summaryrefslogtreecommitdiffstats
path: root/lasso
Commit message (Collapse)AuthorAgeFilesLines
...
* | [xml] fix lasso_node_get_xmlnode_for_any_typeBenjamin Dauvergne2011-03-071-1/+10
| | | | | | | | | | | | | | xmlCopyPropList does not copy the property list into the target it just copy it with respect to the target (mainly for namespace references). This patch adds the real copy into the target node.
* | [core] add missing namespace definitions to internal objectsBenjamin Dauvergne2011-03-0110-6/+37
|/ | | | | | | Identity, Lecp, Login, Logout, NameIdentifierMapping, NameRegistration, Session, AssertionQuery, Ecp and NameIdManagement objects were missing a namespace association to their GObject class. It broke when you try to dump a node created by lasso_node_new_from_dump.
* [wsf] fix wsf preprocessor conditionalsBenjamin Dauvergne2011-01-046-2/+9
|
* [saml2] when parsing short numbers reinitialize errnoBenjamin Dauvergne2011-01-041-1/+3
|
* [xml] fix null pointer access in lasso_node_get_encryptionBenjamin Dauvergne2010-12-221-1/+1
|
* [saml2] fix errors in lasso)provider_get_first_http_method when a binding is ↵Benjamin Dauvergne2010-12-211-3/+3
| | | | unknown
* [saml2 provider] change critical messages to debug messagesBenjamin Dauvergne2010-12-211-2/+2
|
* [saml2 profile] fix bug in binding_uri_to_http_method with the POST bindingBenjamin Dauvergne2010-12-211-1/+1
|
* [saml login] suppress unused argument warningBenjamin Dauvergne2010-12-211-1/+1
|
* [samlv2 logout] check that the assertion is well formed before accessing the ↵Benjamin Dauvergne2010-12-171-0/+4
| | | | subject nameid
* [profile] prefer to lookup the session before the identity for looking up a ↵Benjamin Dauvergne2010-12-171-14/+14
| | | | name identifier;
* [samlv2 logout] setup the NameID from the assertionBenjamin Dauvergne2010-12-171-2/+2
|
* [samlv2 login] do not setup conditions->notBefore/notOnOrAfter only ↵Benjamin Dauvergne2010-12-171-5/+0
| | | | notOnOrAfter on SubjectConfirmationData
* [saml2] make LASSO_SIGNATURE_VERIFY_HINT_FORCE as least as stringent as ↵Benjamin Dauvergne2010-12-141-9/+23
| | | | _MAYBE when checking signature on messages
* [xml] remove duplicate EncryptedKey around EncryptedData elementsBenjamin Dauvergne2010-12-141-1/+0
| | | | | The key is already embedded in the EncryptedData, so there is no need to also fill the EncryptedKey field of the saml:EncryptedElement object.
* [xml] add exportation of the encrypting public key in EncryptedData elementsBenjamin Dauvergne2010-12-141-0/+19
| | | | | | This commit check if the given is a simple RSA key or a full certificate and choose the better serialization method between RSAKeyValue and X509Data.
* [tools] fix xml decryptionBenjamin Dauvergne2010-12-141-9/+6
| | | | | | This commit rewrite the extraction of the EncryptedKey when it is embedded inside the EncryptedData element, which seem to be the frequent case.
* Merge with new field in custome elementBenjamin Dauvergne2010-12-141-1/+2
|
* [saml2] use new encryption structure instead for internal field in ↵Benjamin Dauvergne2010-12-142-9/+8
| | | | LassoSaml2Assertion
* [xml] add field to contains encryption parameters inside CustomElement structureBenjamin Dauvergne2010-12-142-0/+70
|
* [utils] fix typo in lasso_assign_sec_keyBenjamin Dauvergne2010-12-141-1/+2
|
* [saml2] do not set SPNameQualifier it should be reserved for SP member of an ↵Benjamin Dauvergne2010-12-131-3/+0
| | | | affiliation
* [SAMLv2] fix segfault in has_signature by initializing local variablesBenjamin Dauvergne2010-10-201-2/+2
|
* [SAMLv2] delete an unused local variableBenjamin Dauvergne2010-10-111-1/+0
|
* [SAMLv2] user server->signature_method when signing request and responseBenjamin Dauvergne2010-10-091-2/+3
|
* [core] check type of first argument of lasso_provider_get_assertion_consumer_urlBenjamin Dauvergne2010-10-091-1/+3
|
* [xml] fix waring on use of strndup on pardusBenjamin Dauvergne2010-10-081-0/+3
|
* Add missing include <errno.h>Jérôme Schneider2010-10-082-1/+3
|
* [SAMLv2] handle unknown provider in artifact resolve, and also alow to ↵Benjamin Dauvergne2010-10-071-5/+12
| | | | | | | | | ignore signature validation In lasso_saml20_profile_process_artifact_resolve, we know take a short path with an error when the remote provider is unknown and we also respect the lasso_profile_get_signature_verify_hint() when checking the signature on the artifact resolve message.
* [SAMLv2] fix bad double free bug in ↵Benjamin Dauvergne2010-10-071-1/+1
| | | | lasso_saml20_provider_get_assertion_consumer_service_url_by_binding
* [core] adapt lasso_provider_get_assertion_consumer_service_url for SAMLv2Benjamin Dauvergne2010-10-071-0/+12
|
* [ID-FFv1.2] in lasso_login_process_authn_request_msg() adopt simpler ↵Benjamin Dauvergne2010-10-061-16/+26
| | | | | | | | | | | | | | | | behaviour for checking signatures There is two sources of advice for signature checking: AuthnRequestsSigned attribute in service provider metadata files and value of lasso_profile_get_signature_verify_hint(). If lasso_profile_get_signature_verify_hint() forbid to check signature, we do not check. If the SP advise to check signature, we check. If lasso_profile_get_signature_verify_hint() forces to check signature, we do not check. In all other cases we only check if a signature is present, i.e. we ignore the error LASSO_DS_ERROR_SIGNATURE_NOT_FOUND.
* [ID-FFv1.2] make lasso_login_process_authn_request_msg() return ↵Benjamin Dauvergne2010-10-061-1/+5
| | | | LASSO_PROFILE_ERROR_INVALID_MSG if received request is not a lib:AuthnRequest
* [SAMLv2] adopt same behaviour as ID-FFv1.2 for invalid AuthnRequestBenjamin Dauvergne2010-10-061-1/+1
|
* [SAMLv2&ID-FFv1.2] improve documentation of ↵Benjamin Dauvergne2010-10-061-12/+108
| | | | lasso_login_process_authn_request_msg
* [SAMLv2] fix ordering of endpointsBenjamin Dauvergne2010-10-061-7/+22
| | | | | Ordering by binding is wrong, first order by isDefault (as stated in saml-metadata-2.0.pdf) then by index.
* [Core] change isdefault type in EndpointType structureBenjamin Dauvergne2010-10-061-1/+1
| | | | | | | As integer we can represent the three value of isdefault: - true - false - attribute absent
* [SAMLv2] restore setting of SubjectConfirmationData->NotOnOrAfterBenjamin Dauvergne2010-10-011-0/+6
| | | | | | | | This was wrongly removed by me in commit 9d22f29e55524034dfda34c15b76f1b0b78c4413. This is the responsability of the caller to adjust value on the Conditions and SubjectConfirmationData independently after.
* [Core] replace all use of g_strcmp0 by lasso_strisequal and lasso_strisnotequalBenjamin Dauvergne2010-10-0123-152/+153
| | | | | Too much human errors with strcmp kind of functions. Also change name os lasso_is_empty_string to lasso_strisempty.
* [Core] add helper API for string comparaisonBenjamin Dauvergne2010-10-011-5/+18
| | | | It should remove most errors when comparing strings.
* [SAMLv2] add missing compare to 0 introduced in 7386dc8189Benjamin Dauvergne2010-10-011-1/+1
| | | | I hate strcmp.
* [SAMLv2] also initialize Destination for response messagesBenjamin Dauvergne2010-09-301-0/+5
| | | | | asynchronous bindings needs Destination attribute even for response messages.
* [SAMLv2] when NidPolicy->Format is NULL or unspecified, return transientBenjamin Dauvergne2010-09-301-1/+4
| | | | Add more default cases.
* [Core] fix break of lasso_profile_get_request_type_from_soap_msg from commit ↵Benjamin Dauvergne2010-09-291-2/+2
| | | | | | b9d535625 ManageNameIDRequest is not an ID-WSF kind of request.
* [Core] add missing annotation to lasso_*_dump functionsBenjamin Dauvergne2010-09-277-8/+8
| | | | | The string returned by these functions is newly allocated and must be freed by the caller.
* [ID-WSFv1] fix other misuses of the macro lasso_foreachBenjamin Dauvergne2010-09-272-5/+6
|
* [SAMLv2] fix wrong order in use of macro lasso_foreachBenjamin Dauvergne2010-09-271-1/+1
| | | | | | The first argument must be the iterator, the second is the iterable. Also add a non-regression test with Googleapps metadata and and a typical authn request.
* [SAMLv2] fix early release of the request when using idp_initiaed loginBenjamin Dauvergne2010-09-171-1/+1
|
* [SAMLv2] fix memleak of request in lasso_name_id_management_process_request_msgBenjamin Dauvergne2010-09-171-1/+2
|
* [SAMLv2] fix memleak of request in lasso_saml20_login_process_authn_request_msgBenjamin Dauvergne2010-09-171-0/+1
|