Author: dumindu
Date: Tue Feb 19 13:37:19 2008
New Revision: 13903
Log:
code formatting.
Modified:
trunk/solutions/identity/modules/mod-cspace/mod_cspace.c
Modified: trunk/solutions/identity/modules/mod-cspace/mod_cspace.c
==============================================================================
--- trunk/solutions/identity/modules/mod-cspace/mod_cspace.c (original)
+++ trunk/solutions/identity/modules/mod-cspace/mod_cspace.c Tue Feb 19
13:37:19 2008
@@ -644,38 +644,47 @@
if ((auth_state) &&
(strcmp(auth_state,
CARDSPACE_STATE_SUCCESS) == 0)) {
- const char *issuer = NULL;
- const char *ppid = NULL;
- const char *cert = NULL;
- int allowed_flag = FAIL;
+ const char *issuer = NULL;
+ const char *ppid = NULL;
+ const char *cert = NULL;
+ int allowed_flag = FAIL;
+
+ ppid = apr_table_get(r->subprocess_env,
+ CARDSPACE_HEADER_PFX
CARDSPACE_HEADER_PPID);
+
+ cert = apr_table_get(r->subprocess_env,
+ CARDSPACE_HEADER_PFX
CARDSPACE_HEADER_CERTIFICATE);
- ppid = apr_table_get(r->subprocess_env,
- CARDSPACE_HEADER_PFX
CARDSPACE_HEADER_PPID);
-
- cert = apr_table_get(r->subprocess_env,
- CARDSPACE_HEADER_PFX
CARDSPACE_HEADER_CERTIFICATE);
-
- issuer = apr_table_get(r->subprocess_env,
- CARDSPACE_HEADER_PFX
CARDSPACE_HEADER_ISSUER);
-
- if (!svr_cfg->validator) {
- /* if the validator is not present assume cert by
default*/
- svr_cfg->validator = "cert";
- }
+ issuer = apr_table_get(r->subprocess_env,
+ CARDSPACE_HEADER_PFX
CARDSPACE_HEADER_ISSUER);
- allowed_flag =
- validate_with_op_mode(svr_cfg->validator,
- r->uri,
- issuer,
- ppid,
- cert,
- svr_cfg->validator_data);
-
- if (allowed_flag) {
- return OK;
- } else {
- return UNAUTHORIZED_REDIRECT(r, dir_cfg->redir_uri);
- }
+ if (!svr_cfg->validator) {
+ /* if the validator is not present assume cert by
default*/
+ svr_cfg->validator = "cert";
+ }
+
+ allowed_flag =
+ validate_with_op_mode(svr_cfg->validator,
+ r->uri,
+ issuer,
+ ppid,
+ cert,
+ svr_cfg->validator_data);
+
+ if (allowed_flag) {
+
+ if (!gen_session(SESSION_ID_LEN, session_ctx,
+ &session_id))
+ return HTTP_INTERNAL_SERVER_ERROR;
+
+ if (session_id)
+ set_cookie(r, session_id);
+ /*log success/failure of this*/
+
+ return OK;
+ } else {
+ return UNAUTHORIZED_REDIRECT(r, dir_cfg->redir_uri);
+ }
#if 0
validate_using_ppid = 0; /*TODO: remove magic*/
_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev