is called a store. The
|
|
||||||
* store interface is defined in Interface.php. Additionally, several
|
|
||||||
* concrete store implementations are provided, so that most sites
|
|
||||||
* won't need to implement a custom store. For a store backed by flat
|
|
||||||
* files on disk, see {@link Auth_OpenID_FileStore}. For stores based
|
|
||||||
* on MySQL, SQLite, or PostgreSQL, see the {@link
|
|
||||||
* Auth_OpenID_SQLStore} subclasses.
|
|
||||||
*
|
|
||||||
* Upgrading
|
|
||||||
*
|
|
||||||
* The keys by which a server looks up associations in its store have
|
|
||||||
* changed in version 1.2 of this library. If your store has entries
|
|
||||||
* created from version 1.0 code, you should empty it.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Required imports
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID.php";
|
|
||||||
require_once "Auth/OpenID/Association.php";
|
|
||||||
require_once "Auth/OpenID/CryptUtil.php";
|
|
||||||
require_once "Auth/OpenID/BigMath.php";
|
|
||||||
require_once "Auth/OpenID/DiffieHellman.php";
|
|
||||||
require_once "Auth/OpenID/KVForm.php";
|
|
||||||
require_once "Auth/OpenID/TrustRoot.php";
|
|
||||||
require_once "Auth/OpenID/ServerRequest.php";
|
|
||||||
require_once "Auth/OpenID/Message.php";
|
|
||||||
require_once "Auth/OpenID/Nonce.php";
|
|
||||||
|
|
||||||
define('AUTH_OPENID_HTTP_OK', 200);
|
|
||||||
define('AUTH_OPENID_HTTP_REDIRECT', 302);
|
|
||||||
define('AUTH_OPENID_HTTP_ERROR', 400);
|
|
||||||
|
|
||||||
global $_Auth_OpenID_Request_Modes,
|
|
||||||
$_Auth_OpenID_Encode_Kvform,
|
|
||||||
$_Auth_OpenID_Encode_Url;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
$_Auth_OpenID_Request_Modes = array('checkid_setup',
|
|
||||||
'checkid_immediate');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
$_Auth_OpenID_Encode_Kvform = array('kfvorm');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
$_Auth_OpenID_Encode_Url = array('URL/redirect');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_isError($obj, $cls = 'Auth_OpenID_ServerError')
|
|
||||||
{
|
|
||||||
return is_a($obj, $cls);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An error class which gets instantiated and returned whenever an
|
|
||||||
* OpenID protocol error occurs. Be prepared to use this in place of
|
|
||||||
* an ordinary server response.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_ServerError {
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_ServerError($message = null, $text = null,
|
|
||||||
$reference = null, $contact = null)
|
|
||||||
{
|
|
||||||
$this->message = $message;
|
|
||||||
$this->text = $text;
|
|
||||||
$this->contact = $contact;
|
|
||||||
$this->reference = $reference;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the return_to URL for the request which caused this
|
|
||||||
* error.
|
|
||||||
*/
|
|
||||||
function hasReturnTo()
|
|
||||||
{
|
|
||||||
if ($this->message) {
|
|
||||||
return $this->message->hasKey(Auth_OpenID_OPENID_NS,
|
|
||||||
'return_to');
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Encodes this error's response as a URL suitable for
|
|
||||||
* redirection. If the response has no return_to, another
|
|
||||||
* Auth_OpenID_ServerError is returned.
|
|
||||||
*/
|
|
||||||
function encodeToURL()
|
|
||||||
{
|
|
||||||
if (!$this->message) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$return_to = $this->message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'return_to');
|
|
||||||
if (!$return_to) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
return Auth_OpenID::appendArgs($return_to,
|
|
||||||
array('openid.mode' => 'error',
|
|
||||||
'openid.error' => $this->toString()));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Encodes the response to key-value form. This is a
|
|
||||||
* machine-readable format used to respond to messages which came
|
|
||||||
* directly from the consumer and not through the user-agent. See
|
|
||||||
* the OpenID specification.
|
|
||||||
*/
|
|
||||||
function encodeToKVForm()
|
|
||||||
{
|
|
||||||
return Auth_OpenID_KVForm::fromArray(
|
|
||||||
array('mode' => 'error',
|
|
||||||
'error' => $this->toString()));
|
|
||||||
}
|
|
||||||
|
|
||||||
function toMessage()
|
|
||||||
{
|
|
||||||
// Generate a Message object for sending to the relying party,
|
|
||||||
// after encoding.
|
|
||||||
$namespace = $this->message->getOpenIDNamespace();
|
|
||||||
$reply = new Auth_OpenID_Message($namespace);
|
|
||||||
$reply->setArg(Auth_OpenID_OPENID_NS, 'mode', 'error');
|
|
||||||
$reply->setArg(Auth_OpenID_OPENID_NS, 'error', $this->toString());
|
|
||||||
|
|
||||||
if ($this->contact !== null) {
|
|
||||||
$reply->setArg(Auth_OpenID_OPENID_NS, 'contact', $this->contact);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($this->reference !== null) {
|
|
||||||
$reply->setArg(Auth_OpenID_OPENID_NS, 'reference',
|
|
||||||
$this->reference);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $reply;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns one of $_Auth_OpenID_Encode_Url,
|
|
||||||
* $_Auth_OpenID_Encode_Kvform, or null, depending on the type of
|
|
||||||
* encoding expected for this error's payload.
|
|
||||||
*/
|
|
||||||
function whichEncoding()
|
|
||||||
{
|
|
||||||
global $_Auth_OpenID_Encode_Url,
|
|
||||||
$_Auth_OpenID_Encode_Kvform,
|
|
||||||
$_Auth_OpenID_Request_Modes;
|
|
||||||
|
|
||||||
if ($this->hasReturnTo()) {
|
|
||||||
return $_Auth_OpenID_Encode_Url;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$this->message) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$mode = $this->message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'mode');
|
|
||||||
|
|
||||||
if ($mode) {
|
|
||||||
if (!in_array($mode, $_Auth_OpenID_Request_Modes)) {
|
|
||||||
return $_Auth_OpenID_Encode_Kvform;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns this error message.
|
|
||||||
*/
|
|
||||||
function toString()
|
|
||||||
{
|
|
||||||
if ($this->text) {
|
|
||||||
return $this->text;
|
|
||||||
} else {
|
|
||||||
return get_class($this) . " error";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Error returned by the server code when a return_to is absent from a
|
|
||||||
* request.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_NoReturnToError extends Auth_OpenID_ServerError {
|
|
||||||
function Auth_OpenID_NoReturnToError($message = null,
|
|
||||||
$text = "No return_to URL available")
|
|
||||||
{
|
|
||||||
parent::Auth_OpenID_ServerError($message, $text);
|
|
||||||
}
|
|
||||||
|
|
||||||
function toString()
|
|
||||||
{
|
|
||||||
return "No return_to available";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An error indicating that the return_to URL is malformed.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_MalformedReturnURL extends Auth_OpenID_ServerError {
|
|
||||||
function Auth_OpenID_MalformedReturnURL($message, $return_to)
|
|
||||||
{
|
|
||||||
$this->return_to = $return_to;
|
|
||||||
parent::Auth_OpenID_ServerError($message, "malformed return_to URL");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This error is returned when the trust_root value is malformed.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_MalformedTrustRoot extends Auth_OpenID_ServerError {
|
|
||||||
function Auth_OpenID_MalformedTrustRoot($message = null,
|
|
||||||
$text = "Malformed trust root")
|
|
||||||
{
|
|
||||||
parent::Auth_OpenID_ServerError($message, $text);
|
|
||||||
}
|
|
||||||
|
|
||||||
function toString()
|
|
||||||
{
|
|
||||||
return "Malformed trust root";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The base class for all server request classes.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_Request {
|
|
||||||
var $mode = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A request to verify the validity of a previous response.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_CheckAuthRequest extends Auth_OpenID_Request {
|
|
||||||
var $mode = "check_authentication";
|
|
||||||
var $invalidate_handle = null;
|
|
||||||
|
|
||||||
function Auth_OpenID_CheckAuthRequest($assoc_handle, $signed,
|
|
||||||
$invalidate_handle = null)
|
|
||||||
{
|
|
||||||
$this->assoc_handle = $assoc_handle;
|
|
||||||
$this->signed = $signed;
|
|
||||||
if ($invalidate_handle !== null) {
|
|
||||||
$this->invalidate_handle = $invalidate_handle;
|
|
||||||
}
|
|
||||||
$this->namespace = Auth_OpenID_OPENID2_NS;
|
|
||||||
$this->message = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
function fromMessage($message, $server=null)
|
|
||||||
{
|
|
||||||
$required_keys = array('assoc_handle', 'sig', 'signed');
|
|
||||||
|
|
||||||
foreach ($required_keys as $k) {
|
|
||||||
if (!$message->getArg(Auth_OpenID_OPENID_NS, $k)) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
sprintf("%s request missing required parameter %s from \
|
|
||||||
query", "check_authentication", $k));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$assoc_handle = $message->getArg(Auth_OpenID_OPENID_NS, 'assoc_handle');
|
|
||||||
$sig = $message->getArg(Auth_OpenID_OPENID_NS, 'sig');
|
|
||||||
|
|
||||||
$signed_list = $message->getArg(Auth_OpenID_OPENID_NS, 'signed');
|
|
||||||
$signed_list = explode(",", $signed_list);
|
|
||||||
|
|
||||||
foreach ($signed_list as $field) {
|
|
||||||
if (!$message->hasKey(Auth_OpenID_OPENID_NS, $field)) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
sprintf("Couldn't find signed field %s in query",
|
|
||||||
$field));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$signed = $message;
|
|
||||||
if ($signed->hasKey(Auth_OpenID_OPENID_NS, 'mode')) {
|
|
||||||
$signed->setArg(Auth_OpenID_OPENID_NS, 'mode', 'id_res');
|
|
||||||
}
|
|
||||||
|
|
||||||
$result = new Auth_OpenID_CheckAuthRequest($assoc_handle, $signed);
|
|
||||||
$result->message = $message;
|
|
||||||
$result->sig = $sig;
|
|
||||||
$result->invalidate_handle = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'invalidate_handle');
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
function answer(&$signatory)
|
|
||||||
{
|
|
||||||
$is_valid = $signatory->verify($this->assoc_handle, $this->signed);
|
|
||||||
|
|
||||||
// Now invalidate that assoc_handle so it this checkAuth
|
|
||||||
// message cannot be replayed.
|
|
||||||
$signatory->invalidate($this->assoc_handle, true);
|
|
||||||
$response = new Auth_OpenID_ServerResponse($this);
|
|
||||||
|
|
||||||
$response->fields->setArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'is_valid',
|
|
||||||
($is_valid ? "true" : "false"));
|
|
||||||
|
|
||||||
if ($this->invalidate_handle) {
|
|
||||||
$assoc = $signatory->getAssociation($this->invalidate_handle,
|
|
||||||
false);
|
|
||||||
if (!$assoc) {
|
|
||||||
$response->fields->setArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'invalidate_handle',
|
|
||||||
$this->invalidate_handle);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return $response;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A class implementing plaintext server sessions.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_PlainTextServerSession {
|
|
||||||
/**
|
|
||||||
* An object that knows how to handle association requests with no
|
|
||||||
* session type.
|
|
||||||
*/
|
|
||||||
var $session_type = 'no-encryption';
|
|
||||||
var $needs_math = false;
|
|
||||||
var $allowed_assoc_types = array('HMAC-SHA1', 'HMAC-SHA256');
|
|
||||||
|
|
||||||
function fromMessage($unused_request)
|
|
||||||
{
|
|
||||||
return new Auth_OpenID_PlainTextServerSession();
|
|
||||||
}
|
|
||||||
|
|
||||||
function answer($secret)
|
|
||||||
{
|
|
||||||
return array('mac_key' => base64_encode($secret));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A class implementing DH-SHA1 server sessions.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_DiffieHellmanSHA1ServerSession {
|
|
||||||
/**
|
|
||||||
* An object that knows how to handle association requests with
|
|
||||||
* the Diffie-Hellman session type.
|
|
||||||
*/
|
|
||||||
|
|
||||||
var $session_type = 'DH-SHA1';
|
|
||||||
var $needs_math = true;
|
|
||||||
var $allowed_assoc_types = array('HMAC-SHA1');
|
|
||||||
var $hash_func = 'Auth_OpenID_SHA1';
|
|
||||||
|
|
||||||
function Auth_OpenID_DiffieHellmanSHA1ServerSession($dh, $consumer_pubkey)
|
|
||||||
{
|
|
||||||
$this->dh = $dh;
|
|
||||||
$this->consumer_pubkey = $consumer_pubkey;
|
|
||||||
}
|
|
||||||
|
|
||||||
function getDH($message)
|
|
||||||
{
|
|
||||||
$dh_modulus = $message->getArg(Auth_OpenID_OPENID_NS, 'dh_modulus');
|
|
||||||
$dh_gen = $message->getArg(Auth_OpenID_OPENID_NS, 'dh_gen');
|
|
||||||
|
|
||||||
if ((($dh_modulus === null) && ($dh_gen !== null)) ||
|
|
||||||
(($dh_gen === null) && ($dh_modulus !== null))) {
|
|
||||||
|
|
||||||
if ($dh_modulus === null) {
|
|
||||||
$missing = 'modulus';
|
|
||||||
} else {
|
|
||||||
$missing = 'generator';
|
|
||||||
}
|
|
||||||
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
'If non-default modulus or generator is '.
|
|
||||||
'supplied, both must be supplied. Missing '.
|
|
||||||
$missing);
|
|
||||||
}
|
|
||||||
|
|
||||||
$lib =& Auth_OpenID_getMathLib();
|
|
||||||
|
|
||||||
if ($dh_modulus || $dh_gen) {
|
|
||||||
$dh_modulus = $lib->base64ToLong($dh_modulus);
|
|
||||||
$dh_gen = $lib->base64ToLong($dh_gen);
|
|
||||||
if ($lib->cmp($dh_modulus, 0) == 0 ||
|
|
||||||
$lib->cmp($dh_gen, 0) == 0) {
|
|
||||||
return new Auth_OpenID_ServerError(
|
|
||||||
$message, "Failed to parse dh_mod or dh_gen");
|
|
||||||
}
|
|
||||||
$dh = new Auth_OpenID_DiffieHellman($dh_modulus, $dh_gen);
|
|
||||||
} else {
|
|
||||||
$dh = new Auth_OpenID_DiffieHellman();
|
|
||||||
}
|
|
||||||
|
|
||||||
$consumer_pubkey = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'dh_consumer_public');
|
|
||||||
if ($consumer_pubkey === null) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
'Public key for DH-SHA1 session '.
|
|
||||||
'not found in query');
|
|
||||||
}
|
|
||||||
|
|
||||||
$consumer_pubkey =
|
|
||||||
$lib->base64ToLong($consumer_pubkey);
|
|
||||||
|
|
||||||
if ($consumer_pubkey === false) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
"dh_consumer_public is not base64");
|
|
||||||
}
|
|
||||||
|
|
||||||
return array($dh, $consumer_pubkey);
|
|
||||||
}
|
|
||||||
|
|
||||||
function fromMessage($message)
|
|
||||||
{
|
|
||||||
$result = Auth_OpenID_DiffieHellmanSHA1ServerSession::getDH($message);
|
|
||||||
|
|
||||||
if (is_a($result, 'Auth_OpenID_ServerError')) {
|
|
||||||
return $result;
|
|
||||||
} else {
|
|
||||||
list($dh, $consumer_pubkey) = $result;
|
|
||||||
return new Auth_OpenID_DiffieHellmanSHA1ServerSession($dh,
|
|
||||||
$consumer_pubkey);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function answer($secret)
|
|
||||||
{
|
|
||||||
$lib =& Auth_OpenID_getMathLib();
|
|
||||||
$mac_key = $this->dh->xorSecret($this->consumer_pubkey, $secret,
|
|
||||||
$this->hash_func);
|
|
||||||
return array(
|
|
||||||
'dh_server_public' =>
|
|
||||||
$lib->longToBase64($this->dh->public),
|
|
||||||
'enc_mac_key' => base64_encode($mac_key));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A class implementing DH-SHA256 server sessions.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_DiffieHellmanSHA256ServerSession
|
|
||||||
extends Auth_OpenID_DiffieHellmanSHA1ServerSession {
|
|
||||||
|
|
||||||
var $session_type = 'DH-SHA256';
|
|
||||||
var $hash_func = 'Auth_OpenID_SHA256';
|
|
||||||
var $allowed_assoc_types = array('HMAC-SHA256');
|
|
||||||
|
|
||||||
function fromMessage($message)
|
|
||||||
{
|
|
||||||
$result = Auth_OpenID_DiffieHellmanSHA1ServerSession::getDH($message);
|
|
||||||
|
|
||||||
if (is_a($result, 'Auth_OpenID_ServerError')) {
|
|
||||||
return $result;
|
|
||||||
} else {
|
|
||||||
list($dh, $consumer_pubkey) = $result;
|
|
||||||
return new Auth_OpenID_DiffieHellmanSHA256ServerSession($dh,
|
|
||||||
$consumer_pubkey);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A request to associate with the server.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_AssociateRequest extends Auth_OpenID_Request {
|
|
||||||
var $mode = "associate";
|
|
||||||
|
|
||||||
function getSessionClasses()
|
|
||||||
{
|
|
||||||
return array(
|
|
||||||
'no-encryption' => 'Auth_OpenID_PlainTextServerSession',
|
|
||||||
'DH-SHA1' => 'Auth_OpenID_DiffieHellmanSHA1ServerSession',
|
|
||||||
'DH-SHA256' => 'Auth_OpenID_DiffieHellmanSHA256ServerSession');
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_AssociateRequest(&$session, $assoc_type)
|
|
||||||
{
|
|
||||||
$this->session =& $session;
|
|
||||||
$this->namespace = Auth_OpenID_OPENID2_NS;
|
|
||||||
$this->assoc_type = $assoc_type;
|
|
||||||
}
|
|
||||||
|
|
||||||
function fromMessage($message, $server=null)
|
|
||||||
{
|
|
||||||
if ($message->isOpenID1()) {
|
|
||||||
$session_type = $message->getArg(Auth_OpenID_OPENID1_NS,
|
|
||||||
'session_type');
|
|
||||||
|
|
||||||
if ($session_type == 'no-encryption') {
|
|
||||||
// oidutil.log('Received OpenID 1 request with a no-encryption '
|
|
||||||
// 'assocaition session type. Continuing anyway.')
|
|
||||||
} else if (!$session_type) {
|
|
||||||
$session_type = 'no-encryption';
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$session_type = $message->getArg(Auth_OpenID_OPENID2_NS,
|
|
||||||
'session_type');
|
|
||||||
if ($session_type === null) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
"session_type missing from request");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$session_class = Auth_OpenID::arrayGet(
|
|
||||||
Auth_OpenID_AssociateRequest::getSessionClasses(),
|
|
||||||
$session_type);
|
|
||||||
|
|
||||||
if ($session_class === null) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
"Unknown session type " .
|
|
||||||
$session_type);
|
|
||||||
}
|
|
||||||
|
|
||||||
$session = call_user_func(array($session_class, 'fromMessage'),
|
|
||||||
$message);
|
|
||||||
if (is_a($session, 'Auth_OpenID_ServerError')) {
|
|
||||||
return $session;
|
|
||||||
}
|
|
||||||
|
|
||||||
$assoc_type = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'assoc_type', 'HMAC-SHA1');
|
|
||||||
|
|
||||||
if (!in_array($assoc_type, $session->allowed_assoc_types)) {
|
|
||||||
$fmt = "Session type %s does not support association type %s";
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
sprintf($fmt, $session_type, $assoc_type));
|
|
||||||
}
|
|
||||||
|
|
||||||
$obj = new Auth_OpenID_AssociateRequest($session, $assoc_type);
|
|
||||||
$obj->message = $message;
|
|
||||||
$obj->namespace = $message->getOpenIDNamespace();
|
|
||||||
return $obj;
|
|
||||||
}
|
|
||||||
|
|
||||||
function answer($assoc)
|
|
||||||
{
|
|
||||||
$response = new Auth_OpenID_ServerResponse($this);
|
|
||||||
$response->fields->updateArgs(Auth_OpenID_OPENID_NS,
|
|
||||||
array(
|
|
||||||
'expires_in' => sprintf('%d', $assoc->getExpiresIn()),
|
|
||||||
'assoc_type' => $this->assoc_type,
|
|
||||||
'assoc_handle' => $assoc->handle));
|
|
||||||
|
|
||||||
$response->fields->updateArgs(Auth_OpenID_OPENID_NS,
|
|
||||||
$this->session->answer($assoc->secret));
|
|
||||||
|
|
||||||
if ($this->session->session_type != 'no-encryption') {
|
|
||||||
$response->fields->setArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'session_type',
|
|
||||||
$this->session->session_type);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $response;
|
|
||||||
}
|
|
||||||
|
|
||||||
function answerUnsupported($text_message,
|
|
||||||
$preferred_association_type=null,
|
|
||||||
$preferred_session_type=null)
|
|
||||||
{
|
|
||||||
if ($this->message->isOpenID1()) {
|
|
||||||
return new Auth_OpenID_ServerError($this->message);
|
|
||||||
}
|
|
||||||
|
|
||||||
$response = new Auth_OpenID_ServerResponse($this);
|
|
||||||
$response->fields->setArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'error_code', 'unsupported-type');
|
|
||||||
$response->fields->setArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'error', $text_message);
|
|
||||||
|
|
||||||
if ($preferred_association_type) {
|
|
||||||
$response->fields->setArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'assoc_type',
|
|
||||||
$preferred_association_type);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($preferred_session_type) {
|
|
||||||
$response->fields->setArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'session_type',
|
|
||||||
$preferred_session_type);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $response;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A request to confirm the identity of a user.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_CheckIDRequest extends Auth_OpenID_Request {
|
|
||||||
/**
|
|
||||||
* The mode of this request.
|
|
||||||
*/
|
|
||||||
var $mode = "checkid_setup"; // or "checkid_immediate"
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Whether this request is for immediate mode.
|
|
||||||
*/
|
|
||||||
var $immediate = false;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The trust_root value for this request.
|
|
||||||
*/
|
|
||||||
var $trust_root = null;
|
|
||||||
|
|
||||||
function make(&$message, $identity, $return_to, $trust_root = null,
|
|
||||||
$immediate = false, $assoc_handle = null, $server = null)
|
|
||||||
{
|
|
||||||
if ($server === null) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
"server must not be null");
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($return_to &&
|
|
||||||
!Auth_OpenID_TrustRoot::_parse($return_to)) {
|
|
||||||
return new Auth_OpenID_MalformedReturnURL($message, $return_to);
|
|
||||||
}
|
|
||||||
|
|
||||||
$r = new Auth_OpenID_CheckIDRequest($identity, $return_to,
|
|
||||||
$trust_root, $immediate,
|
|
||||||
$assoc_handle, $server);
|
|
||||||
|
|
||||||
$r->namespace = $message->getOpenIDNamespace();
|
|
||||||
$r->message =& $message;
|
|
||||||
|
|
||||||
if (!$r->trustRootValid()) {
|
|
||||||
return new Auth_OpenID_UntrustedReturnURL($message,
|
|
||||||
$return_to,
|
|
||||||
$trust_root);
|
|
||||||
} else {
|
|
||||||
return $r;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_CheckIDRequest($identity, $return_to,
|
|
||||||
$trust_root = null, $immediate = false,
|
|
||||||
$assoc_handle = null, $server = null)
|
|
||||||
{
|
|
||||||
$this->namespace = Auth_OpenID_OPENID2_NS;
|
|
||||||
$this->assoc_handle = $assoc_handle;
|
|
||||||
$this->identity = $identity;
|
|
||||||
$this->claimed_id = $identity;
|
|
||||||
$this->return_to = $return_to;
|
|
||||||
$this->trust_root = $trust_root;
|
|
||||||
$this->server =& $server;
|
|
||||||
|
|
||||||
if ($immediate) {
|
|
||||||
$this->immediate = true;
|
|
||||||
$this->mode = "checkid_immediate";
|
|
||||||
} else {
|
|
||||||
$this->immediate = false;
|
|
||||||
$this->mode = "checkid_setup";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function equals($other)
|
|
||||||
{
|
|
||||||
return (
|
|
||||||
(is_a($other, 'Auth_OpenID_CheckIDRequest')) &&
|
|
||||||
($this->namespace == $other->namespace) &&
|
|
||||||
($this->assoc_handle == $other->assoc_handle) &&
|
|
||||||
($this->identity == $other->identity) &&
|
|
||||||
($this->claimed_id == $other->claimed_id) &&
|
|
||||||
($this->return_to == $other->return_to) &&
|
|
||||||
($this->trust_root == $other->trust_root));
|
|
||||||
}
|
|
||||||
|
|
||||||
function fromMessage(&$message, $server)
|
|
||||||
{
|
|
||||||
$mode = $message->getArg(Auth_OpenID_OPENID_NS, 'mode');
|
|
||||||
$immediate = null;
|
|
||||||
|
|
||||||
if ($mode == "checkid_immediate") {
|
|
||||||
$immediate = true;
|
|
||||||
$mode = "checkid_immediate";
|
|
||||||
} else {
|
|
||||||
$immediate = false;
|
|
||||||
$mode = "checkid_setup";
|
|
||||||
}
|
|
||||||
|
|
||||||
$return_to = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'return_to');
|
|
||||||
|
|
||||||
$namespace = $message->getOpenIDNamespace();
|
|
||||||
|
|
||||||
if (($namespace == Auth_OpenID_OPENID1_NS) &&
|
|
||||||
(!$return_to)) {
|
|
||||||
$fmt = "Missing required field 'return_to' from checkid request";
|
|
||||||
return new Auth_OpenID_ServerError($message, $fmt);
|
|
||||||
}
|
|
||||||
|
|
||||||
$identity = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'identity');
|
|
||||||
|
|
||||||
if ($identity && $message->isOpenID2()) {
|
|
||||||
$claimed_id = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'claimed_id');
|
|
||||||
if (!$claimed_id) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
"OpenID 2.0 message contained openid.identity " .
|
|
||||||
"but not claimed_id");
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$claimed_id = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (($identity === null) &&
|
|
||||||
($namespace == Auth_OpenID_OPENID1_NS)) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
"OpenID 1 message did not contain openid.identity");
|
|
||||||
}
|
|
||||||
|
|
||||||
// There's a case for making self.trust_root be a TrustRoot
|
|
||||||
// here. But if TrustRoot isn't currently part of the
|
|
||||||
// "public" API, I'm not sure it's worth doing.
|
|
||||||
if ($namespace == Auth_OpenID_OPENID1_NS) {
|
|
||||||
$trust_root = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'trust_root',
|
|
||||||
$return_to);
|
|
||||||
} else {
|
|
||||||
$trust_root = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'realm',
|
|
||||||
$return_to);
|
|
||||||
|
|
||||||
if (($return_to === null) &&
|
|
||||||
($trust_root === null)) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
"openid.realm required when openid.return_to absent");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$assoc_handle = $message->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'assoc_handle');
|
|
||||||
|
|
||||||
$obj = Auth_OpenID_CheckIDRequest::make($message,
|
|
||||||
$identity,
|
|
||||||
$return_to,
|
|
||||||
$trust_root,
|
|
||||||
$immediate,
|
|
||||||
$assoc_handle,
|
|
||||||
$server);
|
|
||||||
|
|
||||||
if (is_a($obj, 'Auth_OpenID_ServerError')) {
|
|
||||||
return $obj;
|
|
||||||
}
|
|
||||||
|
|
||||||
$obj->claimed_id = $claimed_id;
|
|
||||||
|
|
||||||
return $obj;
|
|
||||||
}
|
|
||||||
|
|
||||||
function idSelect()
|
|
||||||
{
|
|
||||||
// Is the identifier to be selected by the IDP?
|
|
||||||
// So IDPs don't have to import the constant
|
|
||||||
return $this->identity == Auth_OpenID_IDENTIFIER_SELECT;
|
|
||||||
}
|
|
||||||
|
|
||||||
function trustRootValid()
|
|
||||||
{
|
|
||||||
if (!$this->trust_root) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
$tr = Auth_OpenID_TrustRoot::_parse($this->trust_root);
|
|
||||||
if ($tr === false) {
|
|
||||||
return new Auth_OpenID_MalformedTrustRoot(null, $this->trust_root);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($this->return_to !== null) {
|
|
||||||
return Auth_OpenID_TrustRoot::match($this->trust_root,
|
|
||||||
$this->return_to);
|
|
||||||
} else {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Respond to this request. Return either an
|
|
||||||
* {@link Auth_OpenID_ServerResponse} or
|
|
||||||
* {@link Auth_OpenID_ServerError}.
|
|
||||||
*
|
|
||||||
* @param bool $allow Allow this user to claim this identity, and
|
|
||||||
* allow the consumer to have this information?
|
|
||||||
*
|
|
||||||
* @param string $server_url DEPRECATED. Passing $op_endpoint to
|
|
||||||
* the {@link Auth_OpenID_Server} constructor makes this optional.
|
|
||||||
*
|
|
||||||
* When an OpenID 1.x immediate mode request does not succeed, it
|
|
||||||
* gets back a URL where the request may be carried out in a
|
|
||||||
* not-so-immediate fashion. Pass my URL in here (the fully
|
|
||||||
* qualified address of this server's endpoint, i.e.
|
|
||||||
* http://example.com/server), and I will use it as a base for the
|
|
||||||
* URL for a new request.
|
|
||||||
*
|
|
||||||
* Optional for requests where {@link $immediate} is false or
|
|
||||||
* $allow is true.
|
|
||||||
*
|
|
||||||
* @param string $identity The OP-local identifier to answer with.
|
|
||||||
* Only for use when the relying party requested identifier
|
|
||||||
* selection.
|
|
||||||
*
|
|
||||||
* @param string $claimed_id The claimed identifier to answer
|
|
||||||
* with, for use with identifier selection in the case where the
|
|
||||||
* claimed identifier and the OP-local identifier differ,
|
|
||||||
* i.e. when the claimed_id uses delegation.
|
|
||||||
*
|
|
||||||
* If $identity is provided but this is not, $claimed_id will
|
|
||||||
* default to the value of $identity. When answering requests
|
|
||||||
* that did not ask for identifier selection, the response
|
|
||||||
* $claimed_id will default to that of the request.
|
|
||||||
*
|
|
||||||
* This parameter is new in OpenID 2.0.
|
|
||||||
*
|
|
||||||
* @return mixed
|
|
||||||
*/
|
|
||||||
function answer($allow, $server_url = null, $identity = null,
|
|
||||||
$claimed_id = null)
|
|
||||||
{
|
|
||||||
if (!$this->return_to) {
|
|
||||||
return new Auth_OpenID_NoReturnToError();
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$server_url) {
|
|
||||||
if (($this->namespace != Auth_OpenID_OPENID1_NS) &&
|
|
||||||
(!$this->server->op_endpoint)) {
|
|
||||||
return new Auth_OpenID_ServerError(null,
|
|
||||||
"server should be constructed with op_endpoint to " .
|
|
||||||
"respond to OpenID 2.0 messages.");
|
|
||||||
}
|
|
||||||
|
|
||||||
$server_url = $this->server->op_endpoint;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($allow) {
|
|
||||||
$mode = 'id_res';
|
|
||||||
} else if ($this->namespace == Auth_OpenID_OPENID1_NS) {
|
|
||||||
if ($this->immediate) {
|
|
||||||
$mode = 'id_res';
|
|
||||||
} else {
|
|
||||||
$mode = 'cancel';
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if ($this->immediate) {
|
|
||||||
$mode = 'setup_needed';
|
|
||||||
} else {
|
|
||||||
$mode = 'cancel';
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$this->trustRootValid()) {
|
|
||||||
return new Auth_OpenID_UntrustedReturnURL(null,
|
|
||||||
$this->return_to,
|
|
||||||
$this->trust_root);
|
|
||||||
}
|
|
||||||
|
|
||||||
$response = new Auth_OpenID_ServerResponse($this);
|
|
||||||
|
|
||||||
if ($claimed_id &&
|
|
||||||
($this->namespace == Auth_OpenID_OPENID1_NS)) {
|
|
||||||
return new Auth_OpenID_ServerError(null,
|
|
||||||
"claimed_id is new in OpenID 2.0 and not " .
|
|
||||||
"available for ".$this->namespace);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($identity && !$claimed_id) {
|
|
||||||
$claimed_id = $identity;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($allow) {
|
|
||||||
|
|
||||||
if ($this->identity == Auth_OpenID_IDENTIFIER_SELECT) {
|
|
||||||
if (!$identity) {
|
|
||||||
return new Auth_OpenID_ServerError(null,
|
|
||||||
"This request uses IdP-driven identifier selection. " .
|
|
||||||
"You must supply an identifier in the response.");
|
|
||||||
}
|
|
||||||
|
|
||||||
$response_identity = $identity;
|
|
||||||
$response_claimed_id = $claimed_id;
|
|
||||||
|
|
||||||
} else if ($this->identity) {
|
|
||||||
if ($identity &&
|
|
||||||
($this->identity != $identity)) {
|
|
||||||
$fmt = "Request was for %s, cannot reply with identity %s";
|
|
||||||
return new Auth_OpenID_ServerError(null,
|
|
||||||
sprintf($fmt, $this->identity, $identity));
|
|
||||||
}
|
|
||||||
|
|
||||||
$response_identity = $this->identity;
|
|
||||||
$response_claimed_id = $this->claimed_id;
|
|
||||||
} else {
|
|
||||||
if ($identity) {
|
|
||||||
return new Auth_OpenID_ServerError(null,
|
|
||||||
"This request specified no identity and " .
|
|
||||||
"you supplied ".$identity);
|
|
||||||
}
|
|
||||||
|
|
||||||
$response_identity = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (($this->namespace == Auth_OpenID_OPENID1_NS) &&
|
|
||||||
($response_identity === null)) {
|
|
||||||
return new Auth_OpenID_ServerError(null,
|
|
||||||
"Request was an OpenID 1 request, so response must " .
|
|
||||||
"include an identifier.");
|
|
||||||
}
|
|
||||||
|
|
||||||
$response->fields->updateArgs(Auth_OpenID_OPENID_NS,
|
|
||||||
array('mode' => $mode,
|
|
||||||
'op_endpoint' => $server_url,
|
|
||||||
'return_to' => $this->return_to,
|
|
||||||
'response_nonce' => Auth_OpenID_mkNonce()));
|
|
||||||
|
|
||||||
if ($response_identity !== null) {
|
|
||||||
$response->fields->setArg(
|
|
||||||
Auth_OpenID_OPENID_NS,
|
|
||||||
'identity',
|
|
||||||
$response_identity);
|
|
||||||
if ($this->namespace == Auth_OpenID_OPENID2_NS) {
|
|
||||||
$response->fields->setArg(
|
|
||||||
Auth_OpenID_OPENID_NS,
|
|
||||||
'claimed_id',
|
|
||||||
$response_claimed_id);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
} else {
|
|
||||||
$response->fields->setArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'mode', $mode);
|
|
||||||
|
|
||||||
if ($this->immediate) {
|
|
||||||
if (($this->namespace == Auth_OpenID_OPENID1_NS) &&
|
|
||||||
(!$server_url)) {
|
|
||||||
return new Auth_OpenID_ServerError(null,
|
|
||||||
'setup_url is required for $allow=false \
|
|
||||||
in OpenID 1.x immediate mode.');
|
|
||||||
}
|
|
||||||
|
|
||||||
$setup_request =& new Auth_OpenID_CheckIDRequest(
|
|
||||||
$this->identity,
|
|
||||||
$this->return_to,
|
|
||||||
$this->trust_root,
|
|
||||||
false,
|
|
||||||
$this->assoc_handle,
|
|
||||||
$this->server);
|
|
||||||
|
|
||||||
$setup_url = $setup_request->encodeToURL($server_url);
|
|
||||||
|
|
||||||
if ($setup_url === null) {
|
|
||||||
return new Auth_OpenID_NoReturnToError();
|
|
||||||
}
|
|
||||||
|
|
||||||
$response->fields->setArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'user_setup_url',
|
|
||||||
$setup_url);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $response;
|
|
||||||
}
|
|
||||||
|
|
||||||
function encodeToURL($server_url)
|
|
||||||
{
|
|
||||||
if (!$this->return_to) {
|
|
||||||
return new Auth_OpenID_NoReturnToError();
|
|
||||||
}
|
|
||||||
|
|
||||||
// Imported from the alternate reality where these classes are
|
|
||||||
// used in both the client and server code, so Requests are
|
|
||||||
// Encodable too. That's right, code imported from alternate
|
|
||||||
// realities all for the love of you, id_res/user_setup_url.
|
|
||||||
|
|
||||||
$q = array('mode' => $this->mode,
|
|
||||||
'identity' => $this->identity,
|
|
||||||
'claimed_id' => $this->claimed_id,
|
|
||||||
'return_to' => $this->return_to);
|
|
||||||
|
|
||||||
if ($this->trust_root) {
|
|
||||||
if ($this->namespace == Auth_OpenID_OPENID1_NS) {
|
|
||||||
$q['trust_root'] = $this->trust_root;
|
|
||||||
} else {
|
|
||||||
$q['realm'] = $this->trust_root;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($this->assoc_handle) {
|
|
||||||
$q['assoc_handle'] = $this->assoc_handle;
|
|
||||||
}
|
|
||||||
|
|
||||||
$response = new Auth_OpenID_Message($this->namespace);
|
|
||||||
$response->updateArgs($this->namespace, $q);
|
|
||||||
|
|
||||||
return $response->toURL($server_url);
|
|
||||||
}
|
|
||||||
|
|
||||||
function getCancelURL()
|
|
||||||
{
|
|
||||||
if (!$this->return_to) {
|
|
||||||
return new Auth_OpenID_NoReturnToError();
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($this->immediate) {
|
|
||||||
return new Auth_OpenID_ServerError(null,
|
|
||||||
"Cancel is not an appropriate \
|
|
||||||
response to immediate mode \
|
|
||||||
requests.");
|
|
||||||
}
|
|
||||||
|
|
||||||
$response = new Auth_OpenID_Message($this->namespace);
|
|
||||||
$response->setArg(Auth_OpenID_OPENID_NS, 'mode', 'cancel');
|
|
||||||
return $response->toURL($this->return_to);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class encapsulates the response to an OpenID server request.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_ServerResponse {
|
|
||||||
|
|
||||||
function Auth_OpenID_ServerResponse(&$request)
|
|
||||||
{
|
|
||||||
$this->request =& $request;
|
|
||||||
$this->fields = new Auth_OpenID_Message($this->request->namespace);
|
|
||||||
}
|
|
||||||
|
|
||||||
function whichEncoding()
|
|
||||||
{
|
|
||||||
global $_Auth_OpenID_Encode_Kvform,
|
|
||||||
$_Auth_OpenID_Request_Modes,
|
|
||||||
$_Auth_OpenID_Encode_Url;
|
|
||||||
|
|
||||||
if (in_array($this->request->mode, $_Auth_OpenID_Request_Modes)) {
|
|
||||||
return $_Auth_OpenID_Encode_Url;
|
|
||||||
} else {
|
|
||||||
return $_Auth_OpenID_Encode_Kvform;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function encodeToURL()
|
|
||||||
{
|
|
||||||
return $this->fields->toURL($this->request->return_to);
|
|
||||||
}
|
|
||||||
|
|
||||||
function needsSigning()
|
|
||||||
{
|
|
||||||
return $this->fields->getArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'mode') == 'id_res';
|
|
||||||
}
|
|
||||||
|
|
||||||
function encodeToKVForm()
|
|
||||||
{
|
|
||||||
return $this->fields->toKVForm();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A web-capable response object which you can use to generate a
|
|
||||||
* user-agent response.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_WebResponse {
|
|
||||||
var $code = AUTH_OPENID_HTTP_OK;
|
|
||||||
var $body = "";
|
|
||||||
|
|
||||||
function Auth_OpenID_WebResponse($code = null, $headers = null,
|
|
||||||
$body = null)
|
|
||||||
{
|
|
||||||
if ($code) {
|
|
||||||
$this->code = $code;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($headers !== null) {
|
|
||||||
$this->headers = $headers;
|
|
||||||
} else {
|
|
||||||
$this->headers = array();
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($body !== null) {
|
|
||||||
$this->body = $body;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Responsible for the signature of query data and the verification of
|
|
||||||
* OpenID signature values.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_Signatory {
|
|
||||||
|
|
||||||
// = 14 * 24 * 60 * 60; # 14 days, in seconds
|
|
||||||
var $SECRET_LIFETIME = 1209600;
|
|
||||||
|
|
||||||
// keys have a bogus server URL in them because the filestore
|
|
||||||
// really does expect that key to be a URL. This seems a little
|
|
||||||
// silly for the server store, since I expect there to be only one
|
|
||||||
// server URL.
|
|
||||||
var $normal_key = 'http://localhost/|normal';
|
|
||||||
var $dumb_key = 'http://localhost/|dumb';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create a new signatory using a given store.
|
|
||||||
*/
|
|
||||||
function Auth_OpenID_Signatory(&$store)
|
|
||||||
{
|
|
||||||
// assert store is not None
|
|
||||||
$this->store =& $store;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Verify, using a given association handle, a signature with
|
|
||||||
* signed key-value pairs from an HTTP request.
|
|
||||||
*/
|
|
||||||
function verify($assoc_handle, $message)
|
|
||||||
{
|
|
||||||
$assoc = $this->getAssociation($assoc_handle, true);
|
|
||||||
if (!$assoc) {
|
|
||||||
// oidutil.log("failed to get assoc with handle %r to verify sig %r"
|
|
||||||
// % (assoc_handle, sig))
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $assoc->checkMessageSignature($message);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given a response, sign the fields in the response's 'signed'
|
|
||||||
* list, and insert the signature into the response.
|
|
||||||
*/
|
|
||||||
function sign($response)
|
|
||||||
{
|
|
||||||
$signed_response = $response;
|
|
||||||
$assoc_handle = $response->request->assoc_handle;
|
|
||||||
|
|
||||||
if ($assoc_handle) {
|
|
||||||
// normal mode
|
|
||||||
$assoc = $this->getAssociation($assoc_handle, false, false);
|
|
||||||
if (!$assoc || ($assoc->getExpiresIn() <= 0)) {
|
|
||||||
// fall back to dumb mode
|
|
||||||
$signed_response->fields->setArg(Auth_OpenID_OPENID_NS,
|
|
||||||
'invalidate_handle', $assoc_handle);
|
|
||||||
$assoc_type = ($assoc ? $assoc->assoc_type : 'HMAC-SHA1');
|
|
||||||
|
|
||||||
if ($assoc && ($assoc->getExpiresIn() <= 0)) {
|
|
||||||
$this->invalidate($assoc_handle, false);
|
|
||||||
}
|
|
||||||
|
|
||||||
$assoc = $this->createAssociation(true, $assoc_type);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
// dumb mode.
|
|
||||||
$assoc = $this->createAssociation(true);
|
|
||||||
}
|
|
||||||
|
|
||||||
$signed_response->fields = $assoc->signMessage(
|
|
||||||
$signed_response->fields);
|
|
||||||
return $signed_response;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Make a new association.
|
|
||||||
*/
|
|
||||||
function createAssociation($dumb = true, $assoc_type = 'HMAC-SHA1')
|
|
||||||
{
|
|
||||||
$secret = Auth_OpenID_CryptUtil::getBytes(
|
|
||||||
Auth_OpenID_getSecretSize($assoc_type));
|
|
||||||
|
|
||||||
$uniq = base64_encode(Auth_OpenID_CryptUtil::getBytes(4));
|
|
||||||
$handle = sprintf('{%s}{%x}{%s}', $assoc_type, intval(time()), $uniq);
|
|
||||||
|
|
||||||
$assoc = Auth_OpenID_Association::fromExpiresIn(
|
|
||||||
$this->SECRET_LIFETIME, $handle, $secret, $assoc_type);
|
|
||||||
|
|
||||||
if ($dumb) {
|
|
||||||
$key = $this->dumb_key;
|
|
||||||
} else {
|
|
||||||
$key = $this->normal_key;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->store->storeAssociation($key, $assoc);
|
|
||||||
return $assoc;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given an association handle, get the association from the
|
|
||||||
* store, or return a ServerError or null if something goes wrong.
|
|
||||||
*/
|
|
||||||
function getAssociation($assoc_handle, $dumb, $check_expiration=true)
|
|
||||||
{
|
|
||||||
if ($assoc_handle === null) {
|
|
||||||
return new Auth_OpenID_ServerError(null,
|
|
||||||
"assoc_handle must not be null");
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($dumb) {
|
|
||||||
$key = $this->dumb_key;
|
|
||||||
} else {
|
|
||||||
$key = $this->normal_key;
|
|
||||||
}
|
|
||||||
|
|
||||||
$assoc = $this->store->getAssociation($key, $assoc_handle);
|
|
||||||
|
|
||||||
if (($assoc !== null) && ($assoc->getExpiresIn() <= 0)) {
|
|
||||||
if ($check_expiration) {
|
|
||||||
$this->store->removeAssociation($key, $assoc_handle);
|
|
||||||
$assoc = null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $assoc;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Invalidate a given association handle.
|
|
||||||
*/
|
|
||||||
function invalidate($assoc_handle, $dumb)
|
|
||||||
{
|
|
||||||
if ($dumb) {
|
|
||||||
$key = $this->dumb_key;
|
|
||||||
} else {
|
|
||||||
$key = $this->normal_key;
|
|
||||||
}
|
|
||||||
$this->store->removeAssociation($key, $assoc_handle);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Encode an {@link Auth_OpenID_ServerResponse} to an
|
|
||||||
* {@link Auth_OpenID_WebResponse}.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_Encoder {
|
|
||||||
|
|
||||||
var $responseFactory = 'Auth_OpenID_WebResponse';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Encode an {@link Auth_OpenID_ServerResponse} and return an
|
|
||||||
* {@link Auth_OpenID_WebResponse}.
|
|
||||||
*/
|
|
||||||
function encode(&$response)
|
|
||||||
{
|
|
||||||
global $_Auth_OpenID_Encode_Kvform,
|
|
||||||
$_Auth_OpenID_Encode_Url;
|
|
||||||
|
|
||||||
$cls = $this->responseFactory;
|
|
||||||
|
|
||||||
$encode_as = $response->whichEncoding();
|
|
||||||
if ($encode_as == $_Auth_OpenID_Encode_Kvform) {
|
|
||||||
$wr = new $cls(null, null, $response->encodeToKVForm());
|
|
||||||
if (is_a($response, 'Auth_OpenID_ServerError')) {
|
|
||||||
$wr->code = AUTH_OPENID_HTTP_ERROR;
|
|
||||||
}
|
|
||||||
} else if ($encode_as == $_Auth_OpenID_Encode_Url) {
|
|
||||||
$location = $response->encodeToURL();
|
|
||||||
$wr = new $cls(AUTH_OPENID_HTTP_REDIRECT,
|
|
||||||
array('location' => $location));
|
|
||||||
} else {
|
|
||||||
return new Auth_OpenID_EncodingError($response);
|
|
||||||
}
|
|
||||||
return $wr;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An encoder which also takes care of signing fields when required.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_SigningEncoder extends Auth_OpenID_Encoder {
|
|
||||||
|
|
||||||
function Auth_OpenID_SigningEncoder(&$signatory)
|
|
||||||
{
|
|
||||||
$this->signatory =& $signatory;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Sign an {@link Auth_OpenID_ServerResponse} and return an
|
|
||||||
* {@link Auth_OpenID_WebResponse}.
|
|
||||||
*/
|
|
||||||
function encode(&$response)
|
|
||||||
{
|
|
||||||
// the isinstance is a bit of a kludge... it means there isn't
|
|
||||||
// really an adapter to make the interfaces quite match.
|
|
||||||
if (!is_a($response, 'Auth_OpenID_ServerError') &&
|
|
||||||
$response->needsSigning()) {
|
|
||||||
|
|
||||||
if (!$this->signatory) {
|
|
||||||
return new Auth_OpenID_ServerError(null,
|
|
||||||
"Must have a store to sign request");
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($response->fields->hasKey(Auth_OpenID_OPENID_NS, 'sig')) {
|
|
||||||
return new Auth_OpenID_AlreadySigned($response);
|
|
||||||
}
|
|
||||||
$response = $this->signatory->sign($response);
|
|
||||||
}
|
|
||||||
|
|
||||||
return parent::encode($response);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Decode an incoming query into an Auth_OpenID_Request.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_Decoder {
|
|
||||||
|
|
||||||
function Auth_OpenID_Decoder(&$server)
|
|
||||||
{
|
|
||||||
$this->server =& $server;
|
|
||||||
|
|
||||||
$this->handlers = array(
|
|
||||||
'checkid_setup' => 'Auth_OpenID_CheckIDRequest',
|
|
||||||
'checkid_immediate' => 'Auth_OpenID_CheckIDRequest',
|
|
||||||
'check_authentication' => 'Auth_OpenID_CheckAuthRequest',
|
|
||||||
'associate' => 'Auth_OpenID_AssociateRequest'
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given an HTTP query in an array (key-value pairs), decode it
|
|
||||||
* into an Auth_OpenID_Request object.
|
|
||||||
*/
|
|
||||||
function decode($query)
|
|
||||||
{
|
|
||||||
if (!$query) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$message = Auth_OpenID_Message::fromPostArgs($query);
|
|
||||||
|
|
||||||
$mode = $message->getArg(Auth_OpenID_OPENID_NS, 'mode');
|
|
||||||
if (!$mode) {
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
"No mode value in message");
|
|
||||||
}
|
|
||||||
|
|
||||||
$handlerCls = Auth_OpenID::arrayGet($this->handlers, $mode,
|
|
||||||
$this->defaultDecoder($message));
|
|
||||||
|
|
||||||
if (!is_a($handlerCls, 'Auth_OpenID_ServerError')) {
|
|
||||||
return call_user_func_array(array($handlerCls, 'fromMessage'),
|
|
||||||
array($message, $this->server));
|
|
||||||
} else {
|
|
||||||
return $handlerCls;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function defaultDecoder($message)
|
|
||||||
{
|
|
||||||
$mode = $message->getArg(Auth_OpenID_OPENID_NS, 'mode');
|
|
||||||
return new Auth_OpenID_ServerError($message,
|
|
||||||
sprintf("No decoder for mode %s", $mode));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An error that indicates an encoding problem occurred.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_EncodingError {
|
|
||||||
function Auth_OpenID_EncodingError(&$response)
|
|
||||||
{
|
|
||||||
$this->response =& $response;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An error that indicates that a response was already signed.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_AlreadySigned extends Auth_OpenID_EncodingError {
|
|
||||||
// This response is already signed.
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* An error that indicates that the given return_to is not under the
|
|
||||||
* given trust_root.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_UntrustedReturnURL extends Auth_OpenID_ServerError {
|
|
||||||
function Auth_OpenID_UntrustedReturnURL($message, $return_to,
|
|
||||||
$trust_root)
|
|
||||||
{
|
|
||||||
parent::Auth_OpenID_ServerError($message, "Untrusted return_to URL");
|
|
||||||
$this->return_to = $return_to;
|
|
||||||
$this->trust_root = $trust_root;
|
|
||||||
}
|
|
||||||
|
|
||||||
function toString()
|
|
||||||
{
|
|
||||||
return sprintf("return_to %s not under trust_root %s",
|
|
||||||
$this->return_to, $this->trust_root);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* I handle requests for an OpenID server.
|
|
||||||
*
|
|
||||||
* Some types of requests (those which are not checkid requests) may
|
|
||||||
* be handed to my {@link handleRequest} method, and I will take care
|
|
||||||
* of it and return a response.
|
|
||||||
*
|
|
||||||
* For your convenience, I also provide an interface to {@link
|
|
||||||
* Auth_OpenID_Decoder::decode()} and {@link
|
|
||||||
* Auth_OpenID_SigningEncoder::encode()} through my methods {@link
|
|
||||||
* decodeRequest} and {@link encodeResponse}.
|
|
||||||
*
|
|
||||||
* All my state is encapsulated in an {@link Auth_OpenID_OpenIDStore}.
|
|
||||||
*
|
|
||||||
* Example:
|
|
||||||
*
|
|
||||||
* <pre> $oserver = new Auth_OpenID_Server(Auth_OpenID_FileStore($data_path),
|
|
||||||
* "http://example.com/op");
|
|
||||||
* $request = $oserver->decodeRequest();
|
|
||||||
* if (in_array($request->mode, array('checkid_immediate',
|
|
||||||
* 'checkid_setup'))) {
|
|
||||||
* if ($app->isAuthorized($request->identity, $request->trust_root)) {
|
|
||||||
* $response = $request->answer(true);
|
|
||||||
* } else if ($request->immediate) {
|
|
||||||
* $response = $request->answer(false);
|
|
||||||
* } else {
|
|
||||||
* $app->showDecidePage($request);
|
|
||||||
* return;
|
|
||||||
* }
|
|
||||||
* } else {
|
|
||||||
* $response = $oserver->handleRequest($request);
|
|
||||||
* }
|
|
||||||
*
|
|
||||||
* $webresponse = $oserver->encode($response);</pre>
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_Server {
|
|
||||||
function Auth_OpenID_Server(&$store, $op_endpoint=null)
|
|
||||||
{
|
|
||||||
$this->store =& $store;
|
|
||||||
$this->signatory =& new Auth_OpenID_Signatory($this->store);
|
|
||||||
$this->encoder =& new Auth_OpenID_SigningEncoder($this->signatory);
|
|
||||||
$this->decoder =& new Auth_OpenID_Decoder($this);
|
|
||||||
$this->op_endpoint = $op_endpoint;
|
|
||||||
$this->negotiator =& Auth_OpenID_getDefaultNegotiator();
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Handle a request. Given an {@link Auth_OpenID_Request} object,
|
|
||||||
* call the appropriate {@link Auth_OpenID_Server} method to
|
|
||||||
* process the request and generate a response.
|
|
||||||
*
|
|
||||||
* @param Auth_OpenID_Request $request An {@link Auth_OpenID_Request}
|
|
||||||
* returned by {@link Auth_OpenID_Server::decodeRequest()}.
|
|
||||||
*
|
|
||||||
* @return Auth_OpenID_ServerResponse $response A response object
|
|
||||||
* capable of generating a user-agent reply.
|
|
||||||
*/
|
|
||||||
function handleRequest($request)
|
|
||||||
{
|
|
||||||
if (method_exists($this, "openid_" . $request->mode)) {
|
|
||||||
$handler = array($this, "openid_" . $request->mode);
|
|
||||||
return call_user_func($handler, $request);
|
|
||||||
}
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The callback for 'check_authentication' messages.
|
|
||||||
*/
|
|
||||||
function openid_check_authentication(&$request)
|
|
||||||
{
|
|
||||||
return $request->answer($this->signatory);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The callback for 'associate' messages.
|
|
||||||
*/
|
|
||||||
function openid_associate(&$request)
|
|
||||||
{
|
|
||||||
$assoc_type = $request->assoc_type;
|
|
||||||
$session_type = $request->session->session_type;
|
|
||||||
if ($this->negotiator->isAllowed($assoc_type, $session_type)) {
|
|
||||||
$assoc = $this->signatory->createAssociation(false,
|
|
||||||
$assoc_type);
|
|
||||||
return $request->answer($assoc);
|
|
||||||
} else {
|
|
||||||
$message = sprintf('Association type %s is not supported with '.
|
|
||||||
'session type %s', $assoc_type, $session_type);
|
|
||||||
list($preferred_assoc_type, $preferred_session_type) =
|
|
||||||
$this->negotiator->getAllowedType();
|
|
||||||
return $request->answerUnsupported($message,
|
|
||||||
$preferred_assoc_type,
|
|
||||||
$preferred_session_type);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Encodes as response in the appropriate format suitable for
|
|
||||||
* sending to the user agent.
|
|
||||||
*/
|
|
||||||
function encodeResponse(&$response)
|
|
||||||
{
|
|
||||||
return $this->encoder->encode($response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Decodes a query args array into the appropriate
|
|
||||||
* {@link Auth_OpenID_Request} object.
|
|
||||||
*/
|
|
||||||
function decodeRequest($query=null)
|
|
||||||
{
|
|
||||||
if ($query === null) {
|
|
||||||
$query = Auth_OpenID::getQuery();
|
|
||||||
}
|
|
||||||
|
|
||||||
return $this->decoder->decode($query);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,37 +0,0 @@
|
|||||||
<?php
|
|
||||||
/**
|
|
||||||
* OpenID Server Request
|
|
||||||
*
|
|
||||||
* @see Auth_OpenID_Server
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Imports
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Object that holds the state of a request to the OpenID server
|
|
||||||
*
|
|
||||||
* With accessor functions to get at the internal request data.
|
|
||||||
*
|
|
||||||
* @see Auth_OpenID_Server
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_ServerRequest {
|
|
||||||
function Auth_OpenID_ServerRequest()
|
|
||||||
{
|
|
||||||
$this->mode = null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,243 +0,0 @@
|
|||||||
<?php
|
|
||||||
/**
|
|
||||||
* Functions for dealing with OpenID trust roots
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A regular expression that matches a domain ending in a top-level domains.
|
|
||||||
* Used in checking trust roots for sanity.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
define('Auth_OpenID___TLDs',
|
|
||||||
'/\.(com|edu|gov|int|mil|net|org|biz|info|name|museum|coop|aero|ac|' .
|
|
||||||
'ad|ae|af|ag|ai|al|am|an|ao|aq|ar|as|at|au|aw|az|ba|bb|bd|be|bf|bg|' .
|
|
||||||
'bh|bi|bj|bm|bn|bo|br|bs|bt|bv|bw|by|bz|ca|cc|cd|cf|cg|ch|ci|ck|cl|' .
|
|
||||||
'cm|cn|co|cr|cu|cv|cx|cy|cz|de|dj|dk|dm|do|dz|ec|ee|eg|eh|er|es|et|' .
|
|
||||||
'fi|fj|fk|fm|fo|fr|ga|gd|ge|gf|gg|gh|gi|gl|gm|gn|gp|gq|gr|gs|gt|gu|' .
|
|
||||||
'gw|gy|hk|hm|hn|hr|ht|hu|id|ie|il|im|in|io|iq|ir|is|it|je|jm|jo|jp|' .
|
|
||||||
'ke|kg|kh|ki|km|kn|kp|kr|kw|ky|kz|la|lb|lc|li|lk|lr|ls|lt|lu|lv|ly|' .
|
|
||||||
'ma|mc|md|mg|mh|mk|ml|mm|mn|mo|mp|mq|mr|ms|mt|mu|mv|mw|mx|my|mz|na|' .
|
|
||||||
'nc|ne|nf|ng|ni|nl|no|np|nr|nu|nz|om|pa|pe|pf|pg|ph|pk|pl|pm|pn|pr|' .
|
|
||||||
'ps|pt|pw|py|qa|re|ro|ru|rw|sa|sb|sc|sd|se|sg|sh|si|sj|sk|sl|sm|sn|' .
|
|
||||||
'so|sr|st|sv|sy|sz|tc|td|tf|tg|th|tj|tk|tm|tn|to|tp|tr|tt|tv|tw|tz|' .
|
|
||||||
'ua|ug|uk|um|us|uy|uz|va|vc|ve|vg|vi|vn|vu|wf|ws|ye|yt|yu|za|zm|zw)$/');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A wrapper for trust-root related functions
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_TrustRoot {
|
|
||||||
/**
|
|
||||||
* Parse a URL into its trust_root parts.
|
|
||||||
*
|
|
||||||
* @static
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*
|
|
||||||
* @param string $trust_root The url to parse
|
|
||||||
*
|
|
||||||
* @return mixed $parsed Either an associative array of trust root
|
|
||||||
* parts or false if parsing failed.
|
|
||||||
*/
|
|
||||||
function _parse($trust_root)
|
|
||||||
{
|
|
||||||
$parts = @parse_url($trust_root);
|
|
||||||
if ($parts === false) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
$required_parts = array('scheme', 'host');
|
|
||||||
$forbidden_parts = array('user', 'pass', 'fragment');
|
|
||||||
$keys = array_keys($parts);
|
|
||||||
if (array_intersect($keys, $required_parts) != $required_parts) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (array_intersect($keys, $forbidden_parts) != array()) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Return false if the original trust root value has more than
|
|
||||||
// one port specification.
|
|
||||||
if (preg_match("/:\/\/[^:]+(:\d+){2,}(\/|$)/", $trust_root)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$scheme = strtolower($parts['scheme']);
|
|
||||||
$allowed_schemes = array('http', 'https');
|
|
||||||
if (!in_array($scheme, $allowed_schemes)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
$parts['scheme'] = $scheme;
|
|
||||||
|
|
||||||
$host = strtolower($parts['host']);
|
|
||||||
$hostparts = explode('*', $host);
|
|
||||||
switch (count($hostparts)) {
|
|
||||||
case 1:
|
|
||||||
$parts['wildcard'] = false;
|
|
||||||
break;
|
|
||||||
case 2:
|
|
||||||
if ($hostparts[0] ||
|
|
||||||
($hostparts[1] && substr($hostparts[1], 0, 1) != '.')) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
$host = $hostparts[1];
|
|
||||||
$parts['wildcard'] = true;
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
if (strpos($host, ':') !== false) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$parts['host'] = $host;
|
|
||||||
|
|
||||||
if (isset($parts['path'])) {
|
|
||||||
$path = strtolower($parts['path']);
|
|
||||||
if (substr($path, -1) != '/') {
|
|
||||||
$path .= '/';
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$path = '/';
|
|
||||||
}
|
|
||||||
$parts['path'] = $path;
|
|
||||||
if (!isset($parts['port'])) {
|
|
||||||
$parts['port'] = false;
|
|
||||||
}
|
|
||||||
return $parts;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Is this trust root sane?
|
|
||||||
*
|
|
||||||
* A trust root is sane if it is syntactically valid and it has a
|
|
||||||
* reasonable domain name. Specifically, the domain name must be
|
|
||||||
* more than one level below a standard TLD or more than two
|
|
||||||
* levels below a two-letter tld.
|
|
||||||
*
|
|
||||||
* For example, '*.com' is not a sane trust root, but '*.foo.com'
|
|
||||||
* is. '*.co.uk' is not sane, but '*.bbc.co.uk' is.
|
|
||||||
*
|
|
||||||
* This check is not always correct, but it attempts to err on the
|
|
||||||
* side of marking sane trust roots insane instead of marking
|
|
||||||
* insane trust roots sane. For example, 'kink.fm' is marked as
|
|
||||||
* insane even though it "should" (for some meaning of should) be
|
|
||||||
* marked sane.
|
|
||||||
*
|
|
||||||
* This function should be used when creating OpenID servers to
|
|
||||||
* alert the users of the server when a consumer attempts to get
|
|
||||||
* the user to accept a suspicious trust root.
|
|
||||||
*
|
|
||||||
* @static
|
|
||||||
* @param string $trust_root The trust root to check
|
|
||||||
* @return bool $sanity Whether the trust root looks OK
|
|
||||||
*/
|
|
||||||
function isSane($trust_root)
|
|
||||||
{
|
|
||||||
$parts = Auth_OpenID_TrustRoot::_parse($trust_root);
|
|
||||||
if ($parts === false) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Localhost is a special case
|
|
||||||
if ($parts['host'] == 'localhost') {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get the top-level domain of the host. If it is not a valid TLD,
|
|
||||||
// it's not sane.
|
|
||||||
preg_match(Auth_OpenID___TLDs, $parts['host'], $matches);
|
|
||||||
if (!$matches) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
$tld = $matches[1];
|
|
||||||
|
|
||||||
// Require at least two levels of specificity for non-country
|
|
||||||
// tlds and three levels for country tlds.
|
|
||||||
$elements = explode('.', $parts['host']);
|
|
||||||
$n = count($elements);
|
|
||||||
if ($parts['wildcard']) {
|
|
||||||
$n -= 1;
|
|
||||||
}
|
|
||||||
if (strlen($tld) == 2) {
|
|
||||||
$n -= 1;
|
|
||||||
}
|
|
||||||
if ($n <= 1) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Does this URL match the given trust root?
|
|
||||||
*
|
|
||||||
* Return whether the URL falls under the given trust root. This
|
|
||||||
* does not check whether the trust root is sane. If the URL or
|
|
||||||
* trust root do not parse, this function will return false.
|
|
||||||
*
|
|
||||||
* @param string $trust_root The trust root to match against
|
|
||||||
*
|
|
||||||
* @param string $url The URL to check
|
|
||||||
*
|
|
||||||
* @return bool $matches Whether the URL matches against the
|
|
||||||
* trust root
|
|
||||||
*/
|
|
||||||
function match($trust_root, $url)
|
|
||||||
{
|
|
||||||
$trust_root_parsed = Auth_OpenID_TrustRoot::_parse($trust_root);
|
|
||||||
$url_parsed = Auth_OpenID_TrustRoot::_parse($url);
|
|
||||||
if (!$trust_root_parsed || !$url_parsed) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check hosts matching
|
|
||||||
if ($url_parsed['wildcard']) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
if ($trust_root_parsed['wildcard']) {
|
|
||||||
$host_tail = $trust_root_parsed['host'];
|
|
||||||
$host = $url_parsed['host'];
|
|
||||||
if ($host_tail &&
|
|
||||||
substr($host, -(strlen($host_tail))) != $host_tail &&
|
|
||||||
substr($host_tail, 1) != $host) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if ($trust_root_parsed['host'] != $url_parsed['host']) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check path and query matching
|
|
||||||
$base_path = $trust_root_parsed['path'];
|
|
||||||
$path = $url_parsed['path'];
|
|
||||||
if (!isset($trust_root_parsed['query'])) {
|
|
||||||
if (substr($path, 0, strlen($base_path)) != $base_path) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$base_query = $trust_root_parsed['query'];
|
|
||||||
$query = @$url_parsed['query'];
|
|
||||||
$qplus = substr($query, 0, strlen($base_query) + 1);
|
|
||||||
$bqplus = $base_query . '&';
|
|
||||||
if ($base_path != $path ||
|
|
||||||
($base_query != $query && $qplus != $bqplus)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// The port and scheme need to match exactly
|
|
||||||
return ($trust_root_parsed['scheme'] == $url_parsed['scheme'] &&
|
|
||||||
$url_parsed['port'] === $trust_root_parsed['port']);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
?>
|
|
@ -1,231 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* URI normalization routines.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
require_once 'Auth/Yadis/Misc.php';
|
|
||||||
|
|
||||||
// from appendix B of rfc 3986 (http://www.ietf.org/rfc/rfc3986.txt)
|
|
||||||
function Auth_OpenID_getURIPattern()
|
|
||||||
{
|
|
||||||
return '&^(([^:/?#]+):)?(//([^/?#]*))?([^?#]*)(\?([^#]*))?(#(.*))?&';
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getAuthorityPattern()
|
|
||||||
{
|
|
||||||
return '/^([^@]*@)?([^:]*)(:.*)?/';
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getEncodedPattern()
|
|
||||||
{
|
|
||||||
return '/%([0-9A-Fa-f]{2})/';
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getUnreserved()
|
|
||||||
{
|
|
||||||
$_unreserved = array();
|
|
||||||
for ($i = 0; $i < 256; $i++) {
|
|
||||||
$_unreserved[$i] = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
for ($i = ord('A'); $i <= ord('Z'); $i++) {
|
|
||||||
$_unreserved[$i] = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
for ($i = ord('0'); $i <= ord('9'); $i++) {
|
|
||||||
$_unreserved[$i] = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
for ($i = ord('a'); $i <= ord('z'); $i++) {
|
|
||||||
$_unreserved[$i] = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
$_unreserved[ord('-')] = true;
|
|
||||||
$_unreserved[ord('.')] = true;
|
|
||||||
$_unreserved[ord('_')] = true;
|
|
||||||
$_unreserved[ord('~')] = true;
|
|
||||||
|
|
||||||
return $_unreserved;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_getEscapeRE()
|
|
||||||
{
|
|
||||||
$parts = array();
|
|
||||||
foreach (array_merge(Auth_Yadis_getUCSChars(),
|
|
||||||
Auth_Yadis_getIPrivateChars()) as $pair) {
|
|
||||||
list($m, $n) = $pair;
|
|
||||||
$parts[] = sprintf("%s-%s", chr($m), chr($n));
|
|
||||||
}
|
|
||||||
|
|
||||||
return sprintf('[%s]', implode('', $parts));
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_pct_encoded_replace_unreserved($mo)
|
|
||||||
{
|
|
||||||
$_unreserved = Auth_OpenID_getUnreserved();
|
|
||||||
|
|
||||||
$i = intval($mo[1], 16);
|
|
||||||
if ($_unreserved[$i]) {
|
|
||||||
return chr($i);
|
|
||||||
} else {
|
|
||||||
return strtoupper($mo[0]);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $mo[0];
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_pct_encoded_replace($mo)
|
|
||||||
{
|
|
||||||
return chr(intval($mo[1], 16));
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_remove_dot_segments($path)
|
|
||||||
{
|
|
||||||
$result_segments = array();
|
|
||||||
|
|
||||||
while ($path) {
|
|
||||||
if (Auth_Yadis_startswith($path, '../')) {
|
|
||||||
$path = substr($path, 3);
|
|
||||||
} else if (Auth_Yadis_startswith($path, './')) {
|
|
||||||
$path = substr($path, 2);
|
|
||||||
} else if (Auth_Yadis_startswith($path, '/./')) {
|
|
||||||
$path = substr($path, 2);
|
|
||||||
} else if ($path == '/.') {
|
|
||||||
$path = '/';
|
|
||||||
} else if (Auth_Yadis_startswith($path, '/../')) {
|
|
||||||
$path = substr($path, 3);
|
|
||||||
if ($result_segments) {
|
|
||||||
array_pop($result_segments);
|
|
||||||
}
|
|
||||||
} else if ($path == '/..') {
|
|
||||||
$path = '/';
|
|
||||||
if ($result_segments) {
|
|
||||||
array_pop($result_segments);
|
|
||||||
}
|
|
||||||
} else if (($path == '..') ||
|
|
||||||
($path == '.')) {
|
|
||||||
$path = '';
|
|
||||||
} else {
|
|
||||||
$i = 0;
|
|
||||||
if ($path[0] == '/') {
|
|
||||||
$i = 1;
|
|
||||||
}
|
|
||||||
$i = strpos($path, '/', $i);
|
|
||||||
if ($i === false) {
|
|
||||||
$i = strlen($path);
|
|
||||||
}
|
|
||||||
$result_segments[] = substr($path, 0, $i);
|
|
||||||
$path = substr($path, $i);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return implode('', $result_segments);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_OpenID_urinorm($uri)
|
|
||||||
{
|
|
||||||
$uri_matches = array();
|
|
||||||
preg_match(Auth_OpenID_getURIPattern(), $uri, $uri_matches);
|
|
||||||
|
|
||||||
if (count($uri_matches) < 9) {
|
|
||||||
for ($i = count($uri_matches); $i <= 9; $i++) {
|
|
||||||
$uri_matches[] = '';
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$scheme = $uri_matches[2];
|
|
||||||
if ($scheme) {
|
|
||||||
$scheme = strtolower($scheme);
|
|
||||||
}
|
|
||||||
|
|
||||||
$scheme = $uri_matches[2];
|
|
||||||
if ($scheme === '') {
|
|
||||||
// No scheme specified
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$scheme = strtolower($scheme);
|
|
||||||
if (!in_array($scheme, array('http', 'https'))) {
|
|
||||||
// Not an absolute HTTP or HTTPS URI
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$authority = $uri_matches[4];
|
|
||||||
if ($authority === '') {
|
|
||||||
// Not an absolute URI
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$authority_matches = array();
|
|
||||||
preg_match(Auth_OpenID_getAuthorityPattern(),
|
|
||||||
$authority, $authority_matches);
|
|
||||||
if (count($authority_matches) === 0) {
|
|
||||||
// URI does not have a valid authority
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (count($authority_matches) < 4) {
|
|
||||||
for ($i = count($authority_matches); $i <= 4; $i++) {
|
|
||||||
$authority_matches[] = '';
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
list($_whole, $userinfo, $host, $port) = $authority_matches;
|
|
||||||
|
|
||||||
if ($userinfo === null) {
|
|
||||||
$userinfo = '';
|
|
||||||
}
|
|
||||||
|
|
||||||
if (strpos($host, '%') !== -1) {
|
|
||||||
$host = strtolower($host);
|
|
||||||
$host = preg_replace_callback(
|
|
||||||
Auth_OpenID_getEncodedPattern(),
|
|
||||||
'Auth_OpenID_pct_encoded_replace', $host);
|
|
||||||
// NO IDNA.
|
|
||||||
// $host = unicode($host, 'utf-8').encode('idna');
|
|
||||||
} else {
|
|
||||||
$host = strtolower($host);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($port) {
|
|
||||||
if (($port == ':') ||
|
|
||||||
($scheme == 'http' && $port == ':80') ||
|
|
||||||
($scheme == 'https' && $port == ':443')) {
|
|
||||||
$port = '';
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$port = '';
|
|
||||||
}
|
|
||||||
|
|
||||||
$authority = $userinfo . $host . $port;
|
|
||||||
|
|
||||||
$path = $uri_matches[5];
|
|
||||||
$path = preg_replace_callback(
|
|
||||||
Auth_OpenID_getEncodedPattern(),
|
|
||||||
'Auth_OpenID_pct_encoded_replace_unreserved', $path);
|
|
||||||
|
|
||||||
$path = Auth_OpenID_remove_dot_segments($path);
|
|
||||||
if (!$path) {
|
|
||||||
$path = '/';
|
|
||||||
}
|
|
||||||
|
|
||||||
$query = $uri_matches[6];
|
|
||||||
if ($query === null) {
|
|
||||||
$query = '';
|
|
||||||
}
|
|
||||||
|
|
||||||
$fragment = $uri_matches[8];
|
|
||||||
if ($fragment === null) {
|
|
||||||
$fragment = '';
|
|
||||||
}
|
|
||||||
|
|
||||||
return $scheme . '://' . $authority . $path . $query . $fragment;
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,114 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This module contains the HTTP fetcher interface
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
class Auth_Yadis_HTTPResponse {
|
|
||||||
function Auth_Yadis_HTTPResponse($final_url = null, $status = null,
|
|
||||||
$headers = null, $body = null)
|
|
||||||
{
|
|
||||||
$this->final_url = $final_url;
|
|
||||||
$this->status = $status;
|
|
||||||
$this->headers = $headers;
|
|
||||||
$this->body = $body;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class is the interface for HTTP fetchers the Yadis library
|
|
||||||
* uses. This interface is only important if you need to write a new
|
|
||||||
* fetcher for some reason.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_HTTPFetcher {
|
|
||||||
|
|
||||||
var $timeout = 20; // timeout in seconds.
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return whether a URL should be allowed. Override this method to
|
|
||||||
* conform to your local policy.
|
|
||||||
*
|
|
||||||
* By default, will attempt to fetch any http or https URL.
|
|
||||||
*/
|
|
||||||
function allowedURL($url)
|
|
||||||
{
|
|
||||||
return $this->URLHasAllowedScheme($url);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Does this fetcher implementation (and runtime) support fetching
|
|
||||||
* HTTPS URLs? May inspect the runtime environment.
|
|
||||||
*
|
|
||||||
* @return bool $support True if this fetcher supports HTTPS
|
|
||||||
* fetching; false if not.
|
|
||||||
*/
|
|
||||||
function supportsSSL()
|
|
||||||
{
|
|
||||||
trigger_error("not implemented", E_USER_ERROR);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Is this an https URL?
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function isHTTPS($url)
|
|
||||||
{
|
|
||||||
return (bool)preg_match('/^https:\/\//i', $url);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Is this an http or https URL?
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function URLHasAllowedScheme($url)
|
|
||||||
{
|
|
||||||
return (bool)preg_match('/^https?:\/\//i', $url);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _findRedirect($headers)
|
|
||||||
{
|
|
||||||
foreach ($headers as $line) {
|
|
||||||
if (strpos($line, "Location: ") === 0) {
|
|
||||||
$parts = explode(" ", $line, 2);
|
|
||||||
return $parts[1];
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Fetches the specified URL using optional extra headers and
|
|
||||||
* returns the server's response.
|
|
||||||
*
|
|
||||||
* @param string $url The URL to be fetched.
|
|
||||||
* @param array $extra_headers An array of header strings
|
|
||||||
* (e.g. "Accept: text/html").
|
|
||||||
* @return mixed $result An array of ($code, $url, $headers,
|
|
||||||
* $body) if the URL could be fetched; null if the URL does not
|
|
||||||
* pass the URLHasAllowedScheme check or if the server's response
|
|
||||||
* is malformed.
|
|
||||||
*/
|
|
||||||
function get($url, $headers)
|
|
||||||
{
|
|
||||||
trigger_error("not implemented", E_USER_ERROR);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,521 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Yadis service manager to be used during yadis-driven authentication
|
|
||||||
* attempts.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The base session class used by the Auth_Yadis_Manager. This
|
|
||||||
* class wraps the default PHP session machinery and should be
|
|
||||||
* subclassed if your application doesn't use PHP sessioning.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_PHPSession {
|
|
||||||
/**
|
|
||||||
* Set a session key/value pair.
|
|
||||||
*
|
|
||||||
* @param string $name The name of the session key to add.
|
|
||||||
* @param string $value The value to add to the session.
|
|
||||||
*/
|
|
||||||
function set($name, $value)
|
|
||||||
{
|
|
||||||
$_SESSION[$name] = $value;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get a key's value from the session.
|
|
||||||
*
|
|
||||||
* @param string $name The name of the key to retrieve.
|
|
||||||
* @param string $default The optional value to return if the key
|
|
||||||
* is not found in the session.
|
|
||||||
* @return string $result The key's value in the session or
|
|
||||||
* $default if it isn't found.
|
|
||||||
*/
|
|
||||||
function get($name, $default=null)
|
|
||||||
{
|
|
||||||
if (array_key_exists($name, $_SESSION)) {
|
|
||||||
return $_SESSION[$name];
|
|
||||||
} else {
|
|
||||||
return $default;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Remove a key/value pair from the session.
|
|
||||||
*
|
|
||||||
* @param string $name The name of the key to remove.
|
|
||||||
*/
|
|
||||||
function del($name)
|
|
||||||
{
|
|
||||||
unset($_SESSION[$name]);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the contents of the session in array form.
|
|
||||||
*/
|
|
||||||
function contents()
|
|
||||||
{
|
|
||||||
return $_SESSION;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A session helper class designed to translate between arrays and
|
|
||||||
* objects. Note that the class used must have a constructor that
|
|
||||||
* takes no parameters. This is not a general solution, but it works
|
|
||||||
* for dumb objects that just need to have attributes set. The idea
|
|
||||||
* is that you'll subclass this and override $this->check($data) ->
|
|
||||||
* bool to implement your own session data validation.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_SessionLoader {
|
|
||||||
/**
|
|
||||||
* Override this.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function check($data)
|
|
||||||
{
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given a session data value (an array), this creates an object
|
|
||||||
* (returned by $this->newObject()) whose attributes and values
|
|
||||||
* are those in $data. Returns null if $data lacks keys found in
|
|
||||||
* $this->requiredKeys(). Returns null if $this->check($data)
|
|
||||||
* evaluates to false. Returns null if $this->newObject()
|
|
||||||
* evaluates to false.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function fromSession($data)
|
|
||||||
{
|
|
||||||
if (!$data) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$required = $this->requiredKeys();
|
|
||||||
|
|
||||||
foreach ($required as $k) {
|
|
||||||
if (!array_key_exists($k, $data)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$this->check($data)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$data = array_merge($data, $this->prepareForLoad($data));
|
|
||||||
$obj = $this->newObject($data);
|
|
||||||
|
|
||||||
if (!$obj) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($required as $k) {
|
|
||||||
$obj->$k = $data[$k];
|
|
||||||
}
|
|
||||||
|
|
||||||
return $obj;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Prepares the data array by making any necessary changes.
|
|
||||||
* Returns an array whose keys and values will be used to update
|
|
||||||
* the original data array before calling $this->newObject($data).
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function prepareForLoad($data)
|
|
||||||
{
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a new instance of this loader's class, using the
|
|
||||||
* session data to construct it if necessary. The object need
|
|
||||||
* only be created; $this->fromSession() will take care of setting
|
|
||||||
* the object's attributes.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function newObject($data)
|
|
||||||
{
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an array of keys and values built from the attributes
|
|
||||||
* of $obj. If $this->prepareForSave($obj) returns an array, its keys
|
|
||||||
* and values are used to update the $data array of attributes
|
|
||||||
* from $obj.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function toSession($obj)
|
|
||||||
{
|
|
||||||
$data = array();
|
|
||||||
foreach ($obj as $k => $v) {
|
|
||||||
$data[$k] = $v;
|
|
||||||
}
|
|
||||||
|
|
||||||
$extra = $this->prepareForSave($obj);
|
|
||||||
|
|
||||||
if ($extra && is_array($extra)) {
|
|
||||||
foreach ($extra as $k => $v) {
|
|
||||||
$data[$k] = $v;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $data;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Override this.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function prepareForSave($obj)
|
|
||||||
{
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A concrete loader implementation for Auth_OpenID_ServiceEndpoints.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_OpenID_ServiceEndpointLoader extends Auth_Yadis_SessionLoader {
|
|
||||||
function newObject($data)
|
|
||||||
{
|
|
||||||
return new Auth_OpenID_ServiceEndpoint();
|
|
||||||
}
|
|
||||||
|
|
||||||
function requiredKeys()
|
|
||||||
{
|
|
||||||
$obj = new Auth_OpenID_ServiceEndpoint();
|
|
||||||
$data = array();
|
|
||||||
foreach ($obj as $k => $v) {
|
|
||||||
$data[] = $k;
|
|
||||||
}
|
|
||||||
return $data;
|
|
||||||
}
|
|
||||||
|
|
||||||
function check($data)
|
|
||||||
{
|
|
||||||
return is_array($data['type_uris']);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A concrete loader implementation for Auth_Yadis_Managers.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_ManagerLoader extends Auth_Yadis_SessionLoader {
|
|
||||||
function requiredKeys()
|
|
||||||
{
|
|
||||||
return array('starting_url',
|
|
||||||
'yadis_url',
|
|
||||||
'services',
|
|
||||||
'session_key',
|
|
||||||
'_current',
|
|
||||||
'stale');
|
|
||||||
}
|
|
||||||
|
|
||||||
function newObject($data)
|
|
||||||
{
|
|
||||||
return new Auth_Yadis_Manager($data['starting_url'],
|
|
||||||
$data['yadis_url'],
|
|
||||||
$data['services'],
|
|
||||||
$data['session_key']);
|
|
||||||
}
|
|
||||||
|
|
||||||
function check($data)
|
|
||||||
{
|
|
||||||
return is_array($data['services']);
|
|
||||||
}
|
|
||||||
|
|
||||||
function prepareForLoad($data)
|
|
||||||
{
|
|
||||||
$loader = new Auth_OpenID_ServiceEndpointLoader();
|
|
||||||
$services = array();
|
|
||||||
foreach ($data['services'] as $s) {
|
|
||||||
$services[] = $loader->fromSession($s);
|
|
||||||
}
|
|
||||||
return array('services' => $services);
|
|
||||||
}
|
|
||||||
|
|
||||||
function prepareForSave($obj)
|
|
||||||
{
|
|
||||||
$loader = new Auth_OpenID_ServiceEndpointLoader();
|
|
||||||
$services = array();
|
|
||||||
foreach ($obj->services as $s) {
|
|
||||||
$services[] = $loader->toSession($s);
|
|
||||||
}
|
|
||||||
return array('services' => $services);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The Yadis service manager which stores state in a session and
|
|
||||||
* iterates over <Service> elements in a Yadis XRDS document and lets
|
|
||||||
* a caller attempt to use each one. This is used by the Yadis
|
|
||||||
* library internally.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_Manager {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Intialize a new yadis service manager.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function Auth_Yadis_Manager($starting_url, $yadis_url,
|
|
||||||
$services, $session_key)
|
|
||||||
{
|
|
||||||
// The URL that was used to initiate the Yadis protocol
|
|
||||||
$this->starting_url = $starting_url;
|
|
||||||
|
|
||||||
// The URL after following redirects (the identifier)
|
|
||||||
$this->yadis_url = $yadis_url;
|
|
||||||
|
|
||||||
// List of service elements
|
|
||||||
$this->services = $services;
|
|
||||||
|
|
||||||
$this->session_key = $session_key;
|
|
||||||
|
|
||||||
// Reference to the current service object
|
|
||||||
$this->_current = null;
|
|
||||||
|
|
||||||
// Stale flag for cleanup if PHP lib has trouble.
|
|
||||||
$this->stale = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function length()
|
|
||||||
{
|
|
||||||
// How many untried services remain?
|
|
||||||
return count($this->services);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the next service
|
|
||||||
*
|
|
||||||
* $this->current() will continue to return that service until the
|
|
||||||
* next call to this method.
|
|
||||||
*/
|
|
||||||
function nextService()
|
|
||||||
{
|
|
||||||
|
|
||||||
if ($this->services) {
|
|
||||||
$this->_current = array_shift($this->services);
|
|
||||||
} else {
|
|
||||||
$this->_current = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $this->_current;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function current()
|
|
||||||
{
|
|
||||||
// Return the current service.
|
|
||||||
// Returns None if there are no services left.
|
|
||||||
return $this->_current;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function forURL($url)
|
|
||||||
{
|
|
||||||
return in_array($url, array($this->starting_url, $this->yadis_url));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function started()
|
|
||||||
{
|
|
||||||
// Has the first service been returned?
|
|
||||||
return $this->_current !== null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* State management for discovery.
|
|
||||||
*
|
|
||||||
* High-level usage pattern is to call .getNextService(discover) in
|
|
||||||
* order to find the next available service for this user for this
|
|
||||||
* session. Once a request completes, call .finish() to clean up the
|
|
||||||
* session state.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_Discovery {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $DEFAULT_SUFFIX = 'auth';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $PREFIX = '_yadis_services_';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Initialize a discovery object.
|
|
||||||
*
|
|
||||||
* @param Auth_Yadis_PHPSession $session An object which
|
|
||||||
* implements the Auth_Yadis_PHPSession API.
|
|
||||||
* @param string $url The URL on which to attempt discovery.
|
|
||||||
* @param string $session_key_suffix The optional session key
|
|
||||||
* suffix override.
|
|
||||||
*/
|
|
||||||
function Auth_Yadis_Discovery(&$session, $url,
|
|
||||||
$session_key_suffix = null)
|
|
||||||
{
|
|
||||||
/// Initialize a discovery object
|
|
||||||
$this->session =& $session;
|
|
||||||
$this->url = $url;
|
|
||||||
if ($session_key_suffix === null) {
|
|
||||||
$session_key_suffix = $this->DEFAULT_SUFFIX;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->session_key_suffix = $session_key_suffix;
|
|
||||||
$this->session_key = $this->PREFIX . $this->session_key_suffix;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the next authentication service for the pair of
|
|
||||||
* user_input and session. This function handles fallback.
|
|
||||||
*/
|
|
||||||
function getNextService($discover_cb, &$fetcher)
|
|
||||||
{
|
|
||||||
$manager = $this->getManager();
|
|
||||||
if (!$manager || (!$manager->services)) {
|
|
||||||
$this->destroyManager();
|
|
||||||
$http_response = array();
|
|
||||||
|
|
||||||
list($yadis_url, $services) = call_user_func($discover_cb,
|
|
||||||
$this->url,
|
|
||||||
$fetcher);
|
|
||||||
|
|
||||||
$manager = $this->createManager($services, $yadis_url);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($manager) {
|
|
||||||
$loader = new Auth_Yadis_ManagerLoader();
|
|
||||||
$service = $manager->nextService();
|
|
||||||
$this->session->set($this->session_key,
|
|
||||||
serialize($loader->toSession($manager)));
|
|
||||||
} else {
|
|
||||||
$service = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $service;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Clean up Yadis-related services in the session and return the
|
|
||||||
* most-recently-attempted service from the manager, if one
|
|
||||||
* exists.
|
|
||||||
*/
|
|
||||||
function cleanup()
|
|
||||||
{
|
|
||||||
$manager = $this->getManager();
|
|
||||||
if ($manager) {
|
|
||||||
$service = $manager->current();
|
|
||||||
$this->destroyManager();
|
|
||||||
} else {
|
|
||||||
$service = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $service;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function getSessionKey()
|
|
||||||
{
|
|
||||||
// Get the session key for this starting URL and suffix
|
|
||||||
return $this->PREFIX . $this->session_key_suffix;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function &getManager()
|
|
||||||
{
|
|
||||||
// Extract the YadisServiceManager for this object's URL and
|
|
||||||
// suffix from the session.
|
|
||||||
|
|
||||||
$manager_str = $this->session->get($this->getSessionKey());
|
|
||||||
$manager = null;
|
|
||||||
|
|
||||||
if ($manager_str !== null) {
|
|
||||||
$loader = new Auth_Yadis_ManagerLoader();
|
|
||||||
$manager = $loader->fromSession(unserialize($manager_str));
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($manager && $manager->forURL($this->url)) {
|
|
||||||
return $manager;
|
|
||||||
} else {
|
|
||||||
$unused = null;
|
|
||||||
return $unused;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function &createManager($services, $yadis_url = null)
|
|
||||||
{
|
|
||||||
$key = $this->getSessionKey();
|
|
||||||
if ($this->getManager()) {
|
|
||||||
return $this->getManager();
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($services) {
|
|
||||||
$loader = new Auth_Yadis_ManagerLoader();
|
|
||||||
$manager = new Auth_Yadis_Manager($this->url, $yadis_url,
|
|
||||||
$services, $key);
|
|
||||||
$this->session->set($this->session_key,
|
|
||||||
serialize($loader->toSession($manager)));
|
|
||||||
return $manager;
|
|
||||||
} else {
|
|
||||||
// Oh, PHP.
|
|
||||||
$unused = null;
|
|
||||||
return $unused;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function destroyManager()
|
|
||||||
{
|
|
||||||
if ($this->getManager() !== null) {
|
|
||||||
$key = $this->getSessionKey();
|
|
||||||
$this->session->del($key);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,59 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Miscellaneous utility values and functions for OpenID and Yadis.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
function Auth_Yadis_getUCSChars()
|
|
||||||
{
|
|
||||||
return array(
|
|
||||||
array(0xA0, 0xD7FF),
|
|
||||||
array(0xF900, 0xFDCF),
|
|
||||||
array(0xFDF0, 0xFFEF),
|
|
||||||
array(0x10000, 0x1FFFD),
|
|
||||||
array(0x20000, 0x2FFFD),
|
|
||||||
array(0x30000, 0x3FFFD),
|
|
||||||
array(0x40000, 0x4FFFD),
|
|
||||||
array(0x50000, 0x5FFFD),
|
|
||||||
array(0x60000, 0x6FFFD),
|
|
||||||
array(0x70000, 0x7FFFD),
|
|
||||||
array(0x80000, 0x8FFFD),
|
|
||||||
array(0x90000, 0x9FFFD),
|
|
||||||
array(0xA0000, 0xAFFFD),
|
|
||||||
array(0xB0000, 0xBFFFD),
|
|
||||||
array(0xC0000, 0xCFFFD),
|
|
||||||
array(0xD0000, 0xDFFFD),
|
|
||||||
array(0xE1000, 0xEFFFD)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_getIPrivateChars()
|
|
||||||
{
|
|
||||||
return array(
|
|
||||||
array(0xE000, 0xF8FF),
|
|
||||||
array(0xF0000, 0xFFFFD),
|
|
||||||
array(0x100000, 0x10FFFD)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_pct_escape_unicode($char_match)
|
|
||||||
{
|
|
||||||
$c = $char_match[0];
|
|
||||||
$result = "";
|
|
||||||
for ($i = 0; $i < strlen($c); $i++) {
|
|
||||||
$result .= "%".sprintf("%X", ord($c[$i]));
|
|
||||||
}
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_startswith($s, $stuff)
|
|
||||||
{
|
|
||||||
return strpos($s, $stuff) === 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,190 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This module contains the CURL-based HTTP fetcher implementation.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Interface import
|
|
||||||
*/
|
|
||||||
require_once "Auth/Yadis/HTTPFetcher.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A paranoid {@link Auth_Yadis_HTTPFetcher} class which uses CURL
|
|
||||||
* for fetching.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_ParanoidHTTPFetcher extends Auth_Yadis_HTTPFetcher {
|
|
||||||
function Auth_Yadis_ParanoidHTTPFetcher()
|
|
||||||
{
|
|
||||||
$this->reset();
|
|
||||||
}
|
|
||||||
|
|
||||||
function reset()
|
|
||||||
{
|
|
||||||
$this->headers = array();
|
|
||||||
$this->data = "";
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _writeHeader($ch, $header)
|
|
||||||
{
|
|
||||||
array_push($this->headers, rtrim($header));
|
|
||||||
return strlen($header);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _writeData($ch, $data)
|
|
||||||
{
|
|
||||||
$this->data .= $data;
|
|
||||||
return strlen($data);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Does this fetcher support SSL URLs?
|
|
||||||
*/
|
|
||||||
function supportsSSL()
|
|
||||||
{
|
|
||||||
$v = curl_version();
|
|
||||||
return in_array('https', $v['protocols']);
|
|
||||||
}
|
|
||||||
|
|
||||||
function get($url, $extra_headers = null)
|
|
||||||
{
|
|
||||||
if ($this->isHTTPS($url) && !$this->supportsSSL()) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$stop = time() + $this->timeout;
|
|
||||||
$off = $this->timeout;
|
|
||||||
|
|
||||||
$redir = true;
|
|
||||||
|
|
||||||
while ($redir && ($off > 0)) {
|
|
||||||
$this->reset();
|
|
||||||
|
|
||||||
$c = curl_init();
|
|
||||||
if (defined('CURLOPT_NOSIGNAL')) {
|
|
||||||
curl_setopt($c, CURLOPT_NOSIGNAL, true);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$this->allowedURL($url)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
curl_setopt($c, CURLOPT_WRITEFUNCTION,
|
|
||||||
array(&$this, "_writeData"));
|
|
||||||
curl_setopt($c, CURLOPT_HEADERFUNCTION,
|
|
||||||
array(&$this, "_writeHeader"));
|
|
||||||
|
|
||||||
if ($extra_headers) {
|
|
||||||
curl_setopt($c, CURLOPT_HTTPHEADER, $extra_headers);
|
|
||||||
}
|
|
||||||
|
|
||||||
curl_setopt($c, CURLOPT_TIMEOUT, $off);
|
|
||||||
curl_setopt($c, CURLOPT_URL, $url);
|
|
||||||
|
|
||||||
curl_exec($c);
|
|
||||||
|
|
||||||
$code = curl_getinfo($c, CURLINFO_HTTP_CODE);
|
|
||||||
$body = $this->data;
|
|
||||||
$headers = $this->headers;
|
|
||||||
|
|
||||||
if (!$code) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (in_array($code, array(301, 302, 303, 307))) {
|
|
||||||
$url = $this->_findRedirect($headers);
|
|
||||||
$redir = true;
|
|
||||||
} else {
|
|
||||||
$redir = false;
|
|
||||||
curl_close($c);
|
|
||||||
|
|
||||||
$new_headers = array();
|
|
||||||
|
|
||||||
foreach ($headers as $header) {
|
|
||||||
if (preg_match("/:/", $header)) {
|
|
||||||
list($name, $value) = explode(": ", $header, 2);
|
|
||||||
$new_headers[$name] = $value;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return new Auth_Yadis_HTTPResponse($url, $code,
|
|
||||||
$new_headers, $body);
|
|
||||||
}
|
|
||||||
|
|
||||||
$off = $stop - time();
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
function post($url, $body, $extra_headers = null)
|
|
||||||
{
|
|
||||||
$this->reset();
|
|
||||||
|
|
||||||
if ($this->isHTTPS($url) && !$this->supportsSSL()) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$this->allowedURL($url)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$c = curl_init();
|
|
||||||
|
|
||||||
curl_setopt($c, CURLOPT_NOSIGNAL, true);
|
|
||||||
curl_setopt($c, CURLOPT_POST, true);
|
|
||||||
curl_setopt($c, CURLOPT_POSTFIELDS, $body);
|
|
||||||
curl_setopt($c, CURLOPT_TIMEOUT, $this->timeout);
|
|
||||||
curl_setopt($c, CURLOPT_URL, $url);
|
|
||||||
curl_setopt($c, CURLOPT_WRITEFUNCTION,
|
|
||||||
array(&$this, "_writeData"));
|
|
||||||
|
|
||||||
curl_exec($c);
|
|
||||||
|
|
||||||
$code = curl_getinfo($c, CURLINFO_HTTP_CODE);
|
|
||||||
|
|
||||||
if (!$code) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$body = $this->data;
|
|
||||||
|
|
||||||
curl_close($c);
|
|
||||||
|
|
||||||
if ($extra_headers === null) {
|
|
||||||
$new_headers = null;
|
|
||||||
} else {
|
|
||||||
$new_headers = $extra_headers;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($this->headers as $header) {
|
|
||||||
if (preg_match("/:/", $header)) {
|
|
||||||
list($name, $value) = explode(": ", $header, 2);
|
|
||||||
$new_headers[$name] = $value;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
return new Auth_Yadis_HTTPResponse($url, $code,
|
|
||||||
$new_headers, $body);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,259 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the HTML pseudo-parser for the Yadis library.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class is responsible for scanning an HTML string to find META
|
|
||||||
* tags and their attributes. This is used by the Yadis discovery
|
|
||||||
* process. This class must be instantiated to be used.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_ParseHTML {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $_re_flags = "si";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $_removed_re =
|
|
||||||
"<!--.*?-->|<!\[CDATA\[.*?\]\]>|<script\b(?!:)[^>]*>.*?<\/script>";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $_tag_expr = "<%s%s(?:\s.*?)?%s>";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
var $_attr_find = '\b([-\w]+)=(".*?"|\'.*?\'|.+?)[\s>]';
|
|
||||||
|
|
||||||
function Auth_Yadis_ParseHTML()
|
|
||||||
{
|
|
||||||
$this->_attr_find = sprintf("/%s/%s",
|
|
||||||
$this->_attr_find,
|
|
||||||
$this->_re_flags);
|
|
||||||
|
|
||||||
$this->_removed_re = sprintf("/%s/%s",
|
|
||||||
$this->_removed_re,
|
|
||||||
$this->_re_flags);
|
|
||||||
|
|
||||||
$this->_entity_replacements = array(
|
|
||||||
'amp' => '&',
|
|
||||||
'lt' => '<',
|
|
||||||
'gt' => '>',
|
|
||||||
'quot' => '"'
|
|
||||||
);
|
|
||||||
|
|
||||||
$this->_ent_replace =
|
|
||||||
sprintf("&(%s);", implode("|",
|
|
||||||
$this->_entity_replacements));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Replace HTML entities (amp, lt, gt, and quot) as well as
|
|
||||||
* numeric entities (e.g. #x9f;) with their actual values and
|
|
||||||
* return the new string.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param string $str The string in which to look for entities
|
|
||||||
* @return string $new_str The new string entities decoded
|
|
||||||
*/
|
|
||||||
function replaceEntities($str)
|
|
||||||
{
|
|
||||||
foreach ($this->_entity_replacements as $old => $new) {
|
|
||||||
$str = preg_replace(sprintf("/&%s;/", $old), $new, $str);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Replace numeric entities because html_entity_decode doesn't
|
|
||||||
// do it for us.
|
|
||||||
$str = preg_replace('~&#x([0-9a-f]+);~ei', 'chr(hexdec("\\1"))', $str);
|
|
||||||
$str = preg_replace('~&#([0-9]+);~e', 'chr(\\1)', $str);
|
|
||||||
|
|
||||||
return $str;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Strip single and double quotes off of a string, if they are
|
|
||||||
* present.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param string $str The original string
|
|
||||||
* @return string $new_str The new string with leading and
|
|
||||||
* trailing quotes removed
|
|
||||||
*/
|
|
||||||
function removeQuotes($str)
|
|
||||||
{
|
|
||||||
$matches = array();
|
|
||||||
$double = '/^"(.*)"$/';
|
|
||||||
$single = "/^\'(.*)\'$/";
|
|
||||||
|
|
||||||
if (preg_match($double, $str, $matches)) {
|
|
||||||
return $matches[1];
|
|
||||||
} else if (preg_match($single, $str, $matches)) {
|
|
||||||
return $matches[1];
|
|
||||||
} else {
|
|
||||||
return $str;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create a regular expression that will match an opening
|
|
||||||
* or closing tag from a set of names.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param mixed $tag_names Tag names to match
|
|
||||||
* @param mixed $close false/0 = no, true/1 = yes, other = maybe
|
|
||||||
* @param mixed $self_close false/0 = no, true/1 = yes, other = maybe
|
|
||||||
* @return string $regex A regular expression string to be used
|
|
||||||
* in, say, preg_match.
|
|
||||||
*/
|
|
||||||
function tagPattern($tag_names, $close, $self_close)
|
|
||||||
{
|
|
||||||
if (is_array($tag_names)) {
|
|
||||||
$tag_names = '(?:'.implode('|',$tag_names).')';
|
|
||||||
}
|
|
||||||
if ($close) {
|
|
||||||
$close = '\/' . (($close == 1)? '' : '?');
|
|
||||||
} else {
|
|
||||||
$close = '';
|
|
||||||
}
|
|
||||||
if ($self_close) {
|
|
||||||
$self_close = '(?:\/\s*)' . (($self_close == 1)? '' : '?');
|
|
||||||
} else {
|
|
||||||
$self_close = '';
|
|
||||||
}
|
|
||||||
$expr = sprintf($this->_tag_expr, $close, $tag_names, $self_close);
|
|
||||||
|
|
||||||
return sprintf("/%s/%s", $expr, $this->_re_flags);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Given an HTML document string, this finds all the META tags in
|
|
||||||
* the document, provided they are found in the
|
|
||||||
* <HTML><HEAD>...</HEAD> section of the document. The <HTML> tag
|
|
||||||
* may be missing.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
* @param string $html_string An HTMl document string
|
|
||||||
* @return array $tag_list Array of tags; each tag is an array of
|
|
||||||
* attribute -> value.
|
|
||||||
*/
|
|
||||||
function getMetaTags($html_string)
|
|
||||||
{
|
|
||||||
$html_string = preg_replace($this->_removed_re,
|
|
||||||
"",
|
|
||||||
$html_string);
|
|
||||||
|
|
||||||
$key_tags = array($this->tagPattern('html', false, false),
|
|
||||||
$this->tagPattern('head', false, false),
|
|
||||||
$this->tagPattern('head', true, false),
|
|
||||||
$this->tagPattern('html', true, false),
|
|
||||||
$this->tagPattern(array(
|
|
||||||
'body', 'frameset', 'frame', 'p', 'div',
|
|
||||||
'table','span','a'), 'maybe', 'maybe'));
|
|
||||||
$key_tags_pos = array();
|
|
||||||
foreach ($key_tags as $pat) {
|
|
||||||
$matches = array();
|
|
||||||
preg_match($pat, $html_string, $matches, PREG_OFFSET_CAPTURE);
|
|
||||||
if($matches) {
|
|
||||||
$key_tags_pos[] = $matches[0][1];
|
|
||||||
} else {
|
|
||||||
$key_tags_pos[] = null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// no opening head tag
|
|
||||||
if (is_null($key_tags_pos[1])) {
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
// the effective </head> is the min of the following
|
|
||||||
if (is_null($key_tags_pos[2])) {
|
|
||||||
$key_tags_pos[2] = strlen($html_string);
|
|
||||||
}
|
|
||||||
foreach (array($key_tags_pos[3], $key_tags_pos[4]) as $pos) {
|
|
||||||
if (!is_null($pos) && $pos < $key_tags_pos[2]) {
|
|
||||||
$key_tags_pos[2] = $pos;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// closing head tag comes before opening head tag
|
|
||||||
if ($key_tags_pos[1] > $key_tags_pos[2]) {
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
// if there is an opening html tag, make sure the opening head tag
|
|
||||||
// comes after it
|
|
||||||
if (!is_null($key_tags_pos[0]) && $key_tags_pos[1] < $key_tags_pos[0]) {
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
$html_string = substr($html_string, $key_tags_pos[1],
|
|
||||||
($key_tags_pos[2]-$key_tags_pos[1]));
|
|
||||||
|
|
||||||
$link_data = array();
|
|
||||||
$link_matches = array();
|
|
||||||
|
|
||||||
if (!preg_match_all($this->tagPattern('meta', false, 'maybe'),
|
|
||||||
$html_string, $link_matches)) {
|
|
||||||
return array();
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($link_matches[0] as $link) {
|
|
||||||
$attr_matches = array();
|
|
||||||
preg_match_all($this->_attr_find, $link, $attr_matches);
|
|
||||||
$link_attrs = array();
|
|
||||||
foreach ($attr_matches[0] as $index => $full_match) {
|
|
||||||
$name = $attr_matches[1][$index];
|
|
||||||
$value = $this->replaceEntities(
|
|
||||||
$this->removeQuotes($attr_matches[2][$index]));
|
|
||||||
|
|
||||||
$link_attrs[strtolower($name)] = $value;
|
|
||||||
}
|
|
||||||
$link_data[] = $link_attrs;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $link_data;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Looks for a META tag with an "http-equiv" attribute whose value
|
|
||||||
* is one of ("x-xrds-location", "x-yadis-location"), ignoring
|
|
||||||
* case. If such a META tag is found, its "content" attribute
|
|
||||||
* value is returned.
|
|
||||||
*
|
|
||||||
* @param string $html_string An HTML document in string format
|
|
||||||
* @return mixed $content The "content" attribute value of the
|
|
||||||
* META tag, if found, or null if no such tag was found.
|
|
||||||
*/
|
|
||||||
function getHTTPEquiv($html_string)
|
|
||||||
{
|
|
||||||
$meta_tags = $this->getMetaTags($html_string);
|
|
||||||
|
|
||||||
if ($meta_tags) {
|
|
||||||
foreach ($meta_tags as $tag) {
|
|
||||||
if (array_key_exists('http-equiv', $tag) &&
|
|
||||||
(in_array(strtolower($tag['http-equiv']),
|
|
||||||
array('x-xrds-location', 'x-yadis-location'))) &&
|
|
||||||
array_key_exists('content', $tag)) {
|
|
||||||
return $tag['content'];
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,246 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This module contains the plain non-curl HTTP fetcher
|
|
||||||
* implementation.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Interface import
|
|
||||||
*/
|
|
||||||
require_once "Auth/Yadis/HTTPFetcher.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class implements a plain, hand-built socket-based fetcher
|
|
||||||
* which will be used in the event that CURL is unavailable.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_PlainHTTPFetcher extends Auth_Yadis_HTTPFetcher {
|
|
||||||
/**
|
|
||||||
* Does this fetcher support SSL URLs?
|
|
||||||
*/
|
|
||||||
function supportsSSL()
|
|
||||||
{
|
|
||||||
return function_exists('openssl_open');
|
|
||||||
}
|
|
||||||
|
|
||||||
function get($url, $extra_headers = null)
|
|
||||||
{
|
|
||||||
if ($this->isHTTPS($url) && !$this->supportsSSL()) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$this->allowedURL($url)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$redir = true;
|
|
||||||
|
|
||||||
$stop = time() + $this->timeout;
|
|
||||||
$off = $this->timeout;
|
|
||||||
|
|
||||||
while ($redir && ($off > 0)) {
|
|
||||||
|
|
||||||
$parts = parse_url($url);
|
|
||||||
|
|
||||||
$specify_port = true;
|
|
||||||
|
|
||||||
// Set a default port.
|
|
||||||
if (!array_key_exists('port', $parts)) {
|
|
||||||
$specify_port = false;
|
|
||||||
if ($parts['scheme'] == 'http') {
|
|
||||||
$parts['port'] = 80;
|
|
||||||
} elseif ($parts['scheme'] == 'https') {
|
|
||||||
$parts['port'] = 443;
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$host = $parts['host'];
|
|
||||||
|
|
||||||
if ($parts['scheme'] == 'https') {
|
|
||||||
$host = 'ssl://' . $host;
|
|
||||||
}
|
|
||||||
|
|
||||||
$user_agent = "PHP Yadis Library Fetcher";
|
|
||||||
|
|
||||||
$headers = array(
|
|
||||||
"GET ".$parts['path'].
|
|
||||||
(array_key_exists('query', $parts) ?
|
|
||||||
"?".$parts['query'] : "").
|
|
||||||
" HTTP/1.0",
|
|
||||||
"User-Agent: $user_agent",
|
|
||||||
"Host: ".$parts['host'].
|
|
||||||
($specify_port ? ":".$parts['port'] : ""),
|
|
||||||
"Port: ".$parts['port']);
|
|
||||||
|
|
||||||
$errno = 0;
|
|
||||||
$errstr = '';
|
|
||||||
|
|
||||||
if ($extra_headers) {
|
|
||||||
foreach ($extra_headers as $h) {
|
|
||||||
$headers[] = $h;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@$sock = fsockopen($host, $parts['port'], $errno, $errstr,
|
|
||||||
$this->timeout);
|
|
||||||
if ($sock === false) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
stream_set_timeout($sock, $this->timeout);
|
|
||||||
|
|
||||||
fputs($sock, implode("\r\n", $headers) . "\r\n\r\n");
|
|
||||||
|
|
||||||
$data = "";
|
|
||||||
while (!feof($sock)) {
|
|
||||||
$data .= fgets($sock, 1024);
|
|
||||||
}
|
|
||||||
|
|
||||||
fclose($sock);
|
|
||||||
|
|
||||||
// Split response into header and body sections
|
|
||||||
list($headers, $body) = explode("\r\n\r\n", $data, 2);
|
|
||||||
$headers = explode("\r\n", $headers);
|
|
||||||
|
|
||||||
$http_code = explode(" ", $headers[0]);
|
|
||||||
$code = $http_code[1];
|
|
||||||
|
|
||||||
if (in_array($code, array('301', '302'))) {
|
|
||||||
$url = $this->_findRedirect($headers);
|
|
||||||
$redir = true;
|
|
||||||
} else {
|
|
||||||
$redir = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$off = $stop - time();
|
|
||||||
}
|
|
||||||
|
|
||||||
$new_headers = array();
|
|
||||||
|
|
||||||
foreach ($headers as $header) {
|
|
||||||
if (preg_match("/:/", $header)) {
|
|
||||||
list($name, $value) = explode(": ", $header, 2);
|
|
||||||
$new_headers[$name] = $value;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
return new Auth_Yadis_HTTPResponse($url, $code, $new_headers, $body);
|
|
||||||
}
|
|
||||||
|
|
||||||
function post($url, $body, $extra_headers = null)
|
|
||||||
{
|
|
||||||
if ($this->isHTTPS($url) && !$this->supportsSSL()) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$this->allowedURL($url)) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$parts = parse_url($url);
|
|
||||||
|
|
||||||
$headers = array();
|
|
||||||
|
|
||||||
$post_path = $parts['path'];
|
|
||||||
if (isset($parts['query'])) {
|
|
||||||
$post_path .= '?' . $parts['query'];
|
|
||||||
}
|
|
||||||
|
|
||||||
$headers[] = "POST ".$post_path." HTTP/1.0";
|
|
||||||
$headers[] = "Host: " . $parts['host'];
|
|
||||||
$headers[] = "Content-type: application/x-www-form-urlencoded";
|
|
||||||
$headers[] = "Content-length: " . strval(strlen($body));
|
|
||||||
|
|
||||||
if ($extra_headers &&
|
|
||||||
is_array($extra_headers)) {
|
|
||||||
$headers = array_merge($headers, $extra_headers);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Join all headers together.
|
|
||||||
$all_headers = implode("\r\n", $headers);
|
|
||||||
|
|
||||||
// Add headers, two newlines, and request body.
|
|
||||||
$request = $all_headers . "\r\n\r\n" . $body;
|
|
||||||
|
|
||||||
// Set a default port.
|
|
||||||
if (!array_key_exists('port', $parts)) {
|
|
||||||
if ($parts['scheme'] == 'http') {
|
|
||||||
$parts['port'] = 80;
|
|
||||||
} elseif ($parts['scheme'] == 'https') {
|
|
||||||
$parts['port'] = 443;
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($parts['scheme'] == 'https') {
|
|
||||||
$parts['host'] = sprintf("ssl://%s", $parts['host']);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Connect to the remote server.
|
|
||||||
$errno = 0;
|
|
||||||
$errstr = '';
|
|
||||||
|
|
||||||
$sock = fsockopen($parts['host'], $parts['port'], $errno, $errstr,
|
|
||||||
$this->timeout);
|
|
||||||
|
|
||||||
if ($sock === false) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
stream_set_timeout($sock, $this->timeout);
|
|
||||||
|
|
||||||
// Write the POST request.
|
|
||||||
fputs($sock, $request);
|
|
||||||
|
|
||||||
// Get the response from the server.
|
|
||||||
$response = "";
|
|
||||||
while (!feof($sock)) {
|
|
||||||
if ($data = fgets($sock, 128)) {
|
|
||||||
$response .= $data;
|
|
||||||
} else {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Split the request into headers and body.
|
|
||||||
list($headers, $response_body) = explode("\r\n\r\n", $response, 2);
|
|
||||||
|
|
||||||
$headers = explode("\r\n", $headers);
|
|
||||||
|
|
||||||
// Expect the first line of the headers data to be something
|
|
||||||
// like HTTP/1.1 200 OK. Split the line on spaces and take
|
|
||||||
// the second token, which should be the return code.
|
|
||||||
$http_code = explode(" ", $headers[0]);
|
|
||||||
$code = $http_code[1];
|
|
||||||
|
|
||||||
$new_headers = array();
|
|
||||||
|
|
||||||
foreach ($headers as $header) {
|
|
||||||
if (preg_match("/:/", $header)) {
|
|
||||||
list($name, $value) = explode(": ", $header, 2);
|
|
||||||
$new_headers[$name] = $value;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
return new Auth_Yadis_HTTPResponse($url, $code,
|
|
||||||
$new_headers, $response_body);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,374 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* XML-parsing classes to wrap the domxml and DOM extensions for PHP 4
|
|
||||||
* and 5, respectively.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The base class for wrappers for available PHP XML-parsing
|
|
||||||
* extensions. To work with this Yadis library, subclasses of this
|
|
||||||
* class MUST implement the API as defined in the remarks for this
|
|
||||||
* class. Subclasses of Auth_Yadis_XMLParser are used to wrap
|
|
||||||
* particular PHP XML extensions such as 'domxml'. These are used
|
|
||||||
* internally by the library depending on the availability of
|
|
||||||
* supported PHP XML extensions.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_XMLParser {
|
|
||||||
/**
|
|
||||||
* Initialize an instance of Auth_Yadis_XMLParser with some
|
|
||||||
* XML and namespaces. This SHOULD NOT be overridden by
|
|
||||||
* subclasses.
|
|
||||||
*
|
|
||||||
* @param string $xml_string A string of XML to be parsed.
|
|
||||||
* @param array $namespace_map An array of ($ns_name => $ns_uri)
|
|
||||||
* to be registered with the XML parser. May be empty.
|
|
||||||
* @return boolean $result True if the initialization and
|
|
||||||
* namespace registration(s) succeeded; false otherwise.
|
|
||||||
*/
|
|
||||||
function init($xml_string, $namespace_map)
|
|
||||||
{
|
|
||||||
if (!$this->setXML($xml_string)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($namespace_map as $prefix => $uri) {
|
|
||||||
if (!$this->registerNamespace($prefix, $uri)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Register a namespace with the XML parser. This should be
|
|
||||||
* overridden by subclasses.
|
|
||||||
*
|
|
||||||
* @param string $prefix The namespace prefix to appear in XML tag
|
|
||||||
* names.
|
|
||||||
*
|
|
||||||
* @param string $uri The namespace URI to be used to identify the
|
|
||||||
* namespace in the XML.
|
|
||||||
*
|
|
||||||
* @return boolean $result True if the registration succeeded;
|
|
||||||
* false otherwise.
|
|
||||||
*/
|
|
||||||
function registerNamespace($prefix, $uri)
|
|
||||||
{
|
|
||||||
// Not implemented.
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set this parser object's XML payload. This should be
|
|
||||||
* overridden by subclasses.
|
|
||||||
*
|
|
||||||
* @param string $xml_string The XML string to pass to this
|
|
||||||
* object's XML parser.
|
|
||||||
*
|
|
||||||
* @return boolean $result True if the initialization succeeded;
|
|
||||||
* false otherwise.
|
|
||||||
*/
|
|
||||||
function setXML($xml_string)
|
|
||||||
{
|
|
||||||
// Not implemented.
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Evaluate an XPath expression and return the resulting node
|
|
||||||
* list. This should be overridden by subclasses.
|
|
||||||
*
|
|
||||||
* @param string $xpath The XPath expression to be evaluated.
|
|
||||||
*
|
|
||||||
* @param mixed $node A node object resulting from a previous
|
|
||||||
* evalXPath call. This node, if specified, provides the context
|
|
||||||
* for the evaluation of this xpath expression.
|
|
||||||
*
|
|
||||||
* @return array $node_list An array of matching opaque node
|
|
||||||
* objects to be used with other methods of this parser class.
|
|
||||||
*/
|
|
||||||
function evalXPath($xpath, $node = null)
|
|
||||||
{
|
|
||||||
// Not implemented.
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the textual content of a specified node.
|
|
||||||
*
|
|
||||||
* @param mixed $node A node object from a previous call to
|
|
||||||
* $this->evalXPath().
|
|
||||||
*
|
|
||||||
* @return string $content The content of this node.
|
|
||||||
*/
|
|
||||||
function content($node)
|
|
||||||
{
|
|
||||||
// Not implemented.
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the attributes of a specified node.
|
|
||||||
*
|
|
||||||
* @param mixed $node A node object from a previous call to
|
|
||||||
* $this->evalXPath().
|
|
||||||
*
|
|
||||||
* @return array $attrs An array mapping attribute names to
|
|
||||||
* values.
|
|
||||||
*/
|
|
||||||
function attributes($node)
|
|
||||||
{
|
|
||||||
// Not implemented.
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This concrete implementation of Auth_Yadis_XMLParser implements
|
|
||||||
* the appropriate API for the 'domxml' extension which is typically
|
|
||||||
* packaged with PHP 4. This class will be used whenever the 'domxml'
|
|
||||||
* extension is detected. See the Auth_Yadis_XMLParser class for
|
|
||||||
* details on this class's methods.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_domxml extends Auth_Yadis_XMLParser {
|
|
||||||
function Auth_Yadis_domxml()
|
|
||||||
{
|
|
||||||
$this->xml = null;
|
|
||||||
$this->doc = null;
|
|
||||||
$this->xpath = null;
|
|
||||||
$this->errors = array();
|
|
||||||
}
|
|
||||||
|
|
||||||
function setXML($xml_string)
|
|
||||||
{
|
|
||||||
$this->xml = $xml_string;
|
|
||||||
$this->doc = @domxml_open_mem($xml_string, DOMXML_LOAD_PARSING,
|
|
||||||
$this->errors);
|
|
||||||
|
|
||||||
if (!$this->doc) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->xpath = $this->doc->xpath_new_context();
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
function registerNamespace($prefix, $uri)
|
|
||||||
{
|
|
||||||
return xpath_register_ns($this->xpath, $prefix, $uri);
|
|
||||||
}
|
|
||||||
|
|
||||||
function &evalXPath($xpath, $node = null)
|
|
||||||
{
|
|
||||||
if ($node) {
|
|
||||||
$result = @$this->xpath->xpath_eval($xpath, $node);
|
|
||||||
} else {
|
|
||||||
$result = @$this->xpath->xpath_eval($xpath);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$result) {
|
|
||||||
$n = array();
|
|
||||||
return $n;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$result->nodeset) {
|
|
||||||
$n = array();
|
|
||||||
return $n;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result->nodeset;
|
|
||||||
}
|
|
||||||
|
|
||||||
function content($node)
|
|
||||||
{
|
|
||||||
if ($node) {
|
|
||||||
return $node->get_content();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function attributes($node)
|
|
||||||
{
|
|
||||||
if ($node) {
|
|
||||||
$arr = $node->attributes();
|
|
||||||
$result = array();
|
|
||||||
|
|
||||||
if ($arr) {
|
|
||||||
foreach ($arr as $attrnode) {
|
|
||||||
$result[$attrnode->name] = $attrnode->value;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This concrete implementation of Auth_Yadis_XMLParser implements
|
|
||||||
* the appropriate API for the 'dom' extension which is typically
|
|
||||||
* packaged with PHP 5. This class will be used whenever the 'dom'
|
|
||||||
* extension is detected. See the Auth_Yadis_XMLParser class for
|
|
||||||
* details on this class's methods.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_dom extends Auth_Yadis_XMLParser {
|
|
||||||
function Auth_Yadis_dom()
|
|
||||||
{
|
|
||||||
$this->xml = null;
|
|
||||||
$this->doc = null;
|
|
||||||
$this->xpath = null;
|
|
||||||
$this->errors = array();
|
|
||||||
}
|
|
||||||
|
|
||||||
function setXML($xml_string)
|
|
||||||
{
|
|
||||||
$this->xml = $xml_string;
|
|
||||||
$this->doc = new DOMDocument;
|
|
||||||
|
|
||||||
if (!$this->doc) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!@$this->doc->loadXML($xml_string)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->xpath = new DOMXPath($this->doc);
|
|
||||||
|
|
||||||
if ($this->xpath) {
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function registerNamespace($prefix, $uri)
|
|
||||||
{
|
|
||||||
return $this->xpath->registerNamespace($prefix, $uri);
|
|
||||||
}
|
|
||||||
|
|
||||||
function &evalXPath($xpath, $node = null)
|
|
||||||
{
|
|
||||||
if ($node) {
|
|
||||||
$result = @$this->xpath->query($xpath, $node);
|
|
||||||
} else {
|
|
||||||
$result = @$this->xpath->query($xpath);
|
|
||||||
}
|
|
||||||
|
|
||||||
$n = array();
|
|
||||||
|
|
||||||
if (!$result) {
|
|
||||||
return $n;
|
|
||||||
}
|
|
||||||
|
|
||||||
for ($i = 0; $i < $result->length; $i++) {
|
|
||||||
$n[] = $result->item($i);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $n;
|
|
||||||
}
|
|
||||||
|
|
||||||
function content($node)
|
|
||||||
{
|
|
||||||
if ($node) {
|
|
||||||
return $node->textContent;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function attributes($node)
|
|
||||||
{
|
|
||||||
if ($node) {
|
|
||||||
$arr = $node->attributes;
|
|
||||||
$result = array();
|
|
||||||
|
|
||||||
if ($arr) {
|
|
||||||
for ($i = 0; $i < $arr->length; $i++) {
|
|
||||||
$node = $arr->item($i);
|
|
||||||
$result[$node->nodeName] = $node->nodeValue;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
global $__Auth_Yadis_defaultParser;
|
|
||||||
$__Auth_Yadis_defaultParser = null;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set a default parser to override the extension-driven selection of
|
|
||||||
* available parser classes. This is helpful in a test environment or
|
|
||||||
* one in which multiple parsers can be used but one is more
|
|
||||||
* desirable.
|
|
||||||
*
|
|
||||||
* @param Auth_Yadis_XMLParser $parser An instance of a
|
|
||||||
* Auth_Yadis_XMLParser subclass.
|
|
||||||
*/
|
|
||||||
function Auth_Yadis_setDefaultParser(&$parser)
|
|
||||||
{
|
|
||||||
global $__Auth_Yadis_defaultParser;
|
|
||||||
$__Auth_Yadis_defaultParser =& $parser;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_getSupportedExtensions()
|
|
||||||
{
|
|
||||||
return array(
|
|
||||||
'dom' => array('classname' => 'Auth_Yadis_dom',
|
|
||||||
'libname' => array('dom.so', 'dom.dll')),
|
|
||||||
'domxml' => array('classname' => 'Auth_Yadis_domxml',
|
|
||||||
'libname' => array('domxml.so', 'php_domxml.dll')),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an instance of a Auth_Yadis_XMLParser subclass based on
|
|
||||||
* the availability of PHP extensions for XML parsing. If
|
|
||||||
* Auth_Yadis_setDefaultParser has been called, the parser used in
|
|
||||||
* that call will be returned instead.
|
|
||||||
*/
|
|
||||||
function &Auth_Yadis_getXMLParser()
|
|
||||||
{
|
|
||||||
global $__Auth_Yadis_defaultParser;
|
|
||||||
|
|
||||||
if (isset($__Auth_Yadis_defaultParser)) {
|
|
||||||
return $__Auth_Yadis_defaultParser;
|
|
||||||
}
|
|
||||||
|
|
||||||
$p = null;
|
|
||||||
$classname = null;
|
|
||||||
|
|
||||||
$extensions = Auth_Yadis_getSupportedExtensions();
|
|
||||||
|
|
||||||
// Return a wrapper for the resident implementation, if any.
|
|
||||||
foreach ($extensions as $name => $params) {
|
|
||||||
if (!extension_loaded($name)) {
|
|
||||||
foreach ($params['libname'] as $libname) {
|
|
||||||
if (@dl($libname)) {
|
|
||||||
$classname = $params['classname'];
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$classname = $params['classname'];
|
|
||||||
}
|
|
||||||
if (isset($classname)) {
|
|
||||||
$p = new $classname();
|
|
||||||
return $p;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!isset($p)) {
|
|
||||||
trigger_error('No XML parser was found', E_USER_ERROR);
|
|
||||||
} else {
|
|
||||||
Auth_Yadis_setDefaultParser($p);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $p;
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,448 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This module contains the XRDS parsing code.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the XPath implementation.
|
|
||||||
*/
|
|
||||||
require_once 'Auth/Yadis/XML.php';
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This match mode means a given service must match ALL filters passed
|
|
||||||
* to the Auth_Yadis_XRDS::services() call.
|
|
||||||
*/
|
|
||||||
define('SERVICES_YADIS_MATCH_ALL', 101);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This match mode means a given service must match ANY filters (at
|
|
||||||
* least one) passed to the Auth_Yadis_XRDS::services() call.
|
|
||||||
*/
|
|
||||||
define('SERVICES_YADIS_MATCH_ANY', 102);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The priority value used for service elements with no priority
|
|
||||||
* specified.
|
|
||||||
*/
|
|
||||||
define('SERVICES_YADIS_MAX_PRIORITY', pow(2, 30));
|
|
||||||
|
|
||||||
/**
|
|
||||||
* XRD XML namespace
|
|
||||||
*/
|
|
||||||
define('Auth_Yadis_XMLNS_XRD_2_0', 'xri://$xrd*($v*2.0)');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* XRDS XML namespace
|
|
||||||
*/
|
|
||||||
define('Auth_Yadis_XMLNS_XRDS', 'xri://$xrds');
|
|
||||||
|
|
||||||
function Auth_Yadis_getNSMap()
|
|
||||||
{
|
|
||||||
return array('xrds' => Auth_Yadis_XMLNS_XRDS,
|
|
||||||
'xrd' => Auth_Yadis_XMLNS_XRD_2_0);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function Auth_Yadis_array_scramble($arr)
|
|
||||||
{
|
|
||||||
$result = array();
|
|
||||||
|
|
||||||
while (count($arr)) {
|
|
||||||
$index = array_rand($arr, 1);
|
|
||||||
$result[] = $arr[$index];
|
|
||||||
unset($arr[$index]);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class represents a <Service> element in an XRDS document.
|
|
||||||
* Objects of this type are returned by
|
|
||||||
* Auth_Yadis_XRDS::services() and
|
|
||||||
* Auth_Yadis_Yadis::services(). Each object corresponds directly
|
|
||||||
* to a <Service> element in the XRDS and supplies a
|
|
||||||
* getElements($name) method which you should use to inspect the
|
|
||||||
* element's contents. See {@link Auth_Yadis_Yadis} for more
|
|
||||||
* information on the role this class plays in Yadis discovery.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_Service {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates an empty service object.
|
|
||||||
*/
|
|
||||||
function Auth_Yadis_Service()
|
|
||||||
{
|
|
||||||
$this->element = null;
|
|
||||||
$this->parser = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the URIs in the "Type" elements, if any, of this Service
|
|
||||||
* element.
|
|
||||||
*
|
|
||||||
* @return array $type_uris An array of Type URI strings.
|
|
||||||
*/
|
|
||||||
function getTypes()
|
|
||||||
{
|
|
||||||
$t = array();
|
|
||||||
foreach ($this->getElements('xrd:Type') as $elem) {
|
|
||||||
$c = $this->parser->content($elem);
|
|
||||||
if ($c) {
|
|
||||||
$t[] = $c;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return $t;
|
|
||||||
}
|
|
||||||
|
|
||||||
function matchTypes($type_uris)
|
|
||||||
{
|
|
||||||
$result = array();
|
|
||||||
|
|
||||||
foreach ($this->getTypes() as $typ) {
|
|
||||||
if (in_array($typ, $type_uris)) {
|
|
||||||
$result[] = $typ;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the URIs in the "URI" elements, if any, of this Service
|
|
||||||
* element. The URIs are returned sorted in priority order.
|
|
||||||
*
|
|
||||||
* @return array $uris An array of URI strings.
|
|
||||||
*/
|
|
||||||
function getURIs()
|
|
||||||
{
|
|
||||||
$uris = array();
|
|
||||||
$last = array();
|
|
||||||
|
|
||||||
foreach ($this->getElements('xrd:URI') as $elem) {
|
|
||||||
$uri_string = $this->parser->content($elem);
|
|
||||||
$attrs = $this->parser->attributes($elem);
|
|
||||||
if ($attrs &&
|
|
||||||
array_key_exists('priority', $attrs)) {
|
|
||||||
$priority = intval($attrs['priority']);
|
|
||||||
if (!array_key_exists($priority, $uris)) {
|
|
||||||
$uris[$priority] = array();
|
|
||||||
}
|
|
||||||
|
|
||||||
$uris[$priority][] = $uri_string;
|
|
||||||
} else {
|
|
||||||
$last[] = $uri_string;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$keys = array_keys($uris);
|
|
||||||
sort($keys);
|
|
||||||
|
|
||||||
// Rebuild array of URIs.
|
|
||||||
$result = array();
|
|
||||||
foreach ($keys as $k) {
|
|
||||||
$new_uris = Auth_Yadis_array_scramble($uris[$k]);
|
|
||||||
$result = array_merge($result, $new_uris);
|
|
||||||
}
|
|
||||||
|
|
||||||
$result = array_merge($result,
|
|
||||||
Auth_Yadis_array_scramble($last));
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the "priority" attribute value of this <Service>
|
|
||||||
* element, if the attribute is present. Returns null if not.
|
|
||||||
*
|
|
||||||
* @return mixed $result Null or integer, depending on whether
|
|
||||||
* this Service element has a 'priority' attribute.
|
|
||||||
*/
|
|
||||||
function getPriority()
|
|
||||||
{
|
|
||||||
$attributes = $this->parser->attributes($this->element);
|
|
||||||
|
|
||||||
if (array_key_exists('priority', $attributes)) {
|
|
||||||
return intval($attributes['priority']);
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Used to get XML elements from this object's <Service> element.
|
|
||||||
*
|
|
||||||
* This is what you should use to get all custom information out
|
|
||||||
* of this element. This is used by service filter functions to
|
|
||||||
* determine whether a service element contains specific tags,
|
|
||||||
* etc. NOTE: this only considers elements which are direct
|
|
||||||
* children of the <Service> element for this object.
|
|
||||||
*
|
|
||||||
* @param string $name The name of the element to look for
|
|
||||||
* @return array $list An array of elements with the specified
|
|
||||||
* name which are direct children of the <Service> element. The
|
|
||||||
* nodes returned by this function can be passed to $this->parser
|
|
||||||
* methods (see {@link Auth_Yadis_XMLParser}).
|
|
||||||
*/
|
|
||||||
function getElements($name)
|
|
||||||
{
|
|
||||||
return $this->parser->evalXPath($name, $this->element);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class performs parsing of XRDS documents.
|
|
||||||
*
|
|
||||||
* You should not instantiate this class directly; rather, call
|
|
||||||
* parseXRDS statically:
|
|
||||||
*
|
|
||||||
* <pre> $xrds = Auth_Yadis_XRDS::parseXRDS($xml_string);</pre>
|
|
||||||
*
|
|
||||||
* If the XRDS can be parsed and is valid, an instance of
|
|
||||||
* Auth_Yadis_XRDS will be returned. Otherwise, null will be
|
|
||||||
* returned. This class is used by the Auth_Yadis_Yadis::discover
|
|
||||||
* method.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_XRDS {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Instantiate a Auth_Yadis_XRDS object. Requires an XPath
|
|
||||||
* instance which has been used to parse a valid XRDS document.
|
|
||||||
*/
|
|
||||||
function Auth_Yadis_XRDS(&$xmlParser, &$xrdNodes)
|
|
||||||
{
|
|
||||||
$this->parser =& $xmlParser;
|
|
||||||
$this->xrdNode = $xrdNodes[count($xrdNodes) - 1];
|
|
||||||
$this->allXrdNodes =& $xrdNodes;
|
|
||||||
$this->serviceList = array();
|
|
||||||
$this->_parse();
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Parse an XML string (XRDS document) and return either a
|
|
||||||
* Auth_Yadis_XRDS object or null, depending on whether the
|
|
||||||
* XRDS XML is valid.
|
|
||||||
*
|
|
||||||
* @param string $xml_string An XRDS XML string.
|
|
||||||
* @return mixed $xrds An instance of Auth_Yadis_XRDS or null,
|
|
||||||
* depending on the validity of $xml_string
|
|
||||||
*/
|
|
||||||
function &parseXRDS($xml_string, $extra_ns_map = null)
|
|
||||||
{
|
|
||||||
$_null = null;
|
|
||||||
|
|
||||||
if (!$xml_string) {
|
|
||||||
return $_null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$parser = Auth_Yadis_getXMLParser();
|
|
||||||
|
|
||||||
$ns_map = Auth_Yadis_getNSMap();
|
|
||||||
|
|
||||||
if ($extra_ns_map && is_array($extra_ns_map)) {
|
|
||||||
$ns_map = array_merge($ns_map, $extra_ns_map);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!($parser && $parser->init($xml_string, $ns_map))) {
|
|
||||||
return $_null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Try to get root element.
|
|
||||||
$root = $parser->evalXPath('/xrds:XRDS[1]');
|
|
||||||
if (!$root) {
|
|
||||||
return $_null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (is_array($root)) {
|
|
||||||
$root = $root[0];
|
|
||||||
}
|
|
||||||
|
|
||||||
$attrs = $parser->attributes($root);
|
|
||||||
|
|
||||||
if (array_key_exists('xmlns:xrd', $attrs) &&
|
|
||||||
$attrs['xmlns:xrd'] != Auth_Yadis_XMLNS_XRDS) {
|
|
||||||
return $_null;
|
|
||||||
} else if (array_key_exists('xmlns', $attrs) &&
|
|
||||||
preg_match('/xri/', $attrs['xmlns']) &&
|
|
||||||
$attrs['xmlns'] != Auth_Yadis_XMLNS_XRD_2_0) {
|
|
||||||
return $_null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get the last XRD node.
|
|
||||||
$xrd_nodes = $parser->evalXPath('/xrds:XRDS[1]/xrd:XRD');
|
|
||||||
|
|
||||||
if (!$xrd_nodes) {
|
|
||||||
return $_null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$xrds = new Auth_Yadis_XRDS($parser, $xrd_nodes);
|
|
||||||
return $xrds;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _addService($priority, $service)
|
|
||||||
{
|
|
||||||
$priority = intval($priority);
|
|
||||||
|
|
||||||
if (!array_key_exists($priority, $this->serviceList)) {
|
|
||||||
$this->serviceList[$priority] = array();
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->serviceList[$priority][] = $service;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates the service list using nodes from the XRDS XML
|
|
||||||
* document.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _parse()
|
|
||||||
{
|
|
||||||
$this->serviceList = array();
|
|
||||||
|
|
||||||
$services = $this->parser->evalXPath('xrd:Service', $this->xrdNode);
|
|
||||||
|
|
||||||
foreach ($services as $node) {
|
|
||||||
$s =& new Auth_Yadis_Service();
|
|
||||||
$s->element = $node;
|
|
||||||
$s->parser =& $this->parser;
|
|
||||||
|
|
||||||
$priority = $s->getPriority();
|
|
||||||
|
|
||||||
if ($priority === null) {
|
|
||||||
$priority = SERVICES_YADIS_MAX_PRIORITY;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->_addService($priority, $s);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a list of service objects which correspond to <Service>
|
|
||||||
* elements in the XRDS XML document for this object.
|
|
||||||
*
|
|
||||||
* Optionally, an array of filter callbacks may be given to limit
|
|
||||||
* the list of returned service objects. Furthermore, the default
|
|
||||||
* mode is to return all service objects which match ANY of the
|
|
||||||
* specified filters, but $filter_mode may be
|
|
||||||
* SERVICES_YADIS_MATCH_ALL if you want to be sure that the
|
|
||||||
* returned services match all the given filters. See {@link
|
|
||||||
* Auth_Yadis_Yadis} for detailed usage information on filter
|
|
||||||
* functions.
|
|
||||||
*
|
|
||||||
* @param mixed $filters An array of callbacks to filter the
|
|
||||||
* returned services, or null if all services are to be returned.
|
|
||||||
* @param integer $filter_mode SERVICES_YADIS_MATCH_ALL or
|
|
||||||
* SERVICES_YADIS_MATCH_ANY, depending on whether the returned
|
|
||||||
* services should match ALL or ANY of the specified filters,
|
|
||||||
* respectively.
|
|
||||||
* @return mixed $services An array of {@link
|
|
||||||
* Auth_Yadis_Service} objects if $filter_mode is a valid
|
|
||||||
* mode; null if $filter_mode is an invalid mode (i.e., not
|
|
||||||
* SERVICES_YADIS_MATCH_ANY or SERVICES_YADIS_MATCH_ALL).
|
|
||||||
*/
|
|
||||||
function services($filters = null,
|
|
||||||
$filter_mode = SERVICES_YADIS_MATCH_ANY)
|
|
||||||
{
|
|
||||||
|
|
||||||
$pri_keys = array_keys($this->serviceList);
|
|
||||||
sort($pri_keys, SORT_NUMERIC);
|
|
||||||
|
|
||||||
// If no filters are specified, return the entire service
|
|
||||||
// list, ordered by priority.
|
|
||||||
if (!$filters ||
|
|
||||||
(!is_array($filters))) {
|
|
||||||
|
|
||||||
$result = array();
|
|
||||||
foreach ($pri_keys as $pri) {
|
|
||||||
$result = array_merge($result, $this->serviceList[$pri]);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
// If a bad filter mode is specified, return null.
|
|
||||||
if (!in_array($filter_mode, array(SERVICES_YADIS_MATCH_ANY,
|
|
||||||
SERVICES_YADIS_MATCH_ALL))) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Otherwise, use the callbacks in the filter list to
|
|
||||||
// determine which services are returned.
|
|
||||||
$filtered = array();
|
|
||||||
|
|
||||||
foreach ($pri_keys as $priority_value) {
|
|
||||||
$service_obj_list = $this->serviceList[$priority_value];
|
|
||||||
|
|
||||||
foreach ($service_obj_list as $service) {
|
|
||||||
|
|
||||||
$matches = 0;
|
|
||||||
|
|
||||||
foreach ($filters as $filter) {
|
|
||||||
if (call_user_func_array($filter, array($service))) {
|
|
||||||
$matches++;
|
|
||||||
|
|
||||||
if ($filter_mode == SERVICES_YADIS_MATCH_ANY) {
|
|
||||||
$pri = $service->getPriority();
|
|
||||||
if ($pri === null) {
|
|
||||||
$pri = SERVICES_YADIS_MAX_PRIORITY;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!array_key_exists($pri, $filtered)) {
|
|
||||||
$filtered[$pri] = array();
|
|
||||||
}
|
|
||||||
|
|
||||||
$filtered[$pri][] = $service;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (($filter_mode == SERVICES_YADIS_MATCH_ALL) &&
|
|
||||||
($matches == count($filters))) {
|
|
||||||
|
|
||||||
$pri = $service->getPriority();
|
|
||||||
if ($pri === null) {
|
|
||||||
$pri = SERVICES_YADIS_MAX_PRIORITY;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!array_key_exists($pri, $filtered)) {
|
|
||||||
$filtered[$pri] = array();
|
|
||||||
}
|
|
||||||
$filtered[$pri][] = $service;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$pri_keys = array_keys($filtered);
|
|
||||||
sort($pri_keys, SORT_NUMERIC);
|
|
||||||
|
|
||||||
$result = array();
|
|
||||||
foreach ($pri_keys as $pri) {
|
|
||||||
$result = array_merge($result, $filtered[$pri]);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,233 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Routines for XRI resolution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
require_once 'Auth/Yadis/Misc.php';
|
|
||||||
require_once 'Auth/Yadis/Yadis.php';
|
|
||||||
require_once 'Auth/OpenID.php';
|
|
||||||
|
|
||||||
function Auth_Yadis_getDefaultProxy()
|
|
||||||
{
|
|
||||||
return 'http://proxy.xri.net/';
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_getXRIAuthorities()
|
|
||||||
{
|
|
||||||
return array('!', '=', '@', '+', '$', '(');
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_getEscapeRE()
|
|
||||||
{
|
|
||||||
$parts = array();
|
|
||||||
foreach (array_merge(Auth_Yadis_getUCSChars(),
|
|
||||||
Auth_Yadis_getIPrivateChars()) as $pair) {
|
|
||||||
list($m, $n) = $pair;
|
|
||||||
$parts[] = sprintf("%s-%s", chr($m), chr($n));
|
|
||||||
}
|
|
||||||
|
|
||||||
return sprintf('/[%s]/', implode('', $parts));
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_getXrefRE()
|
|
||||||
{
|
|
||||||
return '/\((.*?)\)/';
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_identifierScheme($identifier)
|
|
||||||
{
|
|
||||||
if (Auth_Yadis_startswith($identifier, 'xri://') ||
|
|
||||||
(in_array($identifier[0], Auth_Yadis_getXRIAuthorities()))) {
|
|
||||||
return "XRI";
|
|
||||||
} else {
|
|
||||||
return "URI";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_toIRINormal($xri)
|
|
||||||
{
|
|
||||||
if (!Auth_Yadis_startswith($xri, 'xri://')) {
|
|
||||||
$xri = 'xri://' . $xri;
|
|
||||||
}
|
|
||||||
|
|
||||||
return Auth_Yadis_escapeForIRI($xri);
|
|
||||||
}
|
|
||||||
|
|
||||||
function _escape_xref($xref_match)
|
|
||||||
{
|
|
||||||
$xref = $xref_match[0];
|
|
||||||
$xref = str_replace('/', '%2F', $xref);
|
|
||||||
$xref = str_replace('?', '%3F', $xref);
|
|
||||||
$xref = str_replace('#', '%23', $xref);
|
|
||||||
return $xref;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_escapeForIRI($xri)
|
|
||||||
{
|
|
||||||
$xri = str_replace('%', '%25', $xri);
|
|
||||||
$xri = preg_replace_callback(Auth_Yadis_getXrefRE(),
|
|
||||||
'_escape_xref', $xri);
|
|
||||||
return $xri;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_toURINormal($xri)
|
|
||||||
{
|
|
||||||
return Auth_Yadis_iriToURI(Auth_Yadis_toIRINormal($xri));
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_iriToURI($iri)
|
|
||||||
{
|
|
||||||
if (1) {
|
|
||||||
return $iri;
|
|
||||||
} else {
|
|
||||||
// According to RFC 3987, section 3.1, "Mapping of IRIs to URIs"
|
|
||||||
return preg_replace_callback(Auth_Yadis_getEscapeRE(),
|
|
||||||
'Auth_Yadis_pct_escape_unicode', $iri);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
function Auth_Yadis_XRIAppendArgs($url, $args)
|
|
||||||
{
|
|
||||||
// Append some arguments to an HTTP query. Yes, this is just like
|
|
||||||
// OpenID's appendArgs, but with special seasoning for XRI
|
|
||||||
// queries.
|
|
||||||
|
|
||||||
if (count($args) == 0) {
|
|
||||||
return $url;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Non-empty array; if it is an array of arrays, use multisort;
|
|
||||||
// otherwise use sort.
|
|
||||||
if (array_key_exists(0, $args) &&
|
|
||||||
is_array($args[0])) {
|
|
||||||
// Do nothing here.
|
|
||||||
} else {
|
|
||||||
$keys = array_keys($args);
|
|
||||||
sort($keys);
|
|
||||||
$new_args = array();
|
|
||||||
foreach ($keys as $key) {
|
|
||||||
$new_args[] = array($key, $args[$key]);
|
|
||||||
}
|
|
||||||
$args = $new_args;
|
|
||||||
}
|
|
||||||
|
|
||||||
// According to XRI Resolution section "QXRI query parameters":
|
|
||||||
//
|
|
||||||
// "If the original QXRI had a null query component (only a
|
|
||||||
// leading question mark), or a query component consisting of
|
|
||||||
// only question marks, one additional leading question mark MUST
|
|
||||||
// be added when adding any XRI resolution parameters."
|
|
||||||
if (strpos(rtrim($url, '?'), '?') !== false) {
|
|
||||||
$sep = '&';
|
|
||||||
} else {
|
|
||||||
$sep = '?';
|
|
||||||
}
|
|
||||||
|
|
||||||
return $url . $sep . Auth_OpenID::httpBuildQuery($args);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_providerIsAuthoritative($providerID, $canonicalID)
|
|
||||||
{
|
|
||||||
$lastbang = strrpos($canonicalID, '!');
|
|
||||||
$p = substr($canonicalID, 0, $lastbang);
|
|
||||||
return $p == $providerID;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_rootAuthority($xri)
|
|
||||||
{
|
|
||||||
// Return the root authority for an XRI.
|
|
||||||
|
|
||||||
$root = null;
|
|
||||||
|
|
||||||
if (Auth_Yadis_startswith($xri, 'xri://')) {
|
|
||||||
$xri = substr($xri, 6);
|
|
||||||
}
|
|
||||||
|
|
||||||
$authority = explode('/', $xri, 2);
|
|
||||||
$authority = $authority[0];
|
|
||||||
if ($authority[0] == '(') {
|
|
||||||
// Cross-reference.
|
|
||||||
// XXX: This is incorrect if someone nests cross-references so
|
|
||||||
// there is another close-paren in there. Hopefully nobody
|
|
||||||
// does that before we have a real xriparse function.
|
|
||||||
// Hopefully nobody does that *ever*.
|
|
||||||
$root = substr($authority, 0, strpos($authority, ')') + 1);
|
|
||||||
} else if (in_array($authority[0], Auth_Yadis_getXRIAuthorities())) {
|
|
||||||
// Other XRI reference.
|
|
||||||
$root = $authority[0];
|
|
||||||
} else {
|
|
||||||
// IRI reference.
|
|
||||||
$_segments = explode("!", $authority);
|
|
||||||
$segments = array();
|
|
||||||
foreach ($_segments as $s) {
|
|
||||||
$segments = array_merge($segments, explode("*", $s));
|
|
||||||
}
|
|
||||||
$root = $segments[0];
|
|
||||||
}
|
|
||||||
|
|
||||||
return Auth_Yadis_XRI($root);
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_XRI($xri)
|
|
||||||
{
|
|
||||||
if (!Auth_Yadis_startswith($xri, 'xri://')) {
|
|
||||||
$xri = 'xri://' . $xri;
|
|
||||||
}
|
|
||||||
return $xri;
|
|
||||||
}
|
|
||||||
|
|
||||||
function Auth_Yadis_getCanonicalID($iname, $xrds)
|
|
||||||
{
|
|
||||||
// Returns false or a canonical ID value.
|
|
||||||
|
|
||||||
// Now nodes are in reverse order.
|
|
||||||
$xrd_list = array_reverse($xrds->allXrdNodes);
|
|
||||||
$parser =& $xrds->parser;
|
|
||||||
$node = $xrd_list[0];
|
|
||||||
|
|
||||||
$canonicalID_nodes = $parser->evalXPath('xrd:CanonicalID', $node);
|
|
||||||
|
|
||||||
if (!$canonicalID_nodes) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$canonicalID = $canonicalID_nodes[count($canonicalID_nodes) - 1];
|
|
||||||
$canonicalID = Auth_Yadis_XRI($parser->content($canonicalID));
|
|
||||||
|
|
||||||
$childID = $canonicalID;
|
|
||||||
|
|
||||||
for ($i = 1; $i < count($xrd_list); $i++) {
|
|
||||||
$xrd = $xrd_list[$i];
|
|
||||||
|
|
||||||
$parent_sought = substr($childID, 0, strrpos($childID, '!'));
|
|
||||||
$parent_list = array();
|
|
||||||
|
|
||||||
foreach ($parser->evalXPath('xrd:CanonicalID', $xrd) as $c) {
|
|
||||||
$parent_list[] = Auth_Yadis_XRI($parser->content($c));
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!in_array($parent_sought, $parent_list)) {
|
|
||||||
// raise XRDSFraud.
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$childID = $parent_sought;
|
|
||||||
}
|
|
||||||
|
|
||||||
$root = Auth_Yadis_rootAuthority($iname);
|
|
||||||
if (!Auth_Yadis_providerIsAuthoritative($root, $childID)) {
|
|
||||||
// raise XRDSFraud.
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $canonicalID;
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,72 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Code for using a proxy XRI resolver.
|
|
||||||
*/
|
|
||||||
|
|
||||||
require_once 'Auth/Yadis/XRDS.php';
|
|
||||||
require_once 'Auth/Yadis/XRI.php';
|
|
||||||
|
|
||||||
class Auth_Yadis_ProxyResolver {
|
|
||||||
function Auth_Yadis_ProxyResolver(&$fetcher, $proxy_url = null)
|
|
||||||
{
|
|
||||||
$this->fetcher =& $fetcher;
|
|
||||||
$this->proxy_url = $proxy_url;
|
|
||||||
if (!$this->proxy_url) {
|
|
||||||
$this->proxy_url = Auth_Yadis_getDefaultProxy();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function queryURL($xri, $service_type = null)
|
|
||||||
{
|
|
||||||
// trim off the xri:// prefix
|
|
||||||
$qxri = substr(Auth_Yadis_toURINormal($xri), 6);
|
|
||||||
$hxri = $this->proxy_url . $qxri;
|
|
||||||
$args = array(
|
|
||||||
'_xrd_r' => 'application/xrds+xml'
|
|
||||||
);
|
|
||||||
|
|
||||||
if ($service_type) {
|
|
||||||
$args['_xrd_t'] = $service_type;
|
|
||||||
} else {
|
|
||||||
// Don't perform service endpoint selection.
|
|
||||||
$args['_xrd_r'] .= ';sep=false';
|
|
||||||
}
|
|
||||||
|
|
||||||
$query = Auth_Yadis_XRIAppendArgs($hxri, $args);
|
|
||||||
return $query;
|
|
||||||
}
|
|
||||||
|
|
||||||
function query($xri, $service_types, $filters = array())
|
|
||||||
{
|
|
||||||
$services = array();
|
|
||||||
$canonicalID = null;
|
|
||||||
foreach ($service_types as $service_type) {
|
|
||||||
$url = $this->queryURL($xri, $service_type);
|
|
||||||
$response = $this->fetcher->get($url);
|
|
||||||
if ($response->status != 200) {
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
$xrds = Auth_Yadis_XRDS::parseXRDS($response->body);
|
|
||||||
if (!$xrds) {
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
$canonicalID = Auth_Yadis_getCanonicalID($xri,
|
|
||||||
$xrds);
|
|
||||||
|
|
||||||
if ($canonicalID === false) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$some_services = $xrds->services($filters);
|
|
||||||
$services = array_merge($services, $some_services);
|
|
||||||
// TODO:
|
|
||||||
// * If we do get hits for multiple service_types, we're
|
|
||||||
// almost certainly going to have duplicated service
|
|
||||||
// entries and broken priority ordering.
|
|
||||||
}
|
|
||||||
return array($canonicalID, $services);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,337 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The core PHP Yadis implementation.
|
|
||||||
*
|
|
||||||
* PHP versions 4 and 5
|
|
||||||
*
|
|
||||||
* LICENSE: See the COPYING file included in this distribution.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
* @author JanRain, Inc. <openid@janrain.com>
|
|
||||||
* @copyright 2005 Janrain, Inc.
|
|
||||||
* @license http://www.gnu.org/copyleft/lesser.html LGPL
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Need both fetcher types so we can use the right one based on the
|
|
||||||
* presence or absence of CURL.
|
|
||||||
*/
|
|
||||||
require_once "Auth/Yadis/PlainHTTPFetcher.php";
|
|
||||||
require_once "Auth/Yadis/ParanoidHTTPFetcher.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Need this for parsing HTML (looking for META tags).
|
|
||||||
*/
|
|
||||||
require_once "Auth/Yadis/ParseHTML.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Need this to parse the XRDS document during Yadis discovery.
|
|
||||||
*/
|
|
||||||
require_once "Auth/Yadis/XRDS.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* XRDS (yadis) content type
|
|
||||||
*/
|
|
||||||
define('Auth_Yadis_CONTENT_TYPE', 'application/xrds+xml');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Yadis header
|
|
||||||
*/
|
|
||||||
define('Auth_Yadis_HEADER_NAME', 'X-XRDS-Location');
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Contains the result of performing Yadis discovery on a URI.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_DiscoveryResult {
|
|
||||||
|
|
||||||
// The URI that was passed to the fetcher
|
|
||||||
var $request_uri = null;
|
|
||||||
|
|
||||||
// The result of following redirects from the request_uri
|
|
||||||
var $normalized_uri = null;
|
|
||||||
|
|
||||||
// The URI from which the response text was returned (set to
|
|
||||||
// None if there was no XRDS document found)
|
|
||||||
var $xrds_uri = null;
|
|
||||||
|
|
||||||
var $xrds = null;
|
|
||||||
|
|
||||||
// The content-type returned with the response_text
|
|
||||||
var $content_type = null;
|
|
||||||
|
|
||||||
// The document returned from the xrds_uri
|
|
||||||
var $response_text = null;
|
|
||||||
|
|
||||||
// Did the discovery fail miserably?
|
|
||||||
var $failed = false;
|
|
||||||
|
|
||||||
function Auth_Yadis_DiscoveryResult($request_uri)
|
|
||||||
{
|
|
||||||
// Initialize the state of the object
|
|
||||||
// sets all attributes to None except the request_uri
|
|
||||||
$this->request_uri = $request_uri;
|
|
||||||
}
|
|
||||||
|
|
||||||
function fail()
|
|
||||||
{
|
|
||||||
$this->failed = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
function isFailure()
|
|
||||||
{
|
|
||||||
return $this->failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the list of service objects as described by the XRDS
|
|
||||||
* document, if this yadis object represents a successful Yadis
|
|
||||||
* discovery.
|
|
||||||
*
|
|
||||||
* @return array $services An array of {@link Auth_Yadis_Service}
|
|
||||||
* objects
|
|
||||||
*/
|
|
||||||
function services()
|
|
||||||
{
|
|
||||||
if ($this->xrds) {
|
|
||||||
return $this->xrds->services();
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
function usedYadisLocation()
|
|
||||||
{
|
|
||||||
// Was the Yadis protocol's indirection used?
|
|
||||||
return $this->normalized_uri == $this->xrds_uri;
|
|
||||||
}
|
|
||||||
|
|
||||||
function isXRDS()
|
|
||||||
{
|
|
||||||
// Is the response text supposed to be an XRDS document?
|
|
||||||
return ($this->usedYadisLocation() ||
|
|
||||||
$this->content_type == Auth_Yadis_CONTENT_TYPE);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This is the core of the PHP Yadis library. This is the only class
|
|
||||||
* a user needs to use to perform Yadis discovery. This class
|
|
||||||
* performs the discovery AND stores the result of the discovery.
|
|
||||||
*
|
|
||||||
* First, require this library into your program source:
|
|
||||||
*
|
|
||||||
* <pre> require_once "Auth/Yadis/Yadis.php";</pre>
|
|
||||||
*
|
|
||||||
* To perform Yadis discovery, first call the "discover" method
|
|
||||||
* statically with a URI parameter:
|
|
||||||
*
|
|
||||||
* <pre> $http_response = array();
|
|
||||||
* $fetcher = Auth_Yadis_Yadis::getHTTPFetcher();
|
|
||||||
* $yadis_object = Auth_Yadis_Yadis::discover($uri,
|
|
||||||
* $http_response, $fetcher);</pre>
|
|
||||||
*
|
|
||||||
* If the discovery succeeds, $yadis_object will be an instance of
|
|
||||||
* {@link Auth_Yadis_Yadis}. If not, it will be null. The XRDS
|
|
||||||
* document found during discovery should have service descriptions,
|
|
||||||
* which can be accessed by calling
|
|
||||||
*
|
|
||||||
* <pre> $service_list = $yadis_object->services();</pre>
|
|
||||||
*
|
|
||||||
* which returns an array of objects which describe each service.
|
|
||||||
* These objects are instances of Auth_Yadis_Service. Each object
|
|
||||||
* describes exactly one whole Service element, complete with all of
|
|
||||||
* its Types and URIs (no expansion is performed). The common use
|
|
||||||
* case for using the service objects returned by services() is to
|
|
||||||
* write one or more filter functions and pass those to services():
|
|
||||||
*
|
|
||||||
* <pre> $service_list = $yadis_object->services(
|
|
||||||
* array("filterByURI",
|
|
||||||
* "filterByExtension"));</pre>
|
|
||||||
*
|
|
||||||
* The filter functions (whose names appear in the array passed to
|
|
||||||
* services()) take the following form:
|
|
||||||
*
|
|
||||||
* <pre> function myFilter(&$service) {
|
|
||||||
* // Query $service object here. Return true if the service
|
|
||||||
* // matches your query; false if not.
|
|
||||||
* }</pre>
|
|
||||||
*
|
|
||||||
* This is an example of a filter which uses a regular expression to
|
|
||||||
* match the content of URI tags (note that the Auth_Yadis_Service
|
|
||||||
* class provides a getURIs() method which you should use instead of
|
|
||||||
* this contrived example):
|
|
||||||
*
|
|
||||||
* <pre>
|
|
||||||
* function URIMatcher(&$service) {
|
|
||||||
* foreach ($service->getElements('xrd:URI') as $uri) {
|
|
||||||
* if (preg_match("/some_pattern/",
|
|
||||||
* $service->parser->content($uri))) {
|
|
||||||
* return true;
|
|
||||||
* }
|
|
||||||
* }
|
|
||||||
* return false;
|
|
||||||
* }</pre>
|
|
||||||
*
|
|
||||||
* The filter functions you pass will be called for each service
|
|
||||||
* object to determine which ones match the criteria your filters
|
|
||||||
* specify. The default behavior is that if a given service object
|
|
||||||
* matches ANY of the filters specified in the services() call, it
|
|
||||||
* will be returned. You can specify that a given service object will
|
|
||||||
* be returned ONLY if it matches ALL specified filters by changing
|
|
||||||
* the match mode of services():
|
|
||||||
*
|
|
||||||
* <pre> $yadis_object->services(array("filter1", "filter2"),
|
|
||||||
* SERVICES_YADIS_MATCH_ALL);</pre>
|
|
||||||
*
|
|
||||||
* See {@link SERVICES_YADIS_MATCH_ALL} and {@link
|
|
||||||
* SERVICES_YADIS_MATCH_ANY}.
|
|
||||||
*
|
|
||||||
* Services described in an XRDS should have a library which you'll
|
|
||||||
* probably be using. Those libraries are responsible for defining
|
|
||||||
* filters that can be used with the "services()" call. If you need
|
|
||||||
* to write your own filter, see the documentation for {@link
|
|
||||||
* Auth_Yadis_Service}.
|
|
||||||
*
|
|
||||||
* @package OpenID
|
|
||||||
*/
|
|
||||||
class Auth_Yadis_Yadis {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an HTTP fetcher object. If the CURL extension is
|
|
||||||
* present, an instance of {@link Auth_Yadis_ParanoidHTTPFetcher}
|
|
||||||
* is returned. If not, an instance of
|
|
||||||
* {@link Auth_Yadis_PlainHTTPFetcher} is returned.
|
|
||||||
*
|
|
||||||
* If Auth_Yadis_CURL_OVERRIDE is defined, this method will always
|
|
||||||
* return a {@link Auth_Yadis_PlainHTTPFetcher}.
|
|
||||||
*/
|
|
||||||
function getHTTPFetcher($timeout = 20)
|
|
||||||
{
|
|
||||||
if (Auth_Yadis_Yadis::curlPresent() &&
|
|
||||||
(!defined('Auth_Yadis_CURL_OVERRIDE'))) {
|
|
||||||
$fetcher = new Auth_Yadis_ParanoidHTTPFetcher($timeout);
|
|
||||||
} else {
|
|
||||||
$fetcher = new Auth_Yadis_PlainHTTPFetcher($timeout);
|
|
||||||
}
|
|
||||||
return $fetcher;
|
|
||||||
}
|
|
||||||
|
|
||||||
function curlPresent()
|
|
||||||
{
|
|
||||||
return function_exists('curl_init');
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _getHeader($header_list, $names)
|
|
||||||
{
|
|
||||||
foreach ($header_list as $name => $value) {
|
|
||||||
foreach ($names as $n) {
|
|
||||||
if (strtolower($name) == strtolower($n)) {
|
|
||||||
return $value;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function _getContentType($content_type_header)
|
|
||||||
{
|
|
||||||
if ($content_type_header) {
|
|
||||||
$parts = explode(";", $content_type_header);
|
|
||||||
return strtolower($parts[0]);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This should be called statically and will build a Yadis
|
|
||||||
* instance if the discovery process succeeds. This implements
|
|
||||||
* Yadis discovery as specified in the Yadis specification.
|
|
||||||
*
|
|
||||||
* @param string $uri The URI on which to perform Yadis discovery.
|
|
||||||
*
|
|
||||||
* @param array $http_response An array reference where the HTTP
|
|
||||||
* response object will be stored (see {@link
|
|
||||||
* Auth_Yadis_HTTPResponse}.
|
|
||||||
*
|
|
||||||
* @param Auth_Yadis_HTTPFetcher $fetcher An instance of a
|
|
||||||
* Auth_Yadis_HTTPFetcher subclass.
|
|
||||||
*
|
|
||||||
* @param array $extra_ns_map An array which maps namespace names
|
|
||||||
* to namespace URIs to be used when parsing the Yadis XRDS
|
|
||||||
* document.
|
|
||||||
*
|
|
||||||
* @param integer $timeout An optional fetcher timeout, in seconds.
|
|
||||||
*
|
|
||||||
* @return mixed $obj Either null or an instance of
|
|
||||||
* Auth_Yadis_Yadis, depending on whether the discovery
|
|
||||||
* succeeded.
|
|
||||||
*/
|
|
||||||
function discover($uri, &$fetcher,
|
|
||||||
$extra_ns_map = null, $timeout = 20)
|
|
||||||
{
|
|
||||||
$result = new Auth_Yadis_DiscoveryResult($uri);
|
|
||||||
|
|
||||||
$request_uri = $uri;
|
|
||||||
$headers = array("Accept: " . Auth_Yadis_CONTENT_TYPE);
|
|
||||||
|
|
||||||
if (!$fetcher) {
|
|
||||||
$fetcher = Auth_Yadis_Yadis::getHTTPFetcher($timeout);
|
|
||||||
}
|
|
||||||
|
|
||||||
$response = $fetcher->get($uri, $headers);
|
|
||||||
|
|
||||||
if (!$response || ($response->status != 200)) {
|
|
||||||
$result->fail();
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
$result->normalized_uri = $response->final_url;
|
|
||||||
$result->content_type = Auth_Yadis_Yadis::_getHeader(
|
|
||||||
$response->headers,
|
|
||||||
array('content-type'));
|
|
||||||
|
|
||||||
if ($result->content_type &&
|
|
||||||
(Auth_Yadis_Yadis::_getContentType($result->content_type) ==
|
|
||||||
Auth_Yadis_CONTENT_TYPE)) {
|
|
||||||
$result->xrds_uri = $result->normalized_uri;
|
|
||||||
} else {
|
|
||||||
$yadis_location = Auth_Yadis_Yadis::_getHeader(
|
|
||||||
$response->headers,
|
|
||||||
array(Auth_Yadis_HEADER_NAME));
|
|
||||||
|
|
||||||
if (!$yadis_location) {
|
|
||||||
$parser = new Auth_Yadis_ParseHTML();
|
|
||||||
$yadis_location = $parser->getHTTPEquiv($response->body);
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($yadis_location) {
|
|
||||||
$result->xrds_uri = $yadis_location;
|
|
||||||
|
|
||||||
$response = $fetcher->get($yadis_location);
|
|
||||||
|
|
||||||
if ($response->status != 200) {
|
|
||||||
$result->fail();
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
$result->content_type = Auth_Yadis_Yadis::_getHeader(
|
|
||||||
$response->headers,
|
|
||||||
array('content-type'));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$result->response_text = $response->body;
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
@ -1,152 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* OpenID authentication decorator
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
||||||
*/
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Decorator for the member class to support OpenID authentication
|
|
||||||
*
|
|
||||||
* This class adds the needed fields to the default member class to support
|
|
||||||
* authentication via OpenID.
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com
|
|
||||||
*/
|
|
||||||
class OpenIDAuthenticatedRole extends DataObjectDecorator {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Define extra database fields
|
|
||||||
*
|
|
||||||
* Returns a map where the keys are db, has_one, etc, and the values are
|
|
||||||
* additional fields/relations to be defined
|
|
||||||
*
|
|
||||||
* @return array Returns a map where the keys are db, has_one, etc, and
|
|
||||||
* the values are additional fields/relations to be defined
|
|
||||||
*/
|
|
||||||
function extraDBFields() {
|
|
||||||
return array(
|
|
||||||
'db' => array('IdentityURL' => 'Varchar(255)'),
|
|
||||||
'has_one' => array(),
|
|
||||||
'defaults' => array('IdentityURL' => null),
|
|
||||||
'indexes' => array('IdentityURL' => 'unique (IdentityURL)')
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Edit the given query object to support queries for this extension
|
|
||||||
*
|
|
||||||
* At the moment this method does nothing.
|
|
||||||
*
|
|
||||||
* @param SQLQuery $query Query to augment.
|
|
||||||
*/
|
|
||||||
function augmentSQL(SQLQuery &$query) {
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Update the database schema as required by this extension
|
|
||||||
*
|
|
||||||
* At the moment this method does nothing.
|
|
||||||
*/
|
|
||||||
function augmentDatabase() {
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Change the member dialog in the CMS
|
|
||||||
*
|
|
||||||
* This method updates the form in the member dialog to make it possible
|
|
||||||
* to edit the new database fields.
|
|
||||||
*/
|
|
||||||
function updateCMSFields(FieldSet &$fields) {
|
|
||||||
$fields->push(
|
|
||||||
new HeaderField(_t('Security.OPENIDHEADER', "OpenID/i-name credentials")),
|
|
||||||
"OpenIDHeader"
|
|
||||||
);
|
|
||||||
$fields->push(
|
|
||||||
new LiteralField("OpenIDDescription",
|
|
||||||
_t('Security.OPENIDDESC',"<p>Make sure you enter your normalized OpenID/i-name credentials
|
|
||||||
here, i.e. with protocol and trailing slash for OpenID (e.g. http://openid.silverstripe.com/).</p>")
|
|
||||||
)
|
|
||||||
);
|
|
||||||
$fields->push(
|
|
||||||
new TextField("IdentityURL", _t('Security.OPENIDURL', "OpenID URL/i-name")),
|
|
||||||
"IdentityURL"
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Can the current user edit the given member?
|
|
||||||
*
|
|
||||||
* Only the user itself or an administrator can edit an user account.
|
|
||||||
*
|
|
||||||
* @return bool Returns TRUE if this member can be edited, FALSE otherwise
|
|
||||||
*/
|
|
||||||
function canEdit() {
|
|
||||||
if($this->owner->ID == Member::currentUserID())
|
|
||||||
return true;
|
|
||||||
|
|
||||||
$member = Member::currentUser();
|
|
||||||
if($member)
|
|
||||||
return $member->isAdmin();
|
|
||||||
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Validator of the decorator for the member class to support OpenID
|
|
||||||
* authentication
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com
|
|
||||||
*/
|
|
||||||
class OpenIDAuthenticatedRole_Validator extends Extension {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Server-side validation
|
|
||||||
*
|
|
||||||
* This method checks if the entered identity URL is unique.
|
|
||||||
*
|
|
||||||
* @param array $data User submitted data
|
|
||||||
* @param Form $form The used form
|
|
||||||
* @return bool Returns TRUE if the submitted data is valid, otherwise
|
|
||||||
* FALSE.
|
|
||||||
*/
|
|
||||||
function updatePHP(array $data, Form &$form) {
|
|
||||||
if(!isset($data['IdentityURL']) || strlen(trim($data['IdentityURL'])) == 0)
|
|
||||||
return true;
|
|
||||||
|
|
||||||
$member = DataObject::get_one('Member',
|
|
||||||
"IdentityURL = '". Convert::raw2sql($data['IdentityURL']) ."'");
|
|
||||||
|
|
||||||
// if we are in a complex table field popup, use ctf[childID], else use
|
|
||||||
// ID
|
|
||||||
$id = null;
|
|
||||||
if(isset($_REQUEST['ctf']['childID'])) {
|
|
||||||
$id = $_REQUEST['ctf']['childID'];
|
|
||||||
} elseif(isset($_REQUEST['ID'])) {
|
|
||||||
$id = $_REQUEST['ID'];
|
|
||||||
}
|
|
||||||
|
|
||||||
if(is_object($member) && $member->ID != $id) {
|
|
||||||
$field = $form->dataFieldByName('IdentityURL');
|
|
||||||
$this->owner->validationError($field->id(),
|
|
||||||
_t('Security.MEMBERALREADYEXISTS', "There already exists a member with this identity URL"),
|
|
||||||
"required");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
?>
|
|
@ -1,383 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* OpenID authenticator and controller
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
||||||
*/
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Add the security folder to the include path so that the
|
|
||||||
* {@link http://www.openidenabled.com/ PHP OpenID library} finds its files
|
|
||||||
*/
|
|
||||||
ini_set('include_path', ini_get('include_path') . PATH_SEPARATOR .
|
|
||||||
realpath(dirname(__FILE__)));
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the OpenID consumer code.
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID/Consumer.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the "file store" module, which we'll need to store
|
|
||||||
* OpenID information.
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID/FileStore.php";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the Simple Registration extension API.
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID/SReg.php";
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* OpenID authenticator
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
||||||
*/
|
|
||||||
class OpenIDAuthenticator extends Authenticator {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Callback function that is called when the authenticator is registered
|
|
||||||
*
|
|
||||||
* Use this method for initialization of a newly registered authenticator.
|
|
||||||
* Just overload this method and it will be called when the authenticator
|
|
||||||
* is registered.
|
|
||||||
* <b>If the method returns FALSE, the authenticator won't be
|
|
||||||
* registered!</b>
|
|
||||||
*
|
|
||||||
* @return bool Returns TRUE on success, FALSE otherwise.
|
|
||||||
*/
|
|
||||||
protected static function on_register() {
|
|
||||||
Object::add_extension('Member', 'OpenIDAuthenticatedRole');
|
|
||||||
Object::add_extension('Member_Validator', 'OpenIDAuthenticatedRole_Validator');
|
|
||||||
return parent::on_register();
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Method to authenticate an user
|
|
||||||
*
|
|
||||||
* @param array $RAW_data Raw data to authenticate the user
|
|
||||||
* @param Form $form Optional: If passed, better error messages can be
|
|
||||||
* produced by using
|
|
||||||
* {@link Form::sessionMessage()}
|
|
||||||
* @return bool Returns FALSE if authentication fails, otherwise the
|
|
||||||
* method will not return at all because the browser will be
|
|
||||||
* redirected to some other server.
|
|
||||||
*
|
|
||||||
* @todo Check if we can send the POST request for OpenID 2 directly
|
|
||||||
* (without rendering a form and using javascript)
|
|
||||||
*/
|
|
||||||
public static function authenticate(array $RAW_data, Form $form = null) {
|
|
||||||
$openid = trim($RAW_data['OpenIDURL']);
|
|
||||||
|
|
||||||
if(strlen($openid) == 0) {
|
|
||||||
if(!is_null($form)) {
|
|
||||||
$form->sessionMessage(
|
|
||||||
_t('OpenIDAuthenticator.ERRORCRED', "Please enter your OpenID URL or your i-name."),
|
|
||||||
"bad"
|
|
||||||
);
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
$trust_root = Director::absoluteBaseURL();
|
|
||||||
$return_to_url = $trust_root . 'OpenIDAuthenticator_Controller';
|
|
||||||
|
|
||||||
$consumer = new Auth_OpenID_Consumer(new OpenIDStorage(),
|
|
||||||
new SessionWrapper());
|
|
||||||
|
|
||||||
|
|
||||||
// No auth request means we can't begin OpenID
|
|
||||||
$auth_request = $consumer->begin($openid);
|
|
||||||
if(!$auth_request) {
|
|
||||||
if(!is_null($form)) {
|
|
||||||
$form->sessionMessage(
|
|
||||||
_t('OpenIDAuthenticator.ERRORNOVALID',
|
|
||||||
"That doesn't seem to be a valid OpenID " .
|
|
||||||
"or i-name identifier. Please try again."
|
|
||||||
),
|
|
||||||
"bad"
|
|
||||||
);
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
$SQL_identity = Convert::raw2sql($auth_request->endpoint->claimed_id);
|
|
||||||
if(!($member = DataObject::get_one("Member",
|
|
||||||
"Member.IdentityURL = '$SQL_identity'"))) {
|
|
||||||
if(!is_null($form)) {
|
|
||||||
$form->sessionMessage(
|
|
||||||
_t('OpenIDAuthenticator.ERRORNOTENABLED',
|
|
||||||
"Either your account is not enabled for " .
|
|
||||||
"OpenID/i-name authentication " .
|
|
||||||
"or the entered identifier is wrong. " .
|
|
||||||
"Please try again."),
|
|
||||||
"bad"
|
|
||||||
);
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
if($auth_request->shouldSendRedirect()) {
|
|
||||||
// For OpenID 1, send a redirect.
|
|
||||||
$redirect_url = $auth_request->redirectURL($trust_root,
|
|
||||||
$return_to_url);
|
|
||||||
|
|
||||||
if(Auth_OpenID::isFailure($redirect_url)) {
|
|
||||||
displayError("Could not redirect to server: " .
|
|
||||||
$redirect_url->message);
|
|
||||||
} else {
|
|
||||||
Director::redirect($redirect_url);
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
} else {
|
|
||||||
// For OpenID 2, use a javascript form to send a POST request to the
|
|
||||||
// server.
|
|
||||||
$form_id = 'openid_message';
|
|
||||||
$form_html = $auth_request->formMarkup($trust_root, $return_to_url,
|
|
||||||
false,
|
|
||||||
array('id' => $form_id));
|
|
||||||
|
|
||||||
if(Auth_OpenID::isFailure($form_html)) {
|
|
||||||
displayError("Could not redirect to server: " .
|
|
||||||
$form_html->message);
|
|
||||||
} else {
|
|
||||||
$page_contents = array(
|
|
||||||
"<html><head><title>",
|
|
||||||
_t('OpenIDAuthenticator.TRANSACTIONINPROGRESS', "OpenID transaction in progress"),
|
|
||||||
"</title></head>",
|
|
||||||
"<body onload='document.getElementById(\"". $form_id .
|
|
||||||
"\").submit()'>",
|
|
||||||
$form_html,
|
|
||||||
_t('OpenIDAuthenticator.TRANSACTIONNOTE',
|
|
||||||
"<p>Click "Continue" to login. You are only seeing " .
|
|
||||||
"this because you appear to have JavaScript disabled.</p>"
|
|
||||||
),
|
|
||||||
"</body></html>");
|
|
||||||
|
|
||||||
print implode("\n", $page_contents);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Stop the script execution! This method should return only on error
|
|
||||||
exit();
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Method that creates the login form for this authentication method
|
|
||||||
*
|
|
||||||
* @param Controller The parent controller, necessary to create the
|
|
||||||
* appropriate form action tag
|
|
||||||
* @return Form Returns the login form to use with this authentication
|
|
||||||
* method
|
|
||||||
*/
|
|
||||||
public static function get_login_form(Controller $controller) {
|
|
||||||
return Object::create("OpenIDLoginForm", $controller, "LoginForm");
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get the name of the authentication method
|
|
||||||
*
|
|
||||||
* @return string Returns the name of the authentication method.
|
|
||||||
*/
|
|
||||||
public static function get_name() {
|
|
||||||
return "OpenID/i-name";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* OpenIDAuthenticator Controller
|
|
||||||
*
|
|
||||||
* This class handles the response of the OpenID server to authenticate
|
|
||||||
* the user
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
||||||
*/
|
|
||||||
class OpenIDAuthenticator_Controller extends Controller {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Run the controller
|
|
||||||
*
|
|
||||||
* @param array $requestParams Passed request parameters
|
|
||||||
*/
|
|
||||||
function run($requestParams) {
|
|
||||||
$this->pushCurrent();
|
|
||||||
$this->response = new HTTPResponse();
|
|
||||||
|
|
||||||
parent::init();
|
|
||||||
|
|
||||||
if(isset($_GET['debug_profile']))
|
|
||||||
Profiler::mark("OpenIDAuthenticator_Controller");
|
|
||||||
|
|
||||||
|
|
||||||
$consumer = new Auth_OpenID_Consumer(new OpenIDStorage(),
|
|
||||||
new SessionWrapper());
|
|
||||||
|
|
||||||
|
|
||||||
// Complete the authentication process using the server's response.
|
|
||||||
$response = $consumer->complete();
|
|
||||||
|
|
||||||
if($response->status == Auth_OpenID_CANCEL) {
|
|
||||||
Session::set("Security.Message.message",
|
|
||||||
_t('OpenIDAuthenticator.VERIFICATIONCANCELLED', "The verification was cancelled. Please try again."));
|
|
||||||
Session::set("Security.Message.type", "bad");
|
|
||||||
|
|
||||||
if(isset($_GET['debug_profile']))
|
|
||||||
Profiler::unmark("OpenIDAuthenticator_Controller");
|
|
||||||
|
|
||||||
Director::redirect("Security/login");
|
|
||||||
|
|
||||||
} else if($response->status == Auth_OpenID_FAILURE) {
|
|
||||||
Session::set("Security.Message.message", // use $response->message ??
|
|
||||||
_t('OpenIDAuthenticator.AUTHFAILED', "The OpenID/i-name authentication failed.")
|
|
||||||
);
|
|
||||||
Session::set("Security.Message.type", "bad");
|
|
||||||
|
|
||||||
if(isset($_GET['debug_profile']))
|
|
||||||
Profiler::unmark("OpenIDAuthenticator_Controller");
|
|
||||||
|
|
||||||
Director::redirect("Security/login");
|
|
||||||
|
|
||||||
} else if($response->status == Auth_OpenID_SUCCESS) {
|
|
||||||
$openid = $response->identity_url;
|
|
||||||
|
|
||||||
if($response->endpoint->canonicalID) {
|
|
||||||
$openid = $response->endpoint->canonicalID;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
if(isset($_GET['debug_profile']))
|
|
||||||
Profiler::unmark("OpenIDAuthenticator_Controller");
|
|
||||||
|
|
||||||
|
|
||||||
$SQL_identity = Convert::raw2sql($openid);
|
|
||||||
if($member = DataObject::get_one("Member",
|
|
||||||
"Member.IdentityURL = '$SQL_identity'")) {
|
|
||||||
$firstname = Convert::raw2xml($member->FirstName);
|
|
||||||
Session::set("Security.Message.message",
|
|
||||||
sprintf(_t('Member.WELCOMEBACK'), $firstname)
|
|
||||||
);
|
|
||||||
Session::set("Security.Message.type", "good");
|
|
||||||
|
|
||||||
$member->LogIn(
|
|
||||||
Session::get('SessionForms.OpenIDLoginForm.Remember'));
|
|
||||||
|
|
||||||
Session::clear('SessionForms.OpenIDLoginForm.OpenIDURL');
|
|
||||||
Session::clear('SessionForms.OpenIDLoginForm.Remember');
|
|
||||||
|
|
||||||
if($backURL = Session::get("BackURL")) {
|
|
||||||
Session::clear("BackURL");
|
|
||||||
Director::redirect($backURL);
|
|
||||||
} else {
|
|
||||||
Director::redirectBack();
|
|
||||||
}
|
|
||||||
|
|
||||||
} else {
|
|
||||||
Session::set("Security.Message.message",
|
|
||||||
_t('OpenIDAuthenticator.LOGINFAILED', "Login failed. Please try again.")
|
|
||||||
);
|
|
||||||
Session::set("Security.Message.type", "bad");
|
|
||||||
|
|
||||||
if($badLoginURL = Session::get("BadLoginURL")) {
|
|
||||||
Director::redirect($badLoginURL);
|
|
||||||
} else {
|
|
||||||
Director::redirectBack();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $this->response;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Helper function to set a session message for the OpenID login form
|
|
||||||
*
|
|
||||||
* @param string $message Message to store
|
|
||||||
* @param string $type Message type (e.g. "good" or "bad")
|
|
||||||
*/
|
|
||||||
function sessionMessage($message, $type) {
|
|
||||||
Session::set("FormInfo.OpenIDLoginForm_LoginForm.formError.message",
|
|
||||||
$message);
|
|
||||||
Session::set("'FormInfo.OpenIDLoginForm_LoginForm.formError.type",
|
|
||||||
$type);
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Session wrapper class for the OpenID library
|
|
||||||
*
|
|
||||||
* This class is a wrapper for the {@link Session} which implements the
|
|
||||||
* interface of the {@link Auth_Yadis_PHPSession} class.
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
||||||
*/
|
|
||||||
class SessionWrapper extends Auth_Yadis_PHPSession {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set a session key/value pair.
|
|
||||||
*
|
|
||||||
* @param string $name The name of the session key to add.
|
|
||||||
* @param string $value The value to add to the session.
|
|
||||||
*/
|
|
||||||
public function set($name, $value) {
|
|
||||||
Session::set($name, $value);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get a key's value from the session.
|
|
||||||
*
|
|
||||||
* @param string $name The name of the key to retrieve.
|
|
||||||
* @param string $default The optional value to return if the key
|
|
||||||
* is not found in the session.
|
|
||||||
* @return string $result The key's value in the session or
|
|
||||||
* $default if it isn't found.
|
|
||||||
*/
|
|
||||||
public function get($name, $default=null) {
|
|
||||||
$value = Session::get($name);
|
|
||||||
if(is_null($value))
|
|
||||||
$value = $default;
|
|
||||||
|
|
||||||
return $value;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Remove a key/value pair from the session.
|
|
||||||
*
|
|
||||||
* @param string $name The name of the key to remove.
|
|
||||||
*/
|
|
||||||
public function del($name) {
|
|
||||||
Session::clear($name);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the contents of the session in array form.
|
|
||||||
*/
|
|
||||||
public function contents() {
|
|
||||||
return Session::getAll();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
?>
|
|
@ -1,142 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* OpenID log-in form
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
||||||
*/
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* OpenID log-in form
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
||||||
*/
|
|
||||||
class OpenIDLoginForm extends LoginForm {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructor
|
|
||||||
*
|
|
||||||
* @param Controller $controller The parent controller, necessary to
|
|
||||||
* create the appropriate form action tag.
|
|
||||||
* @param string $name The method on the controller that will return this
|
|
||||||
* form object.
|
|
||||||
* @param FieldSet|FormField $fields All of the fields in the form - a
|
|
||||||
* {@link FieldSet} of {@link FormField}
|
|
||||||
* objects.
|
|
||||||
* @param FieldSet|FormAction $actions All of the action buttons in the
|
|
||||||
* form - a {@link FieldSet} of
|
|
||||||
* {@link FormAction} objects
|
|
||||||
* @param bool $checkCurrentUser If set to TRUE, it will be checked if a
|
|
||||||
* the user is currently logged in, and if
|
|
||||||
* so, only a logout button will be rendered
|
|
||||||
*/
|
|
||||||
function __construct($controller, $name, $fields = null, $actions = null,
|
|
||||||
$checkCurrentUser = true) {
|
|
||||||
|
|
||||||
$this->authenticator_class = 'OpenIDAuthenticator';
|
|
||||||
|
|
||||||
Requirements::themedCSS('openid_login');
|
|
||||||
|
|
||||||
if(isset($_REQUEST['BackURL'])) {
|
|
||||||
$backURL = $_REQUEST['BackURL'];
|
|
||||||
} else {
|
|
||||||
$backURL = Session::get('BackURL');
|
|
||||||
}
|
|
||||||
|
|
||||||
if($checkCurrentUser && Member::currentUserID()) {
|
|
||||||
$fields = new FieldSet();
|
|
||||||
$actions = new FieldSet(new FormAction("logout", _t('Member.BUTTONLOGINOTHER')));
|
|
||||||
} else {
|
|
||||||
if(!$fields) {
|
|
||||||
$fields = new FieldSet(
|
|
||||||
new LiteralField("OpenIDDescription",
|
|
||||||
_t('OpenIDLoginForm.DESC',
|
|
||||||
'<div id="OpenIDDescription"><p>OpenID is an Internet-wide identity system
|
|
||||||
that allows you to sign in to many websites with a single account.
|
|
||||||
For more information visit <a href="http://openid.net">openid.net</a>.</p></div>
|
|
||||||
')
|
|
||||||
),
|
|
||||||
new HiddenField("AuthenticationMethod", null,
|
|
||||||
$this->authenticator_class, $this),
|
|
||||||
new TextField("OpenIDURL", _t('OpenIDLoginForm.URL', "OpenID URL"),
|
|
||||||
Session::get('SessionForms.OpenIDLoginForm.OpenIDURL'), null, $this),
|
|
||||||
new CheckboxField("Remember", _t('Member.REMEMBERME'),
|
|
||||||
Session::get('SessionForms.OpenIDLoginForm.Remember'), $this)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
if(!$actions) {
|
|
||||||
$actions = new FieldSet(
|
|
||||||
new FormAction("dologin", _t('Member.BUTTONLOGIN'))
|
|
||||||
);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if(isset($backURL)) {
|
|
||||||
$fields->push(new HiddenField('BackURL', 'BackURL', $backURL));
|
|
||||||
}
|
|
||||||
|
|
||||||
parent::__construct($controller, $name, $fields, $actions);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get message from session
|
|
||||||
*/
|
|
||||||
protected function getMessageFromSession() {
|
|
||||||
parent::getMessageFromSession();
|
|
||||||
if(($member = Member::currentUser()) &&
|
|
||||||
!Session::get('OpenIDLoginForm.force_message')) {
|
|
||||||
$this->message = sprintf(_t('Member.LOGGEDINAS'), $member->FirstName);
|
|
||||||
}
|
|
||||||
Session::set('OpenIDLoginForm.force_message', false);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Login form handler method
|
|
||||||
*
|
|
||||||
* This method is called when the user clicks on "Log in"
|
|
||||||
*
|
|
||||||
* @param array $data Submitted data
|
|
||||||
*/
|
|
||||||
public function dologin($data) {
|
|
||||||
Session::set('SessionForms.OpenIDLoginForm.Remember',
|
|
||||||
isset($data['Remember']));
|
|
||||||
|
|
||||||
OpenIDAuthenticator::authenticate($data, $this);
|
|
||||||
|
|
||||||
// If the OpenID authenticator returns, an error occured!
|
|
||||||
Session::set('SessionForms.OpenIDLoginForm.OpenIDURL', $data['OpenIDURL']);
|
|
||||||
|
|
||||||
if(isset($_REQUEST['BackURL']) && $backURL = $_REQUEST['BackURL']) {
|
|
||||||
Session::set('BackURL', $backURL);
|
|
||||||
}
|
|
||||||
|
|
||||||
if($badLoginURL = Session::get("BadLoginURL")){
|
|
||||||
Director::redirect($badLoginURL);
|
|
||||||
} else {
|
|
||||||
// Show the right tab on failed login
|
|
||||||
Director::redirect(Director::absoluteURL(Security::Link("login")) . '#' . $this->FormName() .'_tab');
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Log out form handler method
|
|
||||||
*
|
|
||||||
* This method is called when the user clicks on "logout" on the form
|
|
||||||
* created when the parameter <i>$checkCurrentUser</i> of the
|
|
||||||
* {@link __construct constructor} was set to TRUE and the user was
|
|
||||||
* currently logged in.
|
|
||||||
*/
|
|
||||||
public function logout() {
|
|
||||||
$s = new Security();
|
|
||||||
$s->logout();
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
?>
|
|
@ -1,938 +0,0 @@
|
|||||||
<?php
|
|
||||||
|
|
||||||
/**
|
|
||||||
* OpenID storage class
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
||||||
*/
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the {@link Auth_OpenID OpenID utility function class}
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID.php';
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the {@link Auth_OpenID_OpenIDStore storage class}
|
|
||||||
*/
|
|
||||||
require_once 'Auth/OpenID/Interface.php';
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Require the
|
|
||||||
* {@link Auth_OpenID_DatabaseConnection database connection class}
|
|
||||||
*/
|
|
||||||
require_once "Auth/OpenID/DatabaseConnection.php";
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* OpenID storage class
|
|
||||||
*
|
|
||||||
* This is the interface for the store objects the OpenID library uses.
|
|
||||||
* It is a single class that provides all of the persistence mechanisms that
|
|
||||||
* the OpenID library needs, for both servers and consumers.
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
||||||
*/
|
|
||||||
class OpenIDStorage extends Auth_OpenID_OpenIDStore {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This static variable is used to decrease the number of table existence
|
|
||||||
* checks
|
|
||||||
*
|
|
||||||
* @todo Create the tables during installation, so we can reduce the
|
|
||||||
* number of needed SQL queries to a minimum and we don't need this
|
|
||||||
* variable anymore
|
|
||||||
*/
|
|
||||||
private static $S_checkedTableExistence = false;
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructor
|
|
||||||
*
|
|
||||||
* The constructor will check (once per script execution; with help of a
|
|
||||||
* static variable) if the needed tables exist, otherwise it will create
|
|
||||||
* them.
|
|
||||||
*
|
|
||||||
* @param string $associations_table This is an optional parameter to
|
|
||||||
* specify the name of the table used
|
|
||||||
* for storing associations.
|
|
||||||
* The default value is
|
|
||||||
* 'authentication_openid_associations'.
|
|
||||||
* @param string $nonces_table This is an optional parameter to specify
|
|
||||||
* the name of the table used for storing
|
|
||||||
* nonces.
|
|
||||||
* The default value is
|
|
||||||
* 'authentication_openid_nonces'.
|
|
||||||
*
|
|
||||||
*
|
|
||||||
* @todo Should the max. nonce age be configurable?
|
|
||||||
* @todo Create the tables during installation, so we can reduce the
|
|
||||||
* number of needed SQL queries.
|
|
||||||
*/
|
|
||||||
function __construct($associations_table = null, $nonces_table = null) {
|
|
||||||
if(is_null($associations_table))
|
|
||||||
$associations_table = 'authentication_openid_associations';
|
|
||||||
|
|
||||||
if(is_null($nonces_table))
|
|
||||||
$nonces_table = 'authentication_openid_nonces';
|
|
||||||
|
|
||||||
$connection = new OpenIDDatabaseConnection();
|
|
||||||
|
|
||||||
//-------------------------------------------------------------------//
|
|
||||||
// This part normally resided in the Auth_OpenID_SQLStore class, but
|
|
||||||
// due to a name conflict of the DB class we can't simple inherit from
|
|
||||||
// it!
|
|
||||||
|
|
||||||
$this->associations_table_name = "oid_associations";
|
|
||||||
$this->nonces_table_name = "oid_nonces";
|
|
||||||
|
|
||||||
// Check the connection object type to be sure it's a PEAR compatible
|
|
||||||
// database connection.
|
|
||||||
if (!(is_object($connection) &&
|
|
||||||
(is_subclass_of($connection, 'db_common') ||
|
|
||||||
is_subclass_of($connection,
|
|
||||||
'auth_openid_databaseconnection')))) {
|
|
||||||
trigger_error("Auth_OpenID_SQLStore expected PEAR compatible " .
|
|
||||||
"connection object (got ".get_class($connection).")",
|
|
||||||
E_USER_ERROR);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->connection = $connection;
|
|
||||||
|
|
||||||
|
|
||||||
if($associations_table) {
|
|
||||||
$this->associations_table_name = $associations_table;
|
|
||||||
}
|
|
||||||
|
|
||||||
if($nonces_table) {
|
|
||||||
$this->nonces_table_name = $nonces_table;
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->max_nonce_age = 6 * 60 * 60;
|
|
||||||
|
|
||||||
|
|
||||||
// Be sure to run the database queries with auto-commit mode
|
|
||||||
// turned OFF, because we want every function to run in a
|
|
||||||
// transaction, implicitly. As a rule, methods named with a
|
|
||||||
// leading underscore will NOT control transaction behavior.
|
|
||||||
// Callers of these methods will worry about transactions.
|
|
||||||
$this->connection->autoCommit(false);
|
|
||||||
|
|
||||||
// Create an empty SQL strings array.
|
|
||||||
$this->sql = array();
|
|
||||||
|
|
||||||
// Call this method (which should be overridden by subclasses)
|
|
||||||
// to populate the $this->sql array with SQL strings.
|
|
||||||
$this->setSQL();
|
|
||||||
|
|
||||||
// Verify that all required SQL statements have been set, and
|
|
||||||
// raise an error if any expected SQL strings were either
|
|
||||||
// absent or empty.
|
|
||||||
list($missing, $empty) = $this->_verifySQL();
|
|
||||||
|
|
||||||
if($missing) {
|
|
||||||
trigger_error("Expected keys in SQL query list: " .
|
|
||||||
implode(", ", $missing),
|
|
||||||
E_USER_ERROR);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if($empty) {
|
|
||||||
trigger_error("SQL list keys have no SQL strings: " .
|
|
||||||
implode(", ", $empty),
|
|
||||||
E_USER_ERROR);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Add table names to queries.
|
|
||||||
$this->_fixSQL();
|
|
||||||
//--------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
|
|
||||||
if(self::$S_checkedTableExistence == false) {
|
|
||||||
$table_list = (!isset(DB::getConn()->tableList))
|
|
||||||
? $table_list = DB::tableList()
|
|
||||||
: DB::getConn()->tableList;
|
|
||||||
|
|
||||||
$this->connection->autoCommit(true);
|
|
||||||
|
|
||||||
if(!isset($table_list[strtolower($this->associations_table_name)]))
|
|
||||||
$this->create_assoc_table();
|
|
||||||
|
|
||||||
if(!isset($table_list[strtolower($this->nonces_table_name)]))
|
|
||||||
$this->create_nonce_table();
|
|
||||||
|
|
||||||
$this->connection->autoCommit(false);
|
|
||||||
DB::tableList();
|
|
||||||
|
|
||||||
self::$S_checkedTableExistence = true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This method is called by the constructor to set values in $this->sql,
|
|
||||||
* which is an array keyed on sql name.
|
|
||||||
*
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function setSQL() {
|
|
||||||
$this->sql['nonce_table'] =
|
|
||||||
"CREATE TABLE %s (\n".
|
|
||||||
" server_url VARCHAR(2047),\n".
|
|
||||||
" timestamp INTEGER,\n".
|
|
||||||
" salt CHAR(40),\n".
|
|
||||||
" UNIQUE (server_url(255), timestamp, salt)\n".
|
|
||||||
") DEFAULT CHARACTER SET latin1";
|
|
||||||
|
|
||||||
$this->sql['assoc_table'] =
|
|
||||||
"CREATE TABLE %s (\n".
|
|
||||||
" server_url BLOB,\n".
|
|
||||||
" handle VARCHAR(255),\n".
|
|
||||||
" secret BLOB,\n".
|
|
||||||
" issued INTEGER,\n".
|
|
||||||
" lifetime INTEGER,\n".
|
|
||||||
" assoc_type VARCHAR(64),\n".
|
|
||||||
" PRIMARY KEY (server_url(255), handle)\n".
|
|
||||||
") DEFAULT CHARACTER SET latin1";
|
|
||||||
|
|
||||||
$this->sql['set_assoc'] =
|
|
||||||
"REPLACE INTO %s VALUES (?, ?, !, ?, ?, ?)";
|
|
||||||
|
|
||||||
$this->sql['get_assocs'] =
|
|
||||||
"SELECT handle, secret, issued, lifetime, assoc_type FROM %s ".
|
|
||||||
"WHERE server_url = ?";
|
|
||||||
|
|
||||||
$this->sql['get_assoc'] =
|
|
||||||
"SELECT handle, secret, issued, lifetime, assoc_type FROM %s ".
|
|
||||||
"WHERE server_url = ? AND handle = ?";
|
|
||||||
|
|
||||||
$this->sql['remove_assoc'] =
|
|
||||||
"DELETE FROM %s WHERE server_url = ? AND handle = ?";
|
|
||||||
|
|
||||||
$this->sql['add_nonce'] =
|
|
||||||
"INSERT INTO %s (server_url, timestamp, salt) VALUES (?, ?, ?)";
|
|
||||||
|
|
||||||
$this->sql['get_expired'] =
|
|
||||||
"SELECT server_url FROM %s WHERE issued + lifetime < ?";
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constitutes the passed value a database error?
|
|
||||||
*
|
|
||||||
* @return Returns TRUE if $value constitutes a database error; returns
|
|
||||||
* FALSE otherwise.
|
|
||||||
* @access private
|
|
||||||
*/
|
|
||||||
function isError($value) {
|
|
||||||
return ($value === false);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create the nonce table
|
|
||||||
*
|
|
||||||
* @return bool Returns TRUE on success, FALSE on failure.
|
|
||||||
*/
|
|
||||||
function create_nonce_table() {
|
|
||||||
return $this->resultToBool(
|
|
||||||
$this->connection->query($this->sql['nonce_table']));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create the associations table
|
|
||||||
*
|
|
||||||
* @return bool Returns TRUE on success, FALSE on failure.
|
|
||||||
*/
|
|
||||||
function create_assoc_table() {
|
|
||||||
return $this->resultToBool(
|
|
||||||
$this->connection->query($this->sql['assoc_table']));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Check if a table exists
|
|
||||||
*
|
|
||||||
* @param string $table_name Table to check
|
|
||||||
* @return bool Returns TRUE if the table exists, otherwise FALSE.
|
|
||||||
*/
|
|
||||||
function tableExists($table_name)
|
|
||||||
{
|
|
||||||
return !$this->isError($this->connection->query(sprintf(
|
|
||||||
"SELECT * FROM %s LIMIT 0", $table_name)));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Converts a query result to a boolean
|
|
||||||
*
|
|
||||||
* @param object $obj Query result
|
|
||||||
* @return bool If the result is a database error according to
|
|
||||||
* {@link isError()}, this returns FALSE; otherwise, this
|
|
||||||
* returns TRUE.
|
|
||||||
*/
|
|
||||||
function resultToBool($obj)
|
|
||||||
{
|
|
||||||
if($this->isError($obj)) {
|
|
||||||
return false;
|
|
||||||
} else {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Resets the store by removing all records from the store's tables.
|
|
||||||
*/
|
|
||||||
function reset()
|
|
||||||
{
|
|
||||||
$this->connection->query(sprintf("DELETE FROM %s",
|
|
||||||
$this->associations_table_name));
|
|
||||||
|
|
||||||
$this->connection->query(sprintf("DELETE FROM %s",
|
|
||||||
$this->nonces_table_name));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Check if all the required SQL statements are set
|
|
||||||
*
|
|
||||||
* @return array Returns an array of in the form of
|
|
||||||
* array($missing, $empty) containing the missing and
|
|
||||||
* empty SQL statements.
|
|
||||||
*/
|
|
||||||
private function _verifySQL()
|
|
||||||
{
|
|
||||||
$missing = array();
|
|
||||||
$empty = array();
|
|
||||||
|
|
||||||
$required_sql_keys = array('nonce_table',
|
|
||||||
'assoc_table',
|
|
||||||
'set_assoc',
|
|
||||||
'get_assoc',
|
|
||||||
'get_assocs',
|
|
||||||
'remove_assoc',
|
|
||||||
'get_expired',
|
|
||||||
);
|
|
||||||
|
|
||||||
foreach($required_sql_keys as $key) {
|
|
||||||
if(!array_key_exists($key, $this->sql)) {
|
|
||||||
$missing[] = $key;
|
|
||||||
} else if(!$this->sql[$key]) {
|
|
||||||
$empty[] = $key;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return array($missing, $empty);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Fix SQL statements
|
|
||||||
*
|
|
||||||
* This function replaces the place holders in the set SQL statements
|
|
||||||
* with the right table names.
|
|
||||||
*/
|
|
||||||
private function _fixSQL()
|
|
||||||
{
|
|
||||||
$replacements = array(array('value' => $this->nonces_table_name,
|
|
||||||
'keys' => array('nonce_table',
|
|
||||||
'add_nonce')
|
|
||||||
),
|
|
||||||
array('value' => $this->associations_table_name,
|
|
||||||
'keys' => array('assoc_table',
|
|
||||||
'set_assoc',
|
|
||||||
'get_assoc',
|
|
||||||
'get_assocs',
|
|
||||||
'remove_assoc',
|
|
||||||
'get_expired')
|
|
||||||
)
|
|
||||||
);
|
|
||||||
|
|
||||||
foreach($replacements as $item) {
|
|
||||||
$value = $item['value'];
|
|
||||||
$keys = $item['keys'];
|
|
||||||
|
|
||||||
foreach($keys as $k) {
|
|
||||||
if(is_array($this->sql[$k])) {
|
|
||||||
foreach($this->sql[$k] as $part_key => $part_value) {
|
|
||||||
$this->sql[$k][$part_key] = sprintf($part_value,
|
|
||||||
$value);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$this->sql[$k] = sprintf($this->sql[$k], $value);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Decode a BLOB field
|
|
||||||
*
|
|
||||||
* @param mixed $blob The BLOB field's value
|
|
||||||
* @return mixed The decoded BLOB value
|
|
||||||
*/
|
|
||||||
function blobDecode($blob)
|
|
||||||
{
|
|
||||||
return $blob;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Encode a value for a BLOB field
|
|
||||||
*
|
|
||||||
* @param mixed $blob The value for the BLOB field
|
|
||||||
* @return mixed The encoded value
|
|
||||||
*/
|
|
||||||
function blobEncode($blob)
|
|
||||||
{
|
|
||||||
return "0x" . bin2hex($blob);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create the needed tables
|
|
||||||
*
|
|
||||||
* @return boolean Returns TRUE on success or FALSE on failure.
|
|
||||||
*/
|
|
||||||
function createTables()
|
|
||||||
{
|
|
||||||
$this->connection->autoCommit(true);
|
|
||||||
$n = $this->create_nonce_table();
|
|
||||||
$a = $this->create_assoc_table();
|
|
||||||
$this->connection->autoCommit(false);
|
|
||||||
|
|
||||||
if($n && $a) {
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set an association
|
|
||||||
*
|
|
||||||
* Helper function for {@link storeAssociation()}.
|
|
||||||
*
|
|
||||||
* @param string $server_url The server URL
|
|
||||||
* @param string $handle The handle for the association
|
|
||||||
* @param string $secret The secret
|
|
||||||
* @param string $issued When was the association issued?
|
|
||||||
* @param string $lifetime The lifetime of the association
|
|
||||||
* @param string $assoc_type The association type
|
|
||||||
* @return
|
|
||||||
*/
|
|
||||||
private function _set_assoc($server_url, $handle, $secret, $issued,
|
|
||||||
$lifetime, $assoc_type)
|
|
||||||
{
|
|
||||||
return $this->connection->query($this->sql['set_assoc'],
|
|
||||||
array($server_url,
|
|
||||||
$handle,
|
|
||||||
$secret,
|
|
||||||
$issued,
|
|
||||||
$lifetime,
|
|
||||||
$assoc_type));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Store an association
|
|
||||||
*
|
|
||||||
* @param string $server_url The URL of the server
|
|
||||||
* @param Auth_OpenID_Association The association object to store
|
|
||||||
*/
|
|
||||||
function storeAssociation($server_url, Auth_OpenID_Association $association)
|
|
||||||
{
|
|
||||||
if($this->resultToBool($this->_set_assoc($server_url,
|
|
||||||
$association->handle, $this->blobEncode($association->secret),
|
|
||||||
$association->issued, $association->lifetime,
|
|
||||||
$association->assoc_type))) {
|
|
||||||
$this->connection->commit();
|
|
||||||
} else {
|
|
||||||
$this->connection->rollback();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get an association
|
|
||||||
*
|
|
||||||
* This is a helper function for {@link getAssociation()}
|
|
||||||
*
|
|
||||||
* @param string $server_url The server URL
|
|
||||||
* @param string $server_url The handle
|
|
||||||
* @return array Returns the association row or NULL on error.
|
|
||||||
*/
|
|
||||||
private function _get_assoc($server_url, $handle)
|
|
||||||
{
|
|
||||||
$result = $this->connection->getRow($this->sql['get_assoc'],
|
|
||||||
array($server_url, $handle));
|
|
||||||
if($this->isError($result)) {
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get all associations for a specific server URL
|
|
||||||
*
|
|
||||||
* This is a helper function for {@link getAssociation()}
|
|
||||||
*
|
|
||||||
* @param string $server_url The server URL
|
|
||||||
* @return array Returns the association rows or an empty array on error.
|
|
||||||
*/
|
|
||||||
private function _get_assocs($server_url)
|
|
||||||
{
|
|
||||||
$result = $this->connection->getAll($this->sql['get_assocs'],
|
|
||||||
array($server_url));
|
|
||||||
|
|
||||||
if($this->isError($result)) {
|
|
||||||
return array();
|
|
||||||
} else {
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get an association
|
|
||||||
*
|
|
||||||
* @param string $server_url The URL of the server for which the
|
|
||||||
* associations should be retrieved
|
|
||||||
* @param string $handle Optional: The handle if one specific association
|
|
||||||
* should be returned. If set to NULL the most
|
|
||||||
* recently issued one will be returned.
|
|
||||||
* @return Auth_OpenID_Association The association or NULL if not found.
|
|
||||||
*/
|
|
||||||
function getAssociation($server_url, $handle = null)
|
|
||||||
{
|
|
||||||
if($handle !== null) {
|
|
||||||
$assoc = $this->_get_assoc($server_url, $handle);
|
|
||||||
|
|
||||||
$assocs = array();
|
|
||||||
if($assoc) {
|
|
||||||
$assocs[] = $assoc;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$assocs = $this->_get_assocs($server_url);
|
|
||||||
}
|
|
||||||
|
|
||||||
if(!$assocs || (count($assocs) == 0)) {
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
$associations = array();
|
|
||||||
|
|
||||||
foreach ($assocs as $assoc_row) {
|
|
||||||
$assoc = new Auth_OpenID_Association($assoc_row['handle'],
|
|
||||||
$assoc_row['secret'],
|
|
||||||
$assoc_row['issued'],
|
|
||||||
$assoc_row['lifetime'],
|
|
||||||
$assoc_row['assoc_type']);
|
|
||||||
|
|
||||||
$assoc->secret = $this->blobDecode($assoc->secret);
|
|
||||||
|
|
||||||
if($assoc->getExpiresIn() == 0) {
|
|
||||||
$this->removeAssociation($server_url, $assoc->handle);
|
|
||||||
} else {
|
|
||||||
$associations[] = array($assoc->issued, $assoc);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if($associations) {
|
|
||||||
$issued = array();
|
|
||||||
$assocs = array();
|
|
||||||
foreach($associations as $key => $assoc) {
|
|
||||||
$issued[$key] = $assoc[0];
|
|
||||||
$assocs[$key] = $assoc[1];
|
|
||||||
}
|
|
||||||
|
|
||||||
array_multisort($issued, SORT_DESC, $assocs, SORT_DESC,
|
|
||||||
$associations);
|
|
||||||
|
|
||||||
// return the most recently issued one.
|
|
||||||
list($issued, $assoc) = $associations[0];
|
|
||||||
return $assoc;
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Remove an association
|
|
||||||
*
|
|
||||||
* @param string $server_url The server URL
|
|
||||||
* @param string $server_url The handle
|
|
||||||
* @return array Returns the association row or NULL on error.
|
|
||||||
*/
|
|
||||||
function removeAssociation($server_url, $handle)
|
|
||||||
{
|
|
||||||
if($this->_get_assoc($server_url, $handle) == null) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if($this->resultToBool($this->connection->query(
|
|
||||||
$this->sql['remove_assoc'], array($server_url, $handle)))) {
|
|
||||||
$this->connection->commit();
|
|
||||||
} else {
|
|
||||||
$this->connection->rollback();
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Get the expired associations
|
|
||||||
*
|
|
||||||
* @return array Returns an array of expired server URLs
|
|
||||||
*/
|
|
||||||
function getExpired()
|
|
||||||
{
|
|
||||||
$sql = $this->sql['get_expired'];
|
|
||||||
$result = $this->connection->getAll($sql, array(time()));
|
|
||||||
|
|
||||||
$expired = array();
|
|
||||||
|
|
||||||
foreach($result as $row) {
|
|
||||||
$expired[] = $row['server_url'];
|
|
||||||
}
|
|
||||||
|
|
||||||
return $expired;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Store a nonce
|
|
||||||
*
|
|
||||||
* This is a helper function for {@link useNonce()}.
|
|
||||||
*
|
|
||||||
* @param string $server_url The URL of the server for which the nonce is
|
|
||||||
* used
|
|
||||||
* @param string $timestamp The timestamp of the creation of the nonce
|
|
||||||
* @param string $salt The value of the nonce
|
|
||||||
* @return bool Returns TRUE on success, FALSE on failure.
|
|
||||||
*/
|
|
||||||
private function _add_nonce($server_url, $timestamp, $salt)
|
|
||||||
{
|
|
||||||
$sql = $this->sql['add_nonce'];
|
|
||||||
$result = $this->connection->query($sql, array($server_url,
|
|
||||||
$timestamp,
|
|
||||||
$salt));
|
|
||||||
if($this->isError($result)) {
|
|
||||||
$this->connection->rollback();
|
|
||||||
} else {
|
|
||||||
$this->connection->commit();
|
|
||||||
}
|
|
||||||
return $this->resultToBool($result);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Store a nonce
|
|
||||||
*
|
|
||||||
* @param string $server_url The URL of the server for which the nonce is
|
|
||||||
* used
|
|
||||||
* @param string $timestamp The timestamp of the creation of the nonce
|
|
||||||
* @param string $salt The value of the nonce
|
|
||||||
* @return bool Returns TRUE on success, FALSE on failure.
|
|
||||||
*/
|
|
||||||
function useNonce($server_url, $timestamp, $salt)
|
|
||||||
{
|
|
||||||
return $this->_add_nonce($server_url, $timestamp, $salt);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* "Octifies" a binary string by returning a string with escaped octal
|
|
||||||
* bytes
|
|
||||||
*
|
|
||||||
* This is used for preparing binary data for PostgreSQL BYTEA fields.
|
|
||||||
*
|
|
||||||
* @param string $str The binary string to octify
|
|
||||||
* @return string The octified string
|
|
||||||
*/
|
|
||||||
private function _octify($str)
|
|
||||||
{
|
|
||||||
$result = "";
|
|
||||||
for ($i = 0; $i < Auth_OpenID::bytes($str); $i++) {
|
|
||||||
$ch = substr($str, $i, 1);
|
|
||||||
if ($ch == "\\") {
|
|
||||||
$result .= "\\\\\\\\";
|
|
||||||
} else if (ord($ch) == 0) {
|
|
||||||
$result .= "\\\\000";
|
|
||||||
} else {
|
|
||||||
$result .= "\\" . strval(decoct(ord($ch)));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* "Unoctifies" octal-escaped data from PostgreSQL and returns the
|
|
||||||
* resulting ASCII (possibly binary) string.
|
|
||||||
*
|
|
||||||
* @param string $str The octified string
|
|
||||||
* @return string The unoctified (binary) string
|
|
||||||
*/
|
|
||||||
private function _unoctify($str)
|
|
||||||
{
|
|
||||||
$result = "";
|
|
||||||
$i = 0;
|
|
||||||
while($i < strlen($str)) {
|
|
||||||
$char = $str[$i];
|
|
||||||
if($char == "\\") {
|
|
||||||
// Look to see if the next char is a backslash and
|
|
||||||
// append it.
|
|
||||||
if ($str[$i + 1] != "\\") {
|
|
||||||
$octal_digits = substr($str, $i + 1, 3);
|
|
||||||
$dec = octdec($octal_digits);
|
|
||||||
$char = chr($dec);
|
|
||||||
$i += 4;
|
|
||||||
} else {
|
|
||||||
$char = "\\";
|
|
||||||
$i += 2;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$i += 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
$result .= $char;
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Wrapper that emulates PEAR connection functionality which is needed for
|
|
||||||
* the {@link OpenIDStorage} class.
|
|
||||||
*
|
|
||||||
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
||||||
*
|
|
||||||
* @todo If the new database abstraction adds support for transactions and
|
|
||||||
* prepared statements (placeholders) use that code without emulating
|
|
||||||
* it here.
|
|
||||||
*/
|
|
||||||
class OpenIDDatabaseConnection extends Auth_OpenID_DatabaseConnection {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Run an SQL query with the specified parameters, if any.
|
|
||||||
*
|
|
||||||
* @param string $sql An SQL string with placeholders. A '?' is used for
|
|
||||||
* values to put into quotes, and a '!' for values that
|
|
||||||
* should not be quoted.
|
|
||||||
* @param array $params An array of parameters to insert into the SQL
|
|
||||||
* string using this connection's escaping mechanism.
|
|
||||||
* @return mixed $result The result of calling this connection's internal
|
|
||||||
* query function.
|
|
||||||
* The type of result depends on the underlying
|
|
||||||
* database engine. This method is usually used when
|
|
||||||
* the result of a query is not important, like a
|
|
||||||
* DDL query.
|
|
||||||
*/
|
|
||||||
public function query($sql, $params = array()) {
|
|
||||||
if(($sql = $this->generateQuery($sql, $params)) === false)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
return DB::query($sql);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Run an SQL query and return the first column of the first row
|
|
||||||
* of the result set, if any.
|
|
||||||
*
|
|
||||||
* @param string $sql An SQL string with placeholders. A '?' is used for
|
|
||||||
* values to put into quotes, and a '!' for values that
|
|
||||||
* should not be quoted.
|
|
||||||
* @param array $params An array of parameters to insert into the SQL
|
|
||||||
* string using this connection's escaping mechanism.
|
|
||||||
* @return mixed $result The value of the first column of the first row of
|
|
||||||
* the result set.
|
|
||||||
* FALSE if no such result was found.
|
|
||||||
*/
|
|
||||||
public function getOne($sql, $params = array()) {
|
|
||||||
if(($sql = $this->generateQuery($sql, $params)) === false)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
if(($result = DB::query($sql)) === false)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
return $result->value();
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Run an SQL query and return the first row of the result set, if
|
|
||||||
* any.
|
|
||||||
*
|
|
||||||
* @param string $sql An SQL string with placeholders. A '?' is used for
|
|
||||||
* values to put into quotes, and a '!' for values that
|
|
||||||
* should not be quoted.
|
|
||||||
* @param array $params An array of parameters to insert into the SQL
|
|
||||||
* string using this connection's escaping mechanism.
|
|
||||||
* @return array $result The first row of the result set, if any, keyed on
|
|
||||||
* column name.
|
|
||||||
* FALSE if no such result was found.
|
|
||||||
*/
|
|
||||||
public function getRow($sql, $params = array()) {
|
|
||||||
if(($sql = $this->generateQuery($sql, $params)) === false)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
if(($result = DB::query($sql)) === false)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
return $result->record();
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Run an SQL query with the specified parameters, if any.
|
|
||||||
*
|
|
||||||
* @param string $sql An SQL string with placeholders. A '?' is used for
|
|
||||||
* values to put into quotes, and a '!' for values that
|
|
||||||
* should not be quoted.
|
|
||||||
* @param array $params An array of parameters to insert into the SQL
|
|
||||||
* string using this connection's escaping mechanism.
|
|
||||||
* @return array $result An array of arrays representing the result of the
|
|
||||||
* query; each array is keyed on column name.
|
|
||||||
*/
|
|
||||||
public function getAll($sql, $params = array()) {
|
|
||||||
if(($sql = $this->generateQuery($sql, $params)) === false)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
if(($result = DB::query($sql)) === false)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
for($result_array = array(); $result->valid(); $result->next()) {
|
|
||||||
array_push($result_array, $result->current());
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result_array;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Sets auto-commit mode on this database connection.
|
|
||||||
*
|
|
||||||
* @param bool $mode TRUE if auto-commit is to be used; FALSE if not.
|
|
||||||
*/
|
|
||||||
public function autoCommit($mode) {
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Starts a transaction on this connection, if supported.
|
|
||||||
*/
|
|
||||||
public function begin() {
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Commits a transaction on this connection, if supported.
|
|
||||||
*/
|
|
||||||
public function commit() {
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Performs a rollback on this connection, if supported.
|
|
||||||
*/
|
|
||||||
public function rollback() {
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Formats input so it can be safely used in a query
|
|
||||||
*
|
|
||||||
* @param string $sql An SQL string with placeholders. A '?' is used for
|
|
||||||
* values to put into quotes, and a '!' for values that
|
|
||||||
* should not be quoted.
|
|
||||||
* @param array $params An array of parameters to insert into the SQL
|
|
||||||
* string using this connection's escaping mechanism.
|
|
||||||
* @return bool|string $result A valid SQL string with all parameters
|
|
||||||
* properly escaped or FALSE if an invalid SQL
|
|
||||||
* string or an invalid number of parameters
|
|
||||||
* was passed.
|
|
||||||
*/
|
|
||||||
private function generateQuery($sql, $params = array()) {
|
|
||||||
$tokens = preg_split('/((?<!\\\)[&?!])/', $sql, -1,
|
|
||||||
PREG_SPLIT_DELIM_CAPTURE);
|
|
||||||
$token = 0;
|
|
||||||
$types = array();
|
|
||||||
$newtokens = array();
|
|
||||||
|
|
||||||
foreach ($tokens as $val) {
|
|
||||||
switch ($val) {
|
|
||||||
case '?':
|
|
||||||
$types[$token++] = 'SCALAR';
|
|
||||||
break;
|
|
||||||
case '!':
|
|
||||||
$types[$token++] = 'MISC';
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
$newtokens[] = preg_replace('/\\\([&?!])/', "\\1", $val);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if(count($types) != count($params))
|
|
||||||
return false;
|
|
||||||
|
|
||||||
|
|
||||||
$realquery = $newtokens[0];
|
|
||||||
$i = 0;
|
|
||||||
|
|
||||||
foreach($params as $value) {
|
|
||||||
if($types[$i] == 'SCALAR') {
|
|
||||||
$realquery .= $this->quote($value);
|
|
||||||
} else {
|
|
||||||
$realquery .= $value;
|
|
||||||
}
|
|
||||||
|
|
||||||
$realquery .= $newtokens[++$i];
|
|
||||||
}
|
|
||||||
|
|
||||||
return $realquery;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Formats input so it can be safely used in a query
|
|
||||||
*
|
|
||||||
* @param mixed $in The data to be formatted
|
|
||||||
* @return mixed The formatted data. The format depends on the input's
|
|
||||||
* PHP type-
|
|
||||||
*/
|
|
||||||
private function quote($in) {
|
|
||||||
if(is_int($in)) {
|
|
||||||
return $in;
|
|
||||||
} elseif(is_float($in)) {
|
|
||||||
return "'" . Convert::raw2sql(
|
|
||||||
str_replace(',', '.', strval(floatval($in)))) . "'";
|
|
||||||
} elseif(is_bool($in)) {
|
|
||||||
return ($in) ? '1' : '0';
|
|
||||||
} elseif(is_null($in)) {
|
|
||||||
return 'NULL';
|
|
||||||
} else {
|
|
||||||
return "'" . Convert::raw2sql($in) . "'";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
?>
|
|
Loading…
x
Reference in New Issue
Block a user