summaryrefslogtreecommitdiffstats
path: root/lasso
Commit message (Collapse)AuthorAgeFilesLines
...
* Export more assertion access API for LassoSessionBenjamin Dauvergne2010-01-253-6/+6
| | | | | | | | | | * lasso/id-ff/session.c lasso/id-ff/session.h lasso/id-ff/sessionprivate.h: export lasso_session_get_assertion(), lasso_session_add_assertion() and lasso_session_remove_assertion(). remove them from private header. * docs/reference/lasso/lasso-sections.txt: update documentation
* in saml2_name_id.c, include utils.h to benefit from replacement for g_strcmp0Benjamin Dauvergne2010-01-201-0/+1
|
* Fix LASSO_WSSEC_BAD_PASSWORD error, reformat wsse_username_token.cBenjamin Dauvergne2010-01-202-13/+22
| | | | | | | | * lasso/errors.h: change error id and error name for LASSO_WSSEC_BAD_PASSWORD * lasso/xml/ws/wsse_username_token.c: update reference to LASSO_WSSEC_BAD_PASSWORD. reformat line longer than 100 characters.
* ID-WSF 2.0: add some annotationsBenjamin Dauvergne2010-01-192-2/+2
|
* Core: in backward_comp.h, include string.h if g_strcmp0 is usedBenjamin Dauvergne2010-01-191-0/+2
| | | | | * lasso/backward_comp.h: implementation of g_strcmp0 depends upon string.h.
* WS-Security: fix typo in name of string symbolsBenjamin Dauvergne2010-01-191-4/+4
| | | | | * lasso/xml/idwsf_strings.h: uppercase define for WS-Securities SOAP faults.
* WS: complete support for wsse:UsernameTokenBenjamin Dauvergne2010-01-195-69/+352
| | | | | | | | | | | | | * docs/reference/lasso/lasso-sections.txt: add new functions and change type name in documentation. * lasso/errors.h lasso/errors.c: add an error to report password verification failure * lasso/xml/ws/wsse_username_token.h lasso/xml/ws/wsse_username_token.c: update support for wsse:UsernameToken up to version 1.1, implement digest and derived keys computations. * lasso/xml/idwsf_strings.h: add strings for Username WS-Security Token profile
* XML SAML-2.0: AuthnContext content is a xdf:choice so make content optionalBenjamin Dauvergne2010-01-191-4/+4
| | | | | | | | | | | | - lasso/xml/saml-2.0/saml2_authn_context.c: <AuthnContext/> can contain at least one node among: - <AuthnContextClassRef/> - <AuthnContextDeclRef/> - <AuthnContextDecl/> to approximate this possibility, we need to make any of them optional. <AuthenticatingAuthority/> should be a list but we cannot change it without breaking the ABI, so we will wait for this.
* ID-WSF 2.0: Add saml2_login.h to list of headersBenjamin Dauvergne2010-01-181-1/+2
|
* Documentation: distribute stylesheet, fix documentation comments, compelte ↵Benjamin Dauvergne2010-01-1813-17/+29
| | | | lasso-sections.txt
* ID-WSF: mark API as Private not InternalBenjamin Dauvergne2010-01-181-1/+1
|
* Core: complete documentation on LassoSessionBenjamin Dauvergne2010-01-181-2/+10
|
* Core: complete documentation on LassoProfileBenjamin Dauvergne2010-01-181-8/+41
|
* Core: complete documentation on LassoLoginBenjamin Dauvergne2010-01-181-1/+6
|
* fix typo (transfer-none) -> (transfer none)Benjamin Dauvergne2010-01-182-5/+5
|
* ID-WSF 1.0: change name of utils.{c,h} file for documentation parsingBenjamin Dauvergne2010-01-183-2/+2
| | | | | | | * utils.h: this header has the same name as an other header which is not parsed by the documentation (lasso/utils.h) and the documentation process just match by filename, so we rename it.
* FIX ABI breakage between 2.2.1 and 2.2.2 in LassoSamlAdviceBenjamin Dauvergne2010-01-153-7/+10
| | | | | | | | | | * lasso/xml/saml_advice.c lasso/xml/saml_advice.h: restore fields AssertionIDReference and Assertion, remove field any to restore state from 2.2.1 * lasso/id-ff/session.c: use xmlNode stored inside LassoSamlAssertion objects instead of accessing the 'any' list of xmlNode that was inserted in LassoSamlAdvice.
* FIX ABI breakage when addning new field to struct LassoSaml2AttributeValueBenjamin Dauvergne2010-01-142-3/+0
|
* Fix ABI breakage due to change of constant name from ↵Benjamin Dauvergne2010-01-142-3/+5
| | | | LASSO_SOAP_FAULT_REDIRECT_REQUEST to LASSO_SOAP_ERROR_REDIRECT_REQUEST_FAULT
* Fix ABI breakage with respect to 2.2.1Benjamin Dauvergne2010-01-142-0/+8
|
* ID-WSF: separate ID-WSF strings into their own headerBenjamin Dauvergne2010-01-143-1225/+1273
|
* SAML 2.0 Logout: undo some change to when the assertion is removedBenjamin Dauvergne2010-01-141-23/+9
| | | | | | | | | | | * lasso/saml-2.0/logout.c: - do not remove the assertion in init_request, as before only if all fails (event REDIRECT is unsupported). - in process_response_msg remove the assertion if we are the IdP or if there is no error. - in validate_request, remove the assertion if there is no error. I think that there will be more updates to this in the future.
* Core: remove warning emiting macros from lasso_session_remove_assertionBenjamin Dauvergne2010-01-141-2/+3
| | | | | * lasso/id-ff/session.c: we already return error code, no need to log more warnings.
* SAML 2.0: report missing request when creating artifact resolve response, ↵Benjamin Dauvergne2010-01-141-1/+4
| | | | fix typo in lasso_saml20_profile_build_post_response_msg
* SAML 2.0: Fix typo in lasso_saml20_login_build_authn_response_msgBenjamin Dauvergne2010-01-141-1/+1
|
* ID-FF&SAML2: if use is not defined on a key descriptor use the key for any useBenjamin Dauvergne2010-01-142-4/+4
| | | | | | * lasso/id-ff/provider.c lasso/saml-2.0/provider.c: if the "use" attribute is not set on a KeyDescriptor, use the key for signing and encryption.
* SAML 2.0: add saml2_helper.h to include files to installBenjamin Dauvergne2010-01-121-1/+2
|
* Core: add new SAML 2.0 public header to top level header lasso.hBenjamin Dauvergne2010-01-121-0/+2
|
* ID-WSF 2.0: remote saml2_login_private.h from Makefile.amBenjamin Dauvergne2010-01-121-1/+0
|
* in saml2_helper.{c,h}, remote const modifier from time_t typeBenjamin Dauvergne2010-01-122-2/+2
|
* in saml-2.0/name_id_management.c: handle NewEncryptedID, only encrypt if neededBenjamin Dauvergne2010-01-121-1/+30
|
* in saml-2.0/logout.c: remove commented code, only encrypt if needed, ↵Benjamin Dauvergne2010-01-121-8/+11
| | | | intialize local variables
* in lasso_saml20_login_init_idp_initiated_auhtn_request, do not use ↵Benjamin Dauvergne2010-01-121-4/+9
| | | | init_authn_request, manually create the request.
* in lasso_saml20_login_init_authn_request, use saml-2.0/profile.c functions ↵Benjamin Dauvergne2010-01-121-26/+13
| | | | to reduce code size
* in saml-2.0/profile.c, in lasso_saml20_build_response_msg, when no url is ↵Benjamin Dauvergne2010-01-121-8/+13
| | | | given, only stop for bindings needing one
* in saml-2.0/profile.c, in lasso_saml20_profile_init_response make direct accessBenjamin Dauvergne2010-01-121-2/+1
|
* in saml-2.0/profile.c, in lasso_saml20_init_request better check for ↵Benjamin Dauvergne2010-01-121-14/+19
| | | | supported bindings, do not check for identity or session, report SESSION_NOT_FOUND only if first_in_session is used, do not stop on missing name_id.
* in saml2_helper.c, remove dead codeBenjamin Dauvergne2010-01-121-180/+0
|
* SAML 2.0: in lasso_saml20_provider_accept_http_method, add ↵Benjamin Dauvergne2010-01-121-3/+17
| | | | HTTP-Artifact-POST case, better check for bad inputs, and handle special SingleSignOn case
* Core Profile: remove need for identity in lasso_profile_get_nameIdentifierBenjamin Dauvergne2010-01-121-11/+11
|
* Core Server: make default to load signing private key also as encryption ↵Benjamin Dauvergne2010-01-121-0/+9
| | | | private key
* Commit to deleteBenjamin Dauvergne2010-01-121-0/+2
|
* Core: rewrite lasso_assertion_encrypt using lasso_xmlsect_load_key and add ↵Benjamin Dauvergne2010-01-122-45/+6
| | | | recipient argument
* Core: add simple function to load key from any formatBenjamin Dauvergne2010-01-122-1/+60
|
* Core Node: add args to lasso_node_encrypt to set recipient of an encrypted ↵Benjamin Dauvergne2010-01-127-10/+15
| | | | element
* SAML 2.0: overhaul for ubuquitous binding support, still need work for ↵Benjamin Dauvergne2010-01-1221-1027/+954
| | | | HTTP-Artefact
* Core: in profile.c, profile.h, profileprivate.h, add a new attribute to ↵Benjamin Dauvergne2010-01-123-0/+41
| | | | express signature needs
* Core: in identity.c, do not emit trace when lasso_identity_get_federation failsBenjamin Dauvergne2010-01-121-2/+5
|
* XML Core: in xml.c, private.h, add a lasso_node_remove_signature functionBenjamin Dauvergne2010-01-122-0/+25
|
* XML: fill node_data->{certificate,private_key}_file_offset for nodes with ↵Benjamin Dauvergne2010-01-127-4/+31
| | | | signatures