summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* Bindings: make is_cstring usable with tuple and with direct typeBenjamin Dauvergne2010-01-141-1/+3
|
* Core: remove warning emiting macros from lasso_session_remove_assertionBenjamin Dauvergne2010-01-141-2/+3
| | | | | * lasso/id-ff/session.c: we already return error code, no need to log more warnings.
* SAML 2.0: report missing request when creating artifact resolve response, ↵Benjamin Dauvergne2010-01-141-1/+4
| | | | fix typo in lasso_saml20_profile_build_post_response_msg
* SAML 2.0: Fix typo in lasso_saml20_login_build_authn_response_msgBenjamin Dauvergne2010-01-141-1/+1
|
* ID-FF&SAML2: if use is not defined on a key descriptor use the key for any useBenjamin Dauvergne2010-01-142-4/+4
| | | | | | * lasso/id-ff/provider.c lasso/saml-2.0/provider.c: if the "use" attribute is not set on a KeyDescriptor, use the key for signing and encryption.
* Tests SAML2: use & test encryptionBenjamin Dauvergne2010-01-121-11/+16
|
* SAML 2.0: add saml2_helper.h to include files to installBenjamin Dauvergne2010-01-121-1/+2
|
* Tests: fix inclusion of id-wsf 2.0 testsBenjamin Dauvergne2010-01-121-5/+7
|
* Core: add new SAML 2.0 public header to top level header lasso.hBenjamin Dauvergne2010-01-121-0/+2
|
* ID-WSF 2.0: remote saml2_login_private.h from Makefile.amBenjamin Dauvergne2010-01-121-1/+0
|
* Bindings: add support for time_t to bindings, add support for 'string' type ↵Benjamin Dauvergne2010-01-124-5/+5
| | | | for list in java binding
* in saml2_helper.{c,h}, remote const modifier from time_t typeBenjamin Dauvergne2010-01-122-2/+2
|
* in saml-2.0/name_id_management.c: handle NewEncryptedID, only encrypt if neededBenjamin Dauvergne2010-01-121-1/+30
|
* in saml-2.0/logout.c: remove commented code, only encrypt if needed, ↵Benjamin Dauvergne2010-01-121-8/+11
| | | | intialize local variables
* in lasso_saml20_login_init_idp_initiated_auhtn_request, do not use ↵Benjamin Dauvergne2010-01-121-4/+9
| | | | init_authn_request, manually create the request.
* in lasso_saml20_login_init_authn_request, use saml-2.0/profile.c functions ↵Benjamin Dauvergne2010-01-121-26/+13
| | | | to reduce code size
* in saml-2.0/profile.c, in lasso_saml20_build_response_msg, when no url is ↵Benjamin Dauvergne2010-01-121-8/+13
| | | | given, only stop for bindings needing one
* in saml-2.0/profile.c, in lasso_saml20_profile_init_response make direct accessBenjamin Dauvergne2010-01-121-2/+1
|
* in saml-2.0/profile.c, in lasso_saml20_init_request better check for ↵Benjamin Dauvergne2010-01-121-14/+19
| | | | supported bindings, do not check for identity or session, report SESSION_NOT_FOUND only if first_in_session is used, do not stop on missing name_id.
* in saml2_helper.c, remove dead codeBenjamin Dauvergne2010-01-121-180/+0
|
* SAML 2.0: in lasso_saml20_provider_accept_http_method, add ↵Benjamin Dauvergne2010-01-121-3/+17
| | | | HTTP-Artifact-POST case, better check for bad inputs, and handle special SingleSignOn case
* Core Profile: remove need for identity in lasso_profile_get_nameIdentifierBenjamin Dauvergne2010-01-121-11/+11
|
* Core Server: make default to load signing private key also as encryption ↵Benjamin Dauvergne2010-01-121-0/+9
| | | | private key
* Commit to deleteBenjamin Dauvergne2010-01-121-0/+2
|
* Core: rewrite lasso_assertion_encrypt using lasso_xmlsect_load_key and add ↵Benjamin Dauvergne2010-01-122-45/+6
| | | | recipient argument
* Core: add simple function to load key from any formatBenjamin Dauvergne2010-01-122-1/+60
|
* Core Node: add args to lasso_node_encrypt to set recipient of an encrypted ↵Benjamin Dauvergne2010-01-127-10/+15
| | | | element
* Binding python: provide old binding name for set_encryptionModeBenjamin Dauvergne2010-01-121-0/+1
|
* SAML 2.0: overhaul for ubuquitous binding support, still need work for ↵Benjamin Dauvergne2010-01-1221-1027/+954
| | | | HTTP-Artefact
* Core: in profile.c, profile.h, profileprivate.h, add a new attribute to ↵Benjamin Dauvergne2010-01-123-0/+41
| | | | express signature needs
* Core: in identity.c, do not emit trace when lasso_identity_get_federation failsBenjamin Dauvergne2010-01-121-2/+5
|
* XML Core: in xml.c, private.h, add a lasso_node_remove_signature functionBenjamin Dauvergne2010-01-122-0/+25
|
* XML: fill node_data->{certificate,private_key}_file_offset for nodes with ↵Benjamin Dauvergne2010-01-127-4/+31
| | | | signatures
* Core: in xml/private.h, add new field to LassoNodeClassData for private_key ↵Benjamin Dauvergne2010-01-121-0/+2
| | | | and certificate handling
* Core: in provider.h, add LASSO_PROVIDER_ROLE_BOTHBenjamin Dauvergne2010-01-121-3/+5
|
* Core: in profile.c, make lasso_profile_get_nameIdentifier work for transient ↵Benjamin Dauvergne2010-01-121-159/+129
| | | | | | | | | | federations * lasso/id-ff/profile.c: if no LassoIdentity is accessible try to get a name identifier through the assertion in the LassoSession object. This allows the logout profile to work without an identity object (which is normal since logout does not modify the federation status).
* Core: in provider.h, add new SAML 2.0 HTTP-Method, PAOSBenjamin Dauvergne2010-01-121-0/+2
|
* SAML 2.0: add new function to factorize adding signature to a messageBenjamin Dauvergne2010-01-122-0/+52
|
* Fix mitm attack using the AssertionConsumerURL property on requestsBenjamin Dauvergne2010-01-123-2/+60
| | | | | | | * lasso/saml-2.0/login.c: check that the URL is know before using it * lasso/saml-2.0/provider.c lasso/saml-2.0/providerprivate.h: add a function to check that an URL corresponds to a know AssertionConsumer of the given provider.
* ID-WSF 2.0: fix in documentationBenjamin Dauvergne2010-01-121-2/+2
|
* Bindings: simplify GList handlingBenjamin Dauvergne2010-01-046-96/+120
|
* XML: add element type annotation to all GList fieldsBenjamin Dauvergne2010-01-0484-116/+116
|
* Bindings: in bindings/python/Makefile.am, precise generated files dependenciesBenjamin Dauvergne2010-01-041-0/+2
|
* XML: move SOAP API to its own sub directoryBenjamin Dauvergne2010-01-0429-59/+105
|
* Bindings: in overrides.xml, remove noew useless directivesBenjamin Dauvergne2010-01-041-47/+0
|
* Python binding: update test scripts to new ID-WSF APIBenjamin Dauvergne2010-01-042-34/+61
|
* Binding ID-WSF 2.0: do not bind lasso_wsa_endpoint_reference_get_*_token methodsBenjamin Dauvergne2010-01-041-0/+2
|
* Tests: add idwsf2_tests.c, call from tests.c, update Makefile.amBenjamin Dauvergne2010-01-044-2/+291
|
* ID-WSF 2.0: in profile.{c,h}, discovery.{c,h}, data_service.{c,h}, overhaul ↵Benjamin Dauvergne2010-01-047-1751/+2362
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | all profiles. * lasso/id-wsf-2.0/profile.c lasso/id-wsf-2.0/profile.h: - lasso_idwsf2_profile_get_name_identifier returns the NameID found in an assertion used as a WS-Security token when security mechanism Bearer or SAML are used. - complete the function lasso_id_wsf2_profile_build_soap_envelope with construction of the Sender element which is used to transmit the providerID of the message sender by the SOAP binding ID-WSF 2.0 specification. - remove useless instance_init function in profile object - reset some profile fields in process_soap_request_msg (response, body, nameIdentifier). use lasso_saml20_profile_name_identifier_decryption for handling NameID from WS-Security mechanism assertion. - add private_data - change signature of lasso_idwsf2_profile_init_soap_request to use and EPR and a security mechanism specifier when building the SOAP request. - change signature of lasso_idwsf2_profile_process_soap_request to verify security_mech_id of received messages. * docs/reference/lasso/lasso-sections.txt: add the function to the documentation. * lasso/id-wsf-2.0/discovery.{c,h}: - use utils.h macros instead of g_return_val_if_fail because it removes useless warning, since it returns an error code. release acquired resources. - in lasso_idwsf2_discovery_metadata_register_self, return error code instead of identifier string for the new service, use an out parmeter to return the identifier, use utils.h macros. - in lasso_idwsf2_discovery_init_metadata_register, use utils.h macros, check return code of lasso_idwsf2_profile_init_soap_request. - change signature of lasso_idwsf2_discovery_init_metadata_register to support security_mech_id, try to get URL from an existing Discovery service EPR (from Session object). - change signature of lasso_idwsf2_discovery_process_metadata_register_msg, lasso_idwsf2_discovery_init_metadata_association_add, lasso_idwsf2_discovery_process_metadata_association_add_msg, lasso_idwsf2_discovery_init_query, lasso_idwsf2_discovery_process_query_msg, to support security mechanism. - improve lasso_idwsf2_discovery_build_query_response_eprs. - add lasso_idwsf2_discovery_get_nth_data_service to acces returned services. * lasso/id-wsf-2.0/data_service.{c,h}: - redo all the API
* ID-WSF 2.0: in session.c, fix memory handling errorsBenjamin Dauvergne2010-01-041-4/+14
|