diff options
Diffstat (limited to 'library/openid')
-rw-r--r-- | library/openid/README | 49 | ||||
-rw-r--r-- | library/openid/example-google.php | 24 | ||||
-rw-r--r-- | library/openid/example.php | 23 | ||||
-rw-r--r-- | library/openid/openid.php | 781 | ||||
-rw-r--r-- | library/openid/provider/example-mysql.php | 194 | ||||
-rw-r--r-- | library/openid/provider/example.php | 53 | ||||
-rw-r--r-- | library/openid/provider/provider.php | 845 |
7 files changed, 0 insertions, 1969 deletions
diff --git a/library/openid/README b/library/openid/README deleted file mode 100644 index 799b452ac..000000000 --- a/library/openid/README +++ /dev/null @@ -1,49 +0,0 @@ -This class provides a simple interface for OpenID (1.1 and 2.0) authentication. -Supports Yadis discovery. - -The authentication process is stateless/dumb. - -Usage: -Sign-on with OpenID is a two step process: -Step one is authentication with the provider: -<code> -$openid = new LightOpenID('my-host.example.org'); -$openid->identity = 'ID supplied by user'; -header('Location: ' . $openid->authUrl()); -</code> - -The provider then sends various parameters via GET, one of them is openid_mode. -Step two is verification: -<code> -if ($this->data['openid_mode']) { - $openid = new LightOpenID('my-host.example.org'); - echo $openid->validate() ? 'Logged in.' : 'Failed'; -} -</code> - * -Change the 'my-host.example.org' to your domain name. Do NOT use $_SERVER['HTTP_HOST'] -for that, unless you know what you are doing. - * -Optionally, you can set $returnUrl and $realm (or $trustRoot, which is an alias). -The default values for those are: -$openid->realm = (!empty($_SERVER['HTTPS']) ? 'https' : 'http') . '://' . $_SERVER['HTTP_HOST']; -$openid->returnUrl = $openid->realm . $_SERVER['REQUEST_URI']; -If you don't know their meaning, refer to any openid tutorial, or specification. Or just guess. - * -AX and SREG extensions are supported. -To use them, specify $openid->required and/or $openid->optional before calling $openid->authUrl(). -These are arrays, with values being AX schema paths (the 'path' part of the URL). -For example: - $openid->required = array('namePerson/friendly', 'contact/email'); - $openid->optional = array('namePerson/first'); -If the server supports only SREG or OpenID 1.1, these are automaticaly -mapped to SREG names, so that user doesn't have to know anything about the server. - * -To get the values, use $openid->getAttributes(). - * -The library requires PHP >= 5.1.2 with curl or http/https stream wrappers enabled. -@author Mewp -@contributors Brice http://github.com/brice/ -@copyright Copyright (c) 2010, Mewp -@copyright Copyright (c) 2010, Brice -@license http://www.opensource.org/licenses/mit-license.php MIT
\ No newline at end of file diff --git a/library/openid/example-google.php b/library/openid/example-google.php deleted file mode 100644 index f23f2cc48..000000000 --- a/library/openid/example-google.php +++ /dev/null @@ -1,24 +0,0 @@ -<?php -# Logging in with Google accounts requires setting special identity, so this example shows how to do it. -require 'openid.php'; -try { - # Change 'localhost' to your domain name. - $openid = new LightOpenID('localhost'); - if(!$openid->mode) { - if(isset($_GET['login'])) { - $openid->identity = 'https://www.google.com/accounts/o8/id'; - header('Location: ' . $openid->authUrl()); - } -?> -<form action="?login" method="post"> - <button>Login with Google</button> -</form> -<?php - } elseif($openid->mode == 'cancel') { - echo 'User has canceled authentication!'; - } else { - echo 'User ' . ($openid->validate() ? $openid->identity . ' has ' : 'has not ') . 'logged in.'; - } -} catch(ErrorException $e) { - echo $e->getMessage(); -} diff --git a/library/openid/example.php b/library/openid/example.php deleted file mode 100644 index e4ab107fe..000000000 --- a/library/openid/example.php +++ /dev/null @@ -1,23 +0,0 @@ -<?php -require 'openid.php'; -try { - # Change 'localhost' to your domain name. - $openid = new LightOpenID('localhost'); - if(!$openid->mode) { - if(isset($_POST['openid_identifier'])) { - $openid->identity = $_POST['openid_identifier']; - header('Location: ' . $openid->authUrl()); - } -?> -<form action="" method="post"> - OpenID: <input type="text" name="openid_identifier" /> <button>Submit</button> -</form> -<?php - } elseif($openid->mode == 'cancel') { - echo 'User has canceled authentication!'; - } else { - echo 'User ' . ($openid->validate() ? $openid->identity . ' has ' : 'has not ') . 'logged in.'; - } -} catch(ErrorException $e) { - echo $e->getMessage(); -} diff --git a/library/openid/openid.php b/library/openid/openid.php deleted file mode 100644 index 00250c59d..000000000 --- a/library/openid/openid.php +++ /dev/null @@ -1,781 +0,0 @@ -<?php -/** - * This class provides a simple interface for OpenID (1.1 and 2.0) authentication. - * Supports Yadis discovery. - * The authentication process is stateless/dumb. - * - * Usage: - * Sign-on with OpenID is a two step process: - * Step one is authentication with the provider: - * <code> - * $openid = new LightOpenID('my-host.example.org'); - * $openid->identity = 'ID supplied by user'; - * header('Location: ' . $openid->authUrl()); - * </code> - * The provider then sends various parameters via GET, one of them is openid_mode. - * Step two is verification: - * <code> - * if ($this->data['openid_mode']) { - * $openid = new LightOpenID('my-host.example.org'); - * echo $openid->validate() ? 'Logged in.' : 'Failed'; - * } - * </code> - * - * Change the 'my-host.example.org' to your domain name. Do NOT use $_SERVER['HTTP_HOST'] - * for that, unless you know what you are doing. - * - * Optionally, you can set $returnUrl and $realm (or $trustRoot, which is an alias). - * The default values for those are: - * $openid->realm = (!empty($_SERVER['HTTPS']) ? 'https' : 'http') . '://' . $_SERVER['HTTP_HOST']; - * $openid->returnUrl = $openid->realm . $_SERVER['REQUEST_URI']; - * If you don't know their meaning, refer to any openid tutorial, or specification. Or just guess. - * - * AX and SREG extensions are supported. - * To use them, specify $openid->required and/or $openid->optional before calling $openid->authUrl(). - * These are arrays, with values being AX schema paths (the 'path' part of the URL). - * For example: - * $openid->required = array('namePerson/friendly', 'contact/email'); - * $openid->optional = array('namePerson/first'); - * If the server supports only SREG or OpenID 1.1, these are automaticaly - * mapped to SREG names, so that user doesn't have to know anything about the server. - * - * To get the values, use $openid->getAttributes(). - * - * - * The library requires PHP >= 5.1.2 with curl or http/https stream wrappers enabled. - * @author Mewp - * @copyright Copyright (c) 2010, Mewp - * @license http://www.opensource.org/licenses/mit-license.php MIT - */ -class LightOpenID -{ - public $returnUrl - , $required = array() - , $optional = array() - , $verify_peer = null - , $capath = null - , $cainfo = null - , $data; - private $identity, $claimed_id; - protected $server, $version, $trustRoot, $aliases, $identifier_select = false - , $ax = false, $sreg = false, $setup_url = null; - static protected $ax_to_sreg = array( - 'namePerson/friendly' => 'nickname', - 'contact/email' => 'email', - 'namePerson' => 'fullname', - 'birthDate' => 'dob', - 'person/gender' => 'gender', - 'contact/postalCode/home' => 'postcode', - 'contact/country/home' => 'country', - 'pref/language' => 'language', - 'pref/timezone' => 'timezone', - ); - - function __construct($host) - { - $this->trustRoot = (strpos($host, '://') ? $host : 'http://' . $host); - if ((!empty($_SERVER['HTTPS']) && $_SERVER['HTTPS'] != 'off') - || (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) - && $_SERVER['HTTP_X_FORWARDED_PROTO'] == 'https') - ) { - $this->trustRoot = (strpos($host, '://') ? $host : 'https://' . $host); - } - - if(($host_end = strpos($this->trustRoot, '/', 8)) !== false) { - $this->trustRoot = substr($this->trustRoot, 0, $host_end); - } - - $uri = rtrim(preg_replace('#((?<=\?)|&)openid\.[^&]+#', '', $_SERVER['REQUEST_URI']), '?'); - $this->returnUrl = $this->trustRoot . $uri; - - $this->data = ($_SERVER['REQUEST_METHOD'] === 'POST') ? $_POST : $_GET; - - if(!function_exists('curl_init') && !in_array('https', stream_get_wrappers())) { - throw new ErrorException('You must have either https wrappers or curl enabled.'); - } - } - - function __set($name, $value) - { - switch ($name) { - case 'identity': - if (strlen($value = trim((String) $value))) { - if (preg_match('#^xri:/*#i', $value, $m)) { - $value = substr($value, strlen($m[0])); - } elseif (!preg_match('/^(?:[=@+\$!\(]|https?:)/i', $value)) { - $value = "http://$value"; - } - if (preg_match('#^https?://[^/]+$#i', $value, $m)) { - $value .= '/'; - } - } - $this->$name = $this->claimed_id = $value; - break; - case 'trustRoot': - case 'realm': - $this->trustRoot = trim($value); - } - } - - function __get($name) - { - switch ($name) { - case 'identity': - # We return claimed_id instead of identity, - # because the developer should see the claimed identifier, - # i.e. what he set as identity, not the op-local identifier (which is what we verify) - return $this->claimed_id; - case 'trustRoot': - case 'realm': - return $this->trustRoot; - case 'mode': - return empty($this->data['openid_mode']) ? null : $this->data['openid_mode']; - } - } - - /** - * Checks if the server specified in the url exists. - * - * @param $url url to check - * @return true, if the server exists; false otherwise - */ - function hostExists($url) - { - if (strpos($url, '/') === false) { - $server = $url; - } else { - $server = @parse_url($url, PHP_URL_HOST); - } - - if (!$server) { - return false; - } - - return !!gethostbynamel($server); - } - - protected function request_curl($url, $method='GET', $params=array()) - { - $params = http_build_query($params, '', '&'); - $curl = curl_init($url . ($method == 'GET' && $params ? '?' . $params : '')); - curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true); - curl_setopt($curl, CURLOPT_HEADER, false); - curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false); - curl_setopt($curl, CURLOPT_RETURNTRANSFER, true); - curl_setopt($curl, CURLOPT_HTTPHEADER, array('Accept: application/xrds+xml, */*')); - - if($this->verify_peer !== null) { - curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, $this->verify_peer); - if($this->capath) { - curl_setopt($curl, CURLOPT_CAPATH, $this->capath); - } - - if($this->cainfo) { - curl_setopt($curl, CURLOPT_CAINFO, $this->cainfo); - } - } - - if ($method == 'POST') { - curl_setopt($curl, CURLOPT_POST, true); - curl_setopt($curl, CURLOPT_POSTFIELDS, $params); - } elseif ($method == 'HEAD') { - curl_setopt($curl, CURLOPT_HEADER, true); - curl_setopt($curl, CURLOPT_NOBODY, true); - } else { - curl_setopt($curl, CURLOPT_HTTPGET, true); - } - $response = curl_exec($curl); - - if($method == 'HEAD') { - $headers = array(); - foreach(explode("\n", $response) as $header) { - $pos = strpos($header,':'); - $name = strtolower(trim(substr($header, 0, $pos))); - $headers[$name] = trim(substr($header, $pos+1)); - } - - # Updating claimed_id in case of redirections. - $effective_url = curl_getinfo($curl, CURLINFO_EFFECTIVE_URL); - if($effective_url != $url) { - $this->identity = $this->claimed_id = $effective_url; - } - - return $headers; - } - - if (curl_errno($curl)) { - throw new ErrorException(curl_error($curl), curl_errno($curl)); - } - - return $response; - } - - protected function request_streams($url, $method='GET', $params=array()) - { - if(!$this->hostExists($url)) { - throw new ErrorException("Could not connect to $url.", 404); - } - - $params = http_build_query($params, '', '&'); - switch($method) { - case 'GET': - $opts = array( - 'http' => array( - 'method' => 'GET', - 'header' => 'Accept: application/xrds+xml, */*', - 'ignore_errors' => true, - ), 'ssl' => array( - 'CN_match' => parse_url($url, PHP_URL_HOST), - ), - ); - $url = $url . ($params ? '?' . $params : ''); - break; - case 'POST': - $opts = array( - 'http' => array( - 'method' => 'POST', - 'header' => 'Content-type: application/x-www-form-urlencoded', - 'content' => $params, - 'ignore_errors' => true, - ), 'ssl' => array( - 'CN_match' => parse_url($url, PHP_URL_HOST), - ), - ); - break; - case 'HEAD': - # We want to send a HEAD request, - # but since get_headers doesn't accept $context parameter, - # we have to change the defaults. - $default = stream_context_get_options(stream_context_get_default()); - stream_context_get_default( - array( - 'http' => array( - 'method' => 'HEAD', - 'header' => 'Accept: application/xrds+xml, */*', - 'ignore_errors' => true, - ), 'ssl' => array( - 'CN_match' => parse_url($url, PHP_URL_HOST), - ), - ) - ); - - $url = $url . ($params ? '?' . $params : ''); - $headers_tmp = get_headers ($url); - if(!$headers_tmp) { - return array(); - } - - # Parsing headers. - $headers = array(); - foreach($headers_tmp as $header) { - $pos = strpos($header,':'); - $name = strtolower(trim(substr($header, 0, $pos))); - $headers[$name] = trim(substr($header, $pos+1)); - - # Following possible redirections. The point is just to have - # claimed_id change with them, because get_headers() will - # follow redirections automatically. - # We ignore redirections with relative paths. - # If any known provider uses them, file a bug report. - if($name == 'location') { - if(strpos($headers[$name], 'http') === 0) { - $this->identity = $this->claimed_id = $headers[$name]; - } elseif($headers[$name][0] == '/') { - $parsed_url = parse_url($this->claimed_id); - $this->identity = - $this->claimed_id = $parsed_url['scheme'] . '://' - . $parsed_url['host'] - . $headers[$name]; - } - } - } - - # And restore them. - stream_context_get_default($default); - return $headers; - } - - if($this->verify_peer) { - $opts['ssl'] += array( - 'verify_peer' => true, - 'capath' => $this->capath, - 'cafile' => $this->cainfo, - ); - } - - $context = stream_context_create ($opts); - - return file_get_contents($url, false, $context); - } - - protected function request($url, $method='GET', $params=array()) - { - if (function_exists('curl_init') - && (!in_array('https', stream_get_wrappers()) || !ini_get('safe_mode') && !ini_get('open_basedir')) - ) { - return $this->request_curl($url, $method, $params); - } - return $this->request_streams($url, $method, $params); - } - - protected function build_url($url, $parts) - { - if (isset($url['query'], $parts['query'])) { - $parts['query'] = $url['query'] . '&' . $parts['query']; - } - - $url = $parts + $url; - $url = $url['scheme'] . '://' - . (empty($url['username'])?'' - :(empty($url['password'])? "{$url['username']}@" - :"{$url['username']}:{$url['password']}@")) - . $url['host'] - . (empty($url['port'])?'':":{$url['port']}") - . (empty($url['path'])?'':$url['path']) - . (empty($url['query'])?'':"?{$url['query']}") - . (empty($url['fragment'])?'':"#{$url['fragment']}"); - return $url; - } - - /** - * Helper function used to scan for <meta>/<link> tags and extract information - * from them - */ - protected function htmlTag($content, $tag, $attrName, $attrValue, $valueName) - { - preg_match_all("#<{$tag}[^>]*$attrName=['\"].*?$attrValue.*?['\"][^>]*$valueName=['\"](.+?)['\"][^>]*/?>#i", $content, $matches1); - preg_match_all("#<{$tag}[^>]*$valueName=['\"](.+?)['\"][^>]*$attrName=['\"].*?$attrValue.*?['\"][^>]*/?>#i", $content, $matches2); - - $result = array_merge($matches1[1], $matches2[1]); - return empty($result)?false:$result[0]; - } - - /** - * Performs Yadis and HTML discovery. Normally not used. - * @param $url Identity URL. - * @return String OP Endpoint (i.e. OpenID provider address). - * @throws ErrorException - */ - function discover($url) - { - if (!$url) throw new ErrorException('No identity supplied.'); - # Use xri.net proxy to resolve i-name identities - if (!preg_match('#^https?:#', $url)) { - $url = "https://xri.net/$url"; - } - - # We save the original url in case of Yadis discovery failure. - # It can happen when we'll be lead to an XRDS document - # which does not have any OpenID2 services. - $originalUrl = $url; - - # A flag to disable yadis discovery in case of failure in headers. - $yadis = true; - - # We'll jump a maximum of 5 times, to avoid endless redirections. - for ($i = 0; $i < 5; $i ++) { - if ($yadis) { - $headers = $this->request($url, 'HEAD'); - - $next = false; - if (isset($headers['x-xrds-location'])) { - $url = $this->build_url(parse_url($url), parse_url(trim($headers['x-xrds-location']))); - $next = true; - } - - if (isset($headers['content-type']) - && (strpos($headers['content-type'], 'application/xrds+xml') !== false - || strpos($headers['content-type'], 'text/xml') !== false) - ) { - # Apparently, some providers return XRDS documents as text/html. - # While it is against the spec, allowing this here shouldn't break - # compatibility with anything. - # --- - # Found an XRDS document, now let's find the server, and optionally delegate. - $content = $this->request($url, 'GET'); - - preg_match_all('#<Service.*?>(.*?)</Service>#s', $content, $m); - foreach($m[1] as $content) { - $content = ' ' . $content; # The space is added, so that strpos doesn't return 0. - - # OpenID 2 - $ns = preg_quote('http://specs.openid.net/auth/2.0/'); - if(preg_match('#<Type>\s*'.$ns.'(server|signon)\s*</Type>#s', $content, $type)) { - if ($type[1] == 'server') $this->identifier_select = true; - - preg_match('#<URI.*?>(.*)</URI>#', $content, $server); - preg_match('#<(Local|Canonical)ID>(.*)</\1ID>#', $content, $delegate); - if (empty($server)) { - return false; - } - # Does the server advertise support for either AX or SREG? - $this->ax = (bool) strpos($content, '<Type>http://openid.net/srv/ax/1.0</Type>'); - $this->sreg = strpos($content, '<Type>http://openid.net/sreg/1.0</Type>') - || strpos($content, '<Type>http://openid.net/extensions/sreg/1.1</Type>'); - - $server = $server[1]; - if (isset($delegate[2])) $this->identity = trim($delegate[2]); - $this->version = 2; - - $this->server = $server; - return $server; - } - - # OpenID 1.1 - $ns = preg_quote('http://openid.net/signon/1.1'); - if (preg_match('#<Type>\s*'.$ns.'\s*</Type>#s', $content)) { - - preg_match('#<URI.*?>(.*)</URI>#', $content, $server); - preg_match('#<.*?Delegate>(.*)</.*?Delegate>#', $content, $delegate); - if (empty($server)) { - return false; - } - # AX can be used only with OpenID 2.0, so checking only SREG - $this->sreg = strpos($content, '<Type>http://openid.net/sreg/1.0</Type>') - || strpos($content, '<Type>http://openid.net/extensions/sreg/1.1</Type>'); - - $server = $server[1]; - if (isset($delegate[1])) $this->identity = $delegate[1]; - $this->version = 1; - - $this->server = $server; - return $server; - } - } - - $next = true; - $yadis = false; - $url = $originalUrl; - $content = null; - break; - } - if ($next) continue; - - # There are no relevant information in headers, so we search the body. - $content = $this->request($url, 'GET'); - $location = $this->htmlTag($content, 'meta', 'http-equiv', 'X-XRDS-Location', 'content'); - if ($location) { - $url = $this->build_url(parse_url($url), parse_url($location)); - continue; - } - } - - if (!$content) $content = $this->request($url, 'GET'); - - # At this point, the YADIS Discovery has failed, so we'll switch - # to openid2 HTML discovery, then fallback to openid 1.1 discovery. - $server = $this->htmlTag($content, 'link', 'rel', 'openid2.provider', 'href'); - $delegate = $this->htmlTag($content, 'link', 'rel', 'openid2.local_id', 'href'); - $this->version = 2; - - if (!$server) { - # The same with openid 1.1 - $server = $this->htmlTag($content, 'link', 'rel', 'openid.server', 'href'); - $delegate = $this->htmlTag($content, 'link', 'rel', 'openid.delegate', 'href'); - $this->version = 1; - } - - if ($server) { - # We found an OpenID2 OP Endpoint - if ($delegate) { - # We have also found an OP-Local ID. - $this->identity = $delegate; - } - $this->server = $server; - return $server; - } - - throw new ErrorException("No OpenID Server found at $url", 404); - } - throw new ErrorException('Endless redirection!', 500); - } - - protected function sregParams() - { - $params = array(); - # We always use SREG 1.1, even if the server is advertising only support for 1.0. - # That's because it's fully backwards compatibile with 1.0, and some providers - # advertise 1.0 even if they accept only 1.1. One such provider is myopenid.com - $params['openid.ns.sreg'] = 'http://openid.net/extensions/sreg/1.1'; - if ($this->required) { - $params['openid.sreg.required'] = array(); - foreach ($this->required as $required) { - if (!isset(self::$ax_to_sreg[$required])) continue; - $params['openid.sreg.required'][] = self::$ax_to_sreg[$required]; - } - $params['openid.sreg.required'] = implode(',', $params['openid.sreg.required']); - } - - if ($this->optional) { - $params['openid.sreg.optional'] = array(); - foreach ($this->optional as $optional) { - if (!isset(self::$ax_to_sreg[$optional])) continue; - $params['openid.sreg.optional'][] = self::$ax_to_sreg[$optional]; - } - $params['openid.sreg.optional'] = implode(',', $params['openid.sreg.optional']); - } - return $params; - } - - protected function axParams() - { - $params = array(); - if ($this->required || $this->optional) { - $params['openid.ns.ax'] = 'http://openid.net/srv/ax/1.0'; - $params['openid.ax.mode'] = 'fetch_request'; - $this->aliases = array(); - $counts = array(); - $required = array(); - $optional = array(); - foreach (array('required','optional') as $type) { - foreach ($this->$type as $alias => $field) { - if (is_int($alias)) $alias = strtr($field, '/', '_'); - $this->aliases[$alias] = 'http://axschema.org/' . $field; - if (empty($counts[$alias])) $counts[$alias] = 0; - $counts[$alias] += 1; - ${$type}[] = $alias; - } - } - foreach ($this->aliases as $alias => $ns) { - $params['openid.ax.type.' . $alias] = $ns; - } - foreach ($counts as $alias => $count) { - if ($count == 1) continue; - $params['openid.ax.count.' . $alias] = $count; - } - - # Don't send empty ax.requied and ax.if_available. - # Google and possibly other providers refuse to support ax when one of these is empty. - if($required) { - $params['openid.ax.required'] = implode(',', $required); - } - if($optional) { - $params['openid.ax.if_available'] = implode(',', $optional); - } - } - return $params; - } - - protected function authUrl_v1($immediate) - { - $returnUrl = $this->returnUrl; - # If we have an openid.delegate that is different from our claimed id, - # we need to somehow preserve the claimed id between requests. - # The simplest way is to just send it along with the return_to url. - if($this->identity != $this->claimed_id) { - $returnUrl .= (strpos($returnUrl, '?') ? '&' : '?') . 'openid.claimed_id=' . $this->claimed_id; - } - - $params = array( - 'openid.return_to' => $returnUrl, - 'openid.mode' => $immediate ? 'checkid_immediate' : 'checkid_setup', - 'openid.identity' => $this->identity, - 'openid.trust_root' => $this->trustRoot, - ) + $this->sregParams(); - - return $this->build_url(parse_url($this->server) - , array('query' => http_build_query($params, '', '&'))); - } - - protected function authUrl_v2($immediate) - { - $params = array( - 'openid.ns' => 'http://specs.openid.net/auth/2.0', - 'openid.mode' => $immediate ? 'checkid_immediate' : 'checkid_setup', - 'openid.return_to' => $this->returnUrl, - 'openid.realm' => $this->trustRoot, - ); - if ($this->ax) { - $params += $this->axParams(); - } - if ($this->sreg) { - $params += $this->sregParams(); - } - if (!$this->ax && !$this->sreg) { - # If OP doesn't advertise either SREG, nor AX, let's send them both - # in worst case we don't get anything in return. - $params += $this->axParams() + $this->sregParams(); - } - - if ($this->identifier_select) { - $params['openid.identity'] = $params['openid.claimed_id'] - = 'http://specs.openid.net/auth/2.0/identifier_select'; - } else { - $params['openid.identity'] = $this->identity; - $params['openid.claimed_id'] = $this->claimed_id; - } - - return $this->build_url(parse_url($this->server) - , array('query' => http_build_query($params, '', '&'))); - } - - /** - * Returns authentication url. Usually, you want to redirect your user to it. - * @return String The authentication url. - * @param String $select_identifier Whether to request OP to select identity for an user in OpenID 2. Does not affect OpenID 1. - * @throws ErrorException - */ - function authUrl($immediate = false) - { - if ($this->setup_url && !$immediate) return $this->setup_url; - if (!$this->server) $this->discover($this->identity); - - if ($this->version == 2) { - return $this->authUrl_v2($immediate); - } - return $this->authUrl_v1($immediate); - } - - /** - * Performs OpenID verification with the OP. - * @return Bool Whether the verification was successful. - * @throws ErrorException - */ - function validate() - { - # If the request was using immediate mode, a failure may be reported - # by presenting user_setup_url (for 1.1) or reporting - # mode 'setup_needed' (for 2.0). Also catching all modes other than - # id_res, in order to avoid throwing errors. - if(isset($this->data['openid_user_setup_url'])) { - $this->setup_url = $this->data['openid_user_setup_url']; - return false; - } - if($this->mode != 'id_res') { - return false; - } - - $this->claimed_id = isset($this->data['openid_claimed_id'])?$this->data['openid_claimed_id']:$this->data['openid_identity']; - $params = array( - 'openid.assoc_handle' => $this->data['openid_assoc_handle'], - 'openid.signed' => $this->data['openid_signed'], - 'openid.sig' => $this->data['openid_sig'], - ); - - if (isset($this->data['openid_ns'])) { - # We're dealing with an OpenID 2.0 server, so let's set an ns - # Even though we should know location of the endpoint, - # we still need to verify it by discovery, so $server is not set here - $params['openid.ns'] = 'http://specs.openid.net/auth/2.0'; - } elseif (isset($this->data['openid_claimed_id']) - && $this->data['openid_claimed_id'] != $this->data['openid_identity'] - ) { - # If it's an OpenID 1 provider, and we've got claimed_id, - # we have to append it to the returnUrl, like authUrl_v1 does. - $this->returnUrl .= (strpos($this->returnUrl, '?') ? '&' : '?') - . 'openid.claimed_id=' . $this->claimed_id; - } - - if ($this->data['openid_return_to'] != $this->returnUrl) { - # The return_to url must match the url of current request. - # I'm assuing that noone will set the returnUrl to something that doesn't make sense. - return false; - } - - $server = $this->discover($this->claimed_id); - - foreach (explode(',', $this->data['openid_signed']) as $item) { - # Checking whether magic_quotes_gpc is turned on, because - # the function may fail if it is. For example, when fetching - # AX namePerson, it might containg an apostrophe, which will be escaped. - # In such case, validation would fail, since we'd send different data than OP - # wants to verify. stripslashes() should solve that problem, but we can't - # use it when magic_quotes is off. - $value = $this->data['openid_' . str_replace('.','_',$item)]; - $params['openid.' . $item] = get_magic_quotes_gpc() ? stripslashes($value) : $value; - - } - - $params['openid.mode'] = 'check_authentication'; - - $response = $this->request($server, 'POST', $params); - - return preg_match('/is_valid\s*:\s*true/i', $response); - } - - protected function getAxAttributes() - { - $alias = null; - if (isset($this->data['openid_ns_ax']) - && $this->data['openid_ns_ax'] != 'http://openid.net/srv/ax/1.0' - ) { # It's the most likely case, so we'll check it before - $alias = 'ax'; - } else { - # 'ax' prefix is either undefined, or points to another extension, - # so we search for another prefix - foreach ($this->data as $key => $val) { - if (substr($key, 0, strlen('openid_ns_')) == 'openid_ns_' - && $val == 'http://openid.net/srv/ax/1.0' - ) { - $alias = substr($key, strlen('openid_ns_')); - break; - } - } - } - if (!$alias) { - # An alias for AX schema has not been found, - # so there is no AX data in the OP's response - return array(); - } - - $attributes = array(); - foreach (explode(',', $this->data['openid_signed']) as $key) { - $keyMatch = $alias . '.value.'; - if (substr($key, 0, strlen($keyMatch)) != $keyMatch) { - continue; - } - $key = substr($key, strlen($keyMatch)); - if (!isset($this->data['openid_' . $alias . '_type_' . $key])) { - # OP is breaking the spec by returning a field without - # associated ns. This shouldn't happen, but it's better - # to check, than cause an E_NOTICE. - continue; - } - $value = $this->data['openid_' . $alias . '_value_' . $key]; - $key = substr($this->data['openid_' . $alias . '_type_' . $key], - strlen('http://axschema.org/')); - - $attributes[$key] = $value; - } - return $attributes; - } - - protected function getSregAttributes() - { - $attributes = array(); - $sreg_to_ax = array_flip(self::$ax_to_sreg); - foreach (explode(',', $this->data['openid_signed']) as $key) { - $keyMatch = 'sreg.'; - if (substr($key, 0, strlen($keyMatch)) != $keyMatch) { - continue; - } - $key = substr($key, strlen($keyMatch)); - if (!isset($sreg_to_ax[$key])) { - # The field name isn't part of the SREG spec, so we ignore it. - continue; - } - $attributes[$sreg_to_ax[$key]] = $this->data['openid_sreg_' . $key]; - } - return $attributes; - } - - /** - * Gets AX/SREG attributes provided by OP. should be used only after successful validaton. - * Note that it does not guarantee that any of the required/optional parameters will be present, - * or that there will be no other attributes besides those specified. - * In other words. OP may provide whatever information it wants to. - * * SREG names will be mapped to AX names. - * * @return Array Array of attributes with keys being the AX schema names, e.g. 'contact/email' - * @see http://www.axschema.org/types/ - */ - function getAttributes() - { - if (isset($this->data['openid_ns']) - && $this->data['openid_ns'] == 'http://specs.openid.net/auth/2.0' - ) { # OpenID 2.0 - # We search for both AX and SREG attributes, with AX taking precedence. - return $this->getAxAttributes() + $this->getSregAttributes(); - } - return $this->getSregAttributes(); - } -} diff --git a/library/openid/provider/example-mysql.php b/library/openid/provider/example-mysql.php deleted file mode 100644 index 574e3c811..000000000 --- a/library/openid/provider/example-mysql.php +++ /dev/null @@ -1,194 +0,0 @@ -<?php -/** - * This example shows several things: - * - How a setup interface should look like. - * - How to use a mysql table for authentication - * - How to store associations in mysql table, instead of php sessions. - * - How to store realm authorizations. - * - How to send AX/SREG parameters. - * For the example to work, you need to create the necessary tables: -CREATE TABLE Users ( - id INT NOT NULL auto_increment PRIMARY KEY, - login VARCHAR(32) NOT NULL, - password CHAR(40) NOT NULL, - firstName VARCHAR(32) NOT NULL, - lastName VARCHAR(32) NOT NULL -); - -CREATE TABLE AllowedSites ( - user INT NOT NULL, - realm TEXT NOT NULL, - attributes TEXT NOT NULL, - INDEX(user) -); - -CREATE TABLE Associations ( - id INT NOT NULL PRIMARY KEY, - data TEXT NOT NULL -); - * - * This is only an example. Don't use it in your code as-is. - * It has several security flaws, which you shouldn't copy (like storing plaintext login and password in forms). - * - * This setup could be very easily flooded with many associations, - * since non-private ones aren't automatically deleted. - * You could prevent this by storing a date of association and removing old ones, - * or by setting $this->dh = false; - * However, the latter one would disable stateful mode, unless connecting via HTTPS. - */ -require 'provider.php'; - -mysql_connect(); -mysql_select_db('test'); - -function getUserData($handle=null) -{ - if(isset($_POST['login'],$_POST['password'])) { - $login = mysql_real_escape_string($_POST['login']); - $password = sha1($_POST['password']); - $q = mysql_query("SELECT * FROM Users WHERE login = '$login' AND password = '$password'"); - if($data = mysql_fetch_assoc($q)) { - return $data; - } - if($handle) { - echo 'Wrong login/password.'; - } - } - if($handle) { - ?> - <form action="" method="post"> - <input type="hidden" name="openid.assoc_handle" value="<?php echo $handle?>"> - Login: <input type="text" name="login"><br> - Password: <input type="password" name="password"><br> - <button>Submit</button> - </form> - <?php - die(); - } -} - -class MysqlProvider extends LightOpenIDProvider -{ - private $attrMap = array( - 'namePerson/first' => 'First name', - 'namePerson/last' => 'Last name', - 'namePerson/friendly' => 'Nickname (login)' - ); - - private $attrFieldMap = array( - 'namePerson/first' => 'firstName', - 'namePerson/last' => 'lastName', - 'namePerson/friendly' => 'login' - ); - - function setup($identity, $realm, $assoc_handle, $attributes) - { - $data = getUserData($assoc_handle); - echo '<form action="" method="post">' - . '<input type="hidden" name="openid.assoc_handle" value="' . $assoc_handle . '">' - . '<input type="hidden" name="login" value="' . $_POST['login'] .'">' - . '<input type="hidden" name="password" value="' . $_POST['password'] .'">' - . "<b>$realm</b> wishes to authenticate you."; - if($attributes['required'] || $attributes['optional']) { - echo " It also requests following information (required fields marked with *):" - . '<ul>'; - - foreach($attributes['required'] as $attr) { - if(isset($this->attrMap[$attr])) { - echo '<li>' - . '<input type="checkbox" name="attributes[' . $attr . ']"> ' - . $this->attrMap[$attr] . '(*)</li>'; - } - } - - foreach($attributes['optional'] as $attr) { - if(isset($this->attrMap[$attr])) { - echo '<li>' - . '<input type="checkbox" name="attributes[' . $attr . ']"> ' - . $this->attrMap[$attr] . '</li>'; - } - } - echo '</ul>'; - } - echo '<br>' - . '<button name="once">Allow once</button> ' - . '<button name="always">Always allow</button> ' - . '<button name="cancel">cancel</button> ' - . '</form>'; - } - - function checkid($realm, &$attributes) - { - if(isset($_POST['cancel'])) { - $this->cancel(); - } - - $data = getUserData(); - if(!$data) { - return false; - } - $realm = mysql_real_escape_string($realm); - $q = mysql_query("SELECT attributes FROM AllowedSites WHERE user = '{$data['id']}' AND realm = '$realm'"); - - $attrs = array(); - if($attrs = mysql_fetch_row($q)) { - $attrs = explode(',', $attributes[0]); - } elseif(isset($_POST['attributes'])) { - $attrs = array_keys($_POST['attributes']); - } elseif(!isset($_POST['once']) && !isset($_POST['always'])) { - return false; - } - - $attributes = array(); - foreach($attrs as $attr) { - if(isset($this->attrFieldMap[$attr])) { - $attributes[$attr] = $data[$this->attrFieldMap[$attr]]; - } - } - - if(isset($_POST['always'])) { - $attrs = mysql_real_escape_string(implode(',', array_keys($attributes))); - mysql_query("REPLACE INTO AllowedSites VALUES('{$data['id']}', '$realm', '$attrs')"); - } - - return $this->serverLocation . '?' . $data['login']; - } - - function assoc_handle() - { - # We generate an integer assoc handle, because it's just faster to look up an integer later. - $q = mysql_query("SELECT MAX(id) FROM Associations"); - $result = mysql_fetch_row($q); - return $q[0]+1; - } - - function setAssoc($handle, $data) - { - $data = mysql_real_escape_string(serialize($data)); - mysql_query("REPLACE INTO Associations VALUES('$handle', '$data')"); - } - - function getAssoc($handle) - { - if(!is_numeric($handle)) { - return false; - } - $q = mysql_query("SELECT data FROM Associations WHERE id = '$handle'"); - $data = mysql_fetch_row($q); - if(!$data) { - return false; - } - return unserialize($data[0]); - } - - function delAssoc($handle) - { - if(!is_numeric($handle)) { - return false; - } - mysql_query("DELETE FROM Associations WHERE id = '$handle'"); - } - -} -$op = new MysqlProvider; -$op->server(); diff --git a/library/openid/provider/example.php b/library/openid/provider/example.php deleted file mode 100644 index b8a4c24a9..000000000 --- a/library/openid/provider/example.php +++ /dev/null @@ -1,53 +0,0 @@ -<?php -/** - * This example shows how to create a basic provider usin HTTP Authentication. - * This is only an example. You shouldn't use it as-is in your code. - */ -require 'provider.php'; - -class BasicProvider extends LightOpenIDProvider -{ - public $select_id = true; - public $login = ''; - public $password = ''; - - function __construct() - { - parent::__construct(); - - # If we use select_id, we must disable it for identity pages, - # so that an RP can discover it and get proper data (i.e. without select_id) - if(isset($_GET['id'])) { - $this->select_id = false; - } - } - - function setup($identity, $realm, $assoc_handle, $attributes) - { - header('WWW-Authenticate: Basic realm="' . $this->data['openid_realm'] . '"'); - header('HTTP/1.0 401 Unauthorized'); - } - - function checkid($realm, &$attributes) - { - if(!isset($_SERVER['PHP_AUTH_USER'])) { - return false; - } - - if ($_SERVER['PHP_AUTH_USER'] == $this->login - && $_SERVER['PHP_AUTH_PW'] == $this->password - ) { - # Returning identity - # It can be any url that leads here, or to any other place that hosts - # an XRDS document pointing here. - return $this->serverLocation . '?id=' . $this->login; - } - - return false; - } - -} -$op = new BasicProvider; -$op->login = 'test'; -$op->password = 'test'; -$op->server(); diff --git a/library/openid/provider/provider.php b/library/openid/provider/provider.php deleted file mode 100644 index a1a98d70b..000000000 --- a/library/openid/provider/provider.php +++ /dev/null @@ -1,845 +0,0 @@ -<?php -/** - * Using this class, you can easily set up an OpenID Provider. - * It's independent of LightOpenID class. - * It requires either GMP or BCMath for session encryption, - * but will work without them (although either via SSL, or in stateless mode only). - * Also, it requires PHP >= 5.1.2 - * - * This is an alpha version, using it in production code is not recommended, - * until you are *sure* that it works and is secure. - * - * Please send me messages about your testing results - * (even if successful, so I know that it has been tested). - * Also, if you think there's a way to make it easier to use, tell me -- it's an alpha for a reason. - * Same thing applies to bugs in code, suggestions, - * and everything else you'd like to say about the library. - * - * There's no usage documentation here, see the examples. - * - * @author Mewp - * @copyright Copyright (c) 2010, Mewp - * @license http://www.opensource.org/licenses/mit-license.php MIT - */ -//ini_set('error_log','log'); -abstract class LightOpenIDProvider -{ - # URL-s to XRDS and server location. - public $xrdsLocation, $serverLocation; - - # Should we operate in server, or signon mode? - public $select_id = false; - - # Lifetime of an association. - protected $assoc_lifetime = 600; - - # Variables below are either set automatically, or are constant. - # ----- - # Can we support DH? - protected $dh = true; - protected $ns = 'http://specs.openid.net/auth/2.0'; - protected $data, $assoc; - - # Default DH parameters as defined in the specification. - protected $default_modulus; - protected $default_gen = 'Ag=='; - - # AX <-> SREG transform - protected $ax_to_sreg = array( - 'namePerson/friendly' => 'nickname', - 'contact/email' => 'email', - 'namePerson' => 'fullname', - 'birthDate' => 'dob', - 'person/gender' => 'gender', - 'contact/postalCode/home' => 'postcode', - 'contact/country/home' => 'country', - 'pref/language' => 'language', - 'pref/timezone' => 'timezone', - ); - - # Math - private $add, $mul, $pow, $mod, $div, $powmod; - # ----- - - # ------------------------------------------------------------------------ # - # Functions you probably want to implement when extending the class. - - /** - * Checks whether an user is authenticated. - * The function should determine what fields it wants to send to the RP, - * and put them in the $attributes array. - * @param Array $attributes - * @param String $realm Realm used for authentication. - * @return String OP-local identifier of an authenticated user, or an empty value. - */ - abstract function checkid($realm, &$attributes); - - /** - * Displays an user interface for inputting user's login and password. - * Attributes are always AX field namespaces, with stripped host part. - * For example, the $attributes array may be: - * array( 'required' => array('namePerson/friendly', 'contact/email'), - * 'optional' => array('pref/timezone', 'pref/language') - * @param String $identity Discovered identity string. May be used to extract login, unless using $this->select_id - * @param String $realm Realm used for authentication. - * @param String Association handle. must be sent as openid.assoc_handle in $_GET or $_POST in subsequent requests. - * @param Array User attributes requested by the RP. - */ - abstract function setup($identity, $realm, $assoc_handle, $attributes); - - /** - * Stores an association. - * If you want to use php sessions in your provider code, you have to replace it. - * @param String $handle Association handle -- should be used as a key. - * @param Array $assoc Association data. - */ - protected function setAssoc($handle, $assoc) - { - $oldSession = session_id(); - session_commit(); - session_id($assoc['handle']); - session_start(); - $_SESSION['assoc'] = $assoc; - session_commit(); - if($oldSession) { - session_id($oldSession); - session_start(); - } - } - - /** - * Retreives association data. - * If you want to use php sessions in your provider code, you have to replace it. - * @param String $handle Association handle. - * @return Array Association data. - */ - protected function getAssoc($handle) - { - $oldSession = session_id(); - session_commit(); - session_id($handle); - session_start(); - if(empty($_SESSION['assoc'])) { - return null; - } - return $_SESSION['assoc']; - session_commit(); - if($oldSession) { - session_id($oldSession); - session_start(); - } - } - - /** - * Deletes an association. - * If you want to use php sessions in your provider code, you have to replace it. - * @param String $handle Association handle. - */ - protected function delAssoc($handle) - { - $oldSession = session_id(); - session_commit(); - session_id($handle); - session_start(); - session_destroy(); - if($oldSession) { - session_id($oldSession); - session_start(); - } - } - - # ------------------------------------------------------------------------ # - # Functions that you might want to implement. - - /** - * Redirects the user to an url. - * @param String $location The url that the user will be redirected to. - */ - protected function redirect($location) - { - header('Location: ' . $location); - die(); - } - - /** - * Generates a new association handle. - * @return string - */ - protected function assoc_handle() - { - return sha1(microtime()); - } - - /** - * Generates a random shared secret. - * @return string - */ - protected function shared_secret($hash) - { - $length = 20; - if($hash == 'sha256') { - $length = 256; - } - - $secret = ''; - for($i = 0; $i < $length; $i++) { - $secret .= mt_rand(0,255); - } - - return $secret; - } - - /** - * Generates a private key. - * @param int $length Length of the key. - */ - protected function keygen($length) - { - $key = ''; - for($i = 1; $i < $length; $i++) { - $key .= mt_rand(0,9); - } - $key .= mt_rand(1,9); - - return $key; - } - - # ------------------------------------------------------------------------ # - # Functions that you probably shouldn't touch. - - function __construct() - { - $this->default_modulus = - 'ANz5OguIOXLsDhmYmsWizjEOHTdxfo2Vcbt2I3MYZuYe91ouJ4mLBX+YkcLiemOcPy' - . 'm2CBRYHNOyyjmG0mg3BVd9RcLn5S3IHHoXGHblzqdLFEi/368Ygo79JRnxTkXjgmY0' - . 'rxlJ5bU1zIKaSDuKdiI+XUkKJX8Fvf8W8vsixYOr'; - - $location = (!empty($_SERVER['HTTPS']) ? 'https' : 'http') . '://' - . $_SERVER['HTTP_HOST'] . $_SERVER['REQUEST_URI']; - $location = preg_replace('/\?.*/','',$location); - $this->serverLocation = $location; - $location .= (strpos($location, '?') ? '&' : '?') . 'xrds'; - $this->xrdsLocation = $location; - - $this->data = $_GET + $_POST; - - # We choose GMP if avaiable, and bcmath otherwise - if(function_exists('gmp_add')) { - $this->add = 'gmp_add'; - $this->mul = 'gmp_mul'; - $this->pow = 'gmp_pow'; - $this->mod = 'gmp_mod'; - $this->div = 'gmp_div'; - $this->powmod = 'gmp_powm'; - } elseif(function_exists('bcadd')) { - $this->add = 'bcadd'; - $this->mul = 'bcmul'; - $this->pow = 'bcpow'; - $this->mod = 'bcmod'; - $this->div = 'bcdiv'; - $this->powmod = 'bcpowmod'; - } else { - # If neither are avaiable, we can't use DH - $this->dh = false; - } - - # However, we do require the hash functions. - # They should be built-in anyway. - if(!function_exists('hash_algos')) { - $this->dh = false; - } - } - - /** - * Displays an XRDS document, or redirects to it. - * By default, it detects whether it should display or redirect automatically. - * @param bool|null $force When true, always display the document, when false always redirect. - */ - function xrds($force=null) - { - if($force) { - echo $this->xrdsContent(); - die(); - } elseif($force === false) { - header('X-XRDS-Location: '. $this->xrdsLocation); - return; - } - - if (isset($_GET['xrds']) - || (isset($_SERVER['HTTP_ACCEPT']) && strpos($_SERVER['HTTP_ACCEPT'], 'application/xrds+xml') !== false) - ) { - header('Content-Type: application/xrds+xml'); - echo $this->xrdsContent(); - die(); - } - - header('X-XRDS-Location: ' . $this->xrdsLocation); - } - - /** - * Returns the content of the XRDS document - * @return String The XRDS document. - */ - protected function xrdsContent() - { - $lines = array( - '<?xml version="1.0" encoding="UTF-8"?>', - '<xrds:XRDS xmlns:xrds="xri://$xrds" xmlns="xri://$xrd*($v*2.0)">', - '<XRD>', - ' <Service>', - ' <Type>' . $this->ns . '/' . ($this->select_id ? 'server' : 'signon') .'</Type>', - ' <URI>' . $this->serverLocation . '</URI>', - ' </Service>', - '</XRD>', - '</xrds:XRDS>' - ); - return implode("\n", $lines); - } - - /** - * Does everything that a provider has to -- in one function. - */ - function server() - { - if(isset($this->data['openid_assoc_handle'])) { - $this->assoc = $this->getAssoc($this->data['openid_assoc_handle']); - if(isset($this->assoc['data'])) { - # We have additional data stored for setup. - $this->data += $this->assoc['data']; - unset($this->assoc['data']); - } - } - - if (isset($this->data['openid_ns']) - && $this->data['openid_ns'] == $this->ns - ) { - if(!isset($this->data['openid_mode'])) $this->errorResponse(); - - switch($this->data['openid_mode']) - { - case 'checkid_immediate': - case 'checkid_setup': - $this->checkRealm(); - # We support AX xor SREG. - $attributes = $this->ax(); - if(!$attributes) { - $attributes = $this->sreg(); - } - - # Even if some user is authenticated, we need to know if it's - # the same one that want's to authenticate. - # Of course, if we use select_id, we accept any user. - if (($identity = $this->checkid($this->data['openid_realm'], $attrValues)) - && ($this->select_id || $identity == $this->data['openid_identity']) - ) { - $this->positiveResponse($identity, $attrValues); - } elseif($this->data['openid_mode'] == 'checkid_immediate') { - $this->redirect($this->response(array('openid.mode' => 'setup_needed'))); - } else { - if(!$this->assoc) { - $this->generateAssociation(); - $this->assoc['private'] = true; - } - $this->assoc['data'] = $this->data; - $this->setAssoc($this->assoc['handle'], $this->assoc); - $this->setup($this->data['openid_identity'], - $this->data['openid_realm'], - $this->assoc['handle'], - $attributes); - } - break; - case 'associate': - $this->associate(); - break; - case 'check_authentication': - $this->checkRealm(); - if($this->verify()) { - echo "ns:$this->ns\nis_valid:true"; - if(strpos($this->data['openid_signed'],'invalidate_handle') !== false) { - echo "\ninvalidate_handle:" . $this->data['openid_invalidate_handle']; - } - } else { - echo "ns:$this->ns\nis_valid:false"; - } - die(); - break; - default: - $this->errorResponse(); - } - } else { - $this->xrds(); - } - } - - protected function checkRealm() - { - if (!isset($this->data['openid_return_to'], $this->data['openid_realm'])) { - $this->errorResponse(); - } - - $realm = str_replace('\*', '[^/]', preg_quote($this->data['openid_realm'])); - if(!preg_match("#^$realm#", $this->data['openid_return_to'])) { - $this->errorResponse(); - } - } - - protected function ax() - { - # Namespace prefix that the fields must have. - $ns = 'http://axschema.org/'; - - # First, we must find out what alias is used for AX. - # Let's check the most likely one - $alias = null; - if (isset($this->data['openid_ns_ax']) - && $this->data['openid_ns_ax'] == 'http://openid.net/srv/ax/1.0' - ) { - $alias = 'ax'; - } else { - foreach($this->data as $name => $value) { - if ($value == 'http://openid.net/srv/ax/1.0' - && preg_match('/openid_ns_(.+)/', $name, $m) - ) { - $alias = $m[1]; - break; - } - } - } - - if(!$alias) { - return null; - } - - $fields = array(); - # Now, we must search again, this time for field aliases - foreach($this->data as $name => $value) { - if (strpos($name, 'openid_' . $alias . '_type') === false - || strpos($value, $ns) === false) { - continue; - } - - $name = substr($name, strlen('openid_' . $alias . '_type_')); - $value = substr($value, strlen($ns)); - - $fields[$name] = $value; - } - - # Then, we find out what fields are required and optional - $required = array(); - $if_available = array(); - foreach(array('required','if_available') as $type) { - if(empty($this->data["openid_{$alias}_{$type}"])) { - continue; - } - $attributes = explode(',', $this->data["openid_{$alias}_{$type}"]); - foreach($attributes as $attr) { - if(empty($fields[$attr])) { - # There is an undefined field here, so we ignore it. - continue; - } - - ${$type}[] = $fields[$attr]; - } - } - - $this->data['ax'] = true; - return array('required' => $required, 'optional' => $if_available); - } - - protected function sreg() - { - $sreg_to_ax = array_flip($this->ax_to_sreg); - - $attributes = array('required' => array(), 'optional' => array()); - - if (empty($this->data['openid_sreg_required']) - && empty($this->data['openid_sreg_optional']) - ) { - return $attributes; - } - - foreach(array('required', 'optional') as $type) { - foreach(explode(',',$this->data['openid_sreg_' . $type]) as $attr) { - if(empty($sreg_to_ax[$attr])) { - # Undefined attribute in SREG request. - # Shouldn't happen, but we check anyway. - continue; - } - - $attributes[$type][] = $sreg_to_ax[$attr]; - } - } - - return $attributes; - } - - /** - * Aids an RP in assertion verification. - * @return bool Information whether the verification suceeded. - */ - protected function verify() - { - # Firstly, we need to make sure that there's an association. - # Otherwise the verification will fail, - # because we've signed assoc_handle in the assertion - if(empty($this->assoc)) { - return false; - } - - # Next, we check that it's a private association, - # i.e. one made without RP input. - # Otherwise, the RP shouldn't ask us to verify. - if(empty($this->assoc['private'])) { - return false; - } - - # Now we have to check if the nonce is correct, to prevent replay attacks. - if($this->data['openid_response_nonce'] != $this->assoc['nonce']) { - return false; - } - - # Getting the signed fields for signature. - $sig = array(); - $signed = explode(',', $this->data['openid_signed']); - foreach($signed as $field) { - $name = strtr($field, '.', '_'); - if(!isset($this->data['openid_' . $name])) { - return false; - } - - $sig[$field] = $this->data['openid_' . $name]; - } - - # Computing the signature and checking if it matches. - $sig = $this->keyValueForm($sig); - if ($this->data['openid_sig'] != - base64_encode(hash_hmac($this->assoc['hash'], $sig, $this->assoc['mac'], true)) - ) { - return false; - } - - # Clearing the nonce, so that it won't be used again. - $this->assoc['nonce'] = null; - - if(empty($this->assoc['private'])) { - # Commiting changes to the association. - $this->setAssoc($this->assoc['handle'], $this->assoc); - } else { - # Private associations shouldn't be used again, se we can as well delete them. - $this->delAssoc($this->assoc['handle']); - } - - # Nothing has failed, so the verification was a success. - return true; - } - - /** - * Performs association with an RP. - */ - protected function associate() - { - # Rejecting no-encryption without TLS. - if(empty($_SERVER['HTTPS']) && $this->data['openid_session_type'] == 'no-encryption') { - $this->directErrorResponse(); - } - - # Checking whether we support DH at all. - if (!$this->dh && substr($this->data['openid_session_type'], 0, 2) == 'DH') { - $this->redirect($this->response(array( - 'openid.error' => 'DH not supported', - 'openid.error_code' => 'unsupported-type', - 'openid.session_type' => 'no-encryption' - ))); - } - - # Creating the association - $this->assoc = array(); - $this->assoc['hash'] = $this->data['openid_assoc_type'] == 'HMAC-SHA256' ? 'sha256' : 'sha1'; - $this->assoc['handle'] = $this->assoc_handle(); - - # Getting the shared secret - if($this->data['openid_session_type'] == 'no-encryption') { - $this->assoc['mac'] = base64_encode($this->shared_secret($this->assoc['hash'])); - } else { - $this->dh(); - } - - # Preparing the direct response... - $response = array( - 'ns' => $this->ns, - 'assoc_handle' => $this->assoc['handle'], - 'assoc_type' => $this->data['openid_assoc_type'], - 'session_type' => $this->data['openid_session_type'], - 'expires_in' => $this->assoc_lifetime - ); - - if(isset($this->assoc['dh_server_public'])) { - $response['dh_server_public'] = $this->assoc['dh_server_public']; - $response['enc_mac_key'] = $this->assoc['mac']; - } else { - $response['mac_key'] = $this->assoc['mac']; - } - - # ...and sending it. - echo $this->keyValueForm($response); - die(); - } - - /** - * Creates a private association. - */ - protected function generateAssociation() - { - $this->assoc = array(); - # We use sha1 by default. - $this->assoc['hash'] = 'sha1'; - $this->assoc['mac'] = $this->shared_secret('sha1'); - $this->assoc['handle'] = $this->assoc_handle(); - } - - /** - * Encrypts the MAC key using DH key exchange. - */ - protected function dh() - { - if(empty($this->data['openid_dh_modulus'])) { - $this->data['openid_dh_modulus'] = $this->default_modulus; - } - - if(empty($this->data['openid_dh_gen'])) { - $this->data['openid_dh_gen'] = $this->default_gen; - } - - if(empty($this->data['openid_dh_consumer_public'])) { - $this->directErrorResponse(); - } - - $modulus = $this->b64dec($this->data['openid_dh_modulus']); - $gen = $this->b64dec($this->data['openid_dh_gen']); - $consumerKey = $this->b64dec($this->data['openid_dh_consumer_public']); - - $privateKey = $this->keygen(strlen($modulus)); - $publicKey = $this->powmod($gen, $privateKey, $modulus); - $ss = $this->powmod($consumerKey, $privateKey, $modulus); - - $mac = $this->x_or(hash($this->assoc['hash'], $ss, true), $this->shared_secret($this->assoc['hash'])); - $this->assoc['dh_server_public'] = $this->decb64($publicKey); - $this->assoc['mac'] = base64_encode($mac); - } - - /** - * XORs two strings. - * @param String $a - * @param String $b - * @return String $a ^ $b - */ - protected function x_or($a, $b) - { - $length = strlen($a); - for($i = 0; $i < $length; $i++) { - $a[$i] = $a[$i] ^ $b[$i]; - } - - return $a; - } - - /** - * Prepares an indirect response url. - * @param array $params Parameters to be sent. - */ - protected function response($params) - { - $params += array('openid.ns' => $this->ns); - return $this->data['openid_return_to'] - . (strpos($this->data['openid_return_to'],'?') ? '&' : '?') - . http_build_query($params, '', '&'); - } - - /** - * Outputs a direct error. - */ - protected function errorResponse() - { - if(!empty($this->data['openid_return_to'])) { - $response = array( - 'openid.mode' => 'error', - 'openid.error' => 'Invalid request' - ); - $this->redirect($this->response($response)); - } else { - header('HTTP/1.1 400 Bad Request'); - $response = array( - 'ns' => $this->ns, - 'error' => 'Invalid request' - ); - echo $this->keyValueForm($response); - } - die(); - } - - /** - * Sends an positive assertion. - * @param String $identity the OP-Local Identifier that is being authenticated. - * @param Array $attributes User attributes to be sent. - */ - protected function positiveResponse($identity, $attributes) - { - # We generate a private association if there is none established. - if(!$this->assoc) { - $this->generateAssociation(); - $this->assoc['private'] = true; - } - - # We set openid.identity (and openid.claimed_id if necessary) to our $identity - if($this->data['openid_identity'] == $this->data['openid_claimed_id'] || $this->select_id) { - $this->data['openid_claimed_id'] = $identity; - } - $this->data['openid_identity'] = $identity; - - # Preparing fields to be signed - $params = array( - 'op_endpoint' => $this->serverLocation, - 'claimed_id' => $this->data['openid_claimed_id'], - 'identity' => $this->data['openid_identity'], - 'return_to' => $this->data['openid_return_to'], - 'realm' => $this->data['openid_realm'], - 'response_nonce' => gmdate("Y-m-d\TH:i:s\Z"), - 'assoc_handle' => $this->assoc['handle'], - ); - - $params += $this->responseAttributes($attributes); - - # Has the RP used an invalid association handle? - if (isset($this->data['openid_assoc_handle']) - && $this->data['openid_assoc_handle'] != $this->assoc['handle'] - ) { - $params['invalidate_handle'] = $this->data['openid_assoc_handle']; - } - - # Signing the $params - $sig = hash_hmac($this->assoc['hash'], $this->keyValueForm($params), $this->assoc['mac'], true); - $req = array( - 'openid.mode' => 'id_res', - 'openid.signed' => implode(',', array_keys($params)), - 'openid.sig' => base64_encode($sig), - ); - - # Saving the nonce and commiting the association. - $this->assoc['nonce'] = $params['response_nonce']; - $this->setAssoc($this->assoc['handle'], $this->assoc); - - # Preparing and sending the response itself - foreach($params as $name => $value) { - $req['openid.' . $name] = $value; - } - - $this->redirect($this->response($req)); - } - - /** - * Prepares an array of attributes to send - */ - protected function responseAttributes($attributes) - { - if(!$attributes) return array(); - - $ns = 'http://axschema.org/'; - - $response = array(); - if(isset($this->data['ax'])) { - $response['ns.ax'] = 'http://openid.net/srv/ax/1.0'; - foreach($attributes as $name => $value) { - $alias = strtr($name, '/', '_'); - $response['ax.type.' . $alias] = $ns . $name; - $response['ax.value.' . $alias] = $value; - } - return $response; - } - - foreach($attributes as $name => $value) { - if(!isset($this->ax_to_sreg[$name])) { - continue; - } - - $response['sreg.' . $this->ax_to_sreg[$name]] = $value; - } - return $response; - } - - /** - * Encodes fields in key-value form. - * @param Array $params Fields to be encoded. - * @return String $params in key-value form. - */ - protected function keyValueForm($params) - { - $str = ''; - foreach($params as $name => $value) { - $str .= "$name:$value\n"; - } - - return $str; - } - - /** - * Responds with an information that the user has canceled authentication. - */ - protected function cancel() - { - $this->redirect($this->response(array('openid.mode' => 'cancel'))); - } - - /** - * Converts base64 encoded number to it's decimal representation. - * @param String $str base64 encoded number. - * @return String Decimal representation of that number. - */ - protected function b64dec($str) - { - $bytes = unpack('C*', base64_decode($str)); - $n = 0; - foreach($bytes as $byte) { - $n = $this->add($this->mul($n, 256), $byte); - } - - return $n; - } - - /** - * Complements b64dec. - */ - protected function decb64($num) - { - $bytes = array(); - while($num) { - array_unshift($bytes, $this->mod($num, 256)); - $num = $this->div($num, 256); - } - - if($bytes && $bytes[0] > 127) { - array_unshift($bytes,0); - } - - array_unshift($bytes, 'C*'); - - return base64_encode(call_user_func_array('pack', $bytes)); - } - - function __call($name, $args) - { - switch($name) { - case 'add': - case 'mul': - case 'pow': - case 'mod': - case 'div': - case 'powmod': - if(function_exists('gmp_strval')) { - return gmp_strval(call_user_func_array($this->$name, $args)); - } - return call_user_func_array($this->$name, $args); - default: - throw new BadMethodCallException(); - } - } -} |