Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.
{
// OpenID 1.0/1.1 response without a claimed identifier
// We need to load discovered information using the
// local identifier
useLocalIdentifierAsKey = true;
}
else {
// OpenID 2.0+:
// If there is no claimed identifier, then the
// assertion is not about an identity
return callback(null, { authenticated: false });
}
}
if (useLocalIdentifierAsKey) {
claimedIdentifier = params['openid.identity'];
}
claimedIdentifier = _getCanonicalClaimedIdentifier(claimedIdentifier);
openid.loadDiscoveredInformation(claimedIdentifier, function(error, provider)
{
if(error)
{
return callback({ message: 'An error occured when loading previously discovered information about the claimed identifier' });
}
if(provider)
{
return _verifyAssertionAgainstProviders([provider], params, stateless, extensions, callback);
}
else if (useLocalIdentifierAsKey) {
return callback({ message: 'OpenID 1.0/1.1 response received, but no information has been discovered about the provider. It is likely that this is a fraudulent authentication response.' });
{
// OpenID 1.0/1.1 response without a claimed identifier
// We need to load discovered information using the
// local identifier
useLocalIdentifierAsKey = true;
}
else {
// OpenID 2.0+:
// If there is no claimed identifier, then the
// assertion is not about an identity
return callback(null, { authenticated: false });
}
}
if (useLocalIdentifierAsKey) {
claimedIdentifier = params['openid.identity'];
}
claimedIdentifier = _getCanonicalClaimedIdentifier(claimedIdentifier);
openid.loadDiscoveredInformation(claimedIdentifier, function(error, provider)
{
if(error)
{
return callback({ message: 'An error occured when loading previously discovered information about the claimed identifier' });
}
if(provider)
{
return _verifyAssertionAgainstProvider(provider, params, stateless, extensions, callback);
}
else if (useLocalIdentifierAsKey) {
return callback({ message: 'OpenID 1.0/1.1 response received, but no information has been discovered about the provider. It is likely that this is a fraudulent authentication response.' });
function lfOpenIdLoginURL(uriParams) {
var openIdServer = uriParams['oid-srv'];
var openIdSig = uriParams['openid.sig'];
var openIdIdentity = uriParams['openid.identity'];
var openIdAssoc_handle = uriParams['openid.assoc_handle'];
var openIdSigned = uriParams['openid.signed'];
var url = openIdServer + ((openIdServer.lastIndexOf('?') != -1)? '&': '?') +
'openid.mode=check_authentication' +
'&openid.assoc_handle=' + encodeURIComponent (openIdAssoc_handle) +
'&openid.sig=' + encodeURIComponent (openIdSig) +
'&openid.signed=' + encodeURIComponent (openIdSigned);
var sig = openIdSigned.split(',');
for (var i = 0; i < sig.length; i++)
{
var _key = sig[i].trim ();
if (_key != 'mode' &&
_key != 'signed' &&
_key != 'assoc_handle')
function openIdLoginURL(uriParams) {
var openIdServer = uriParams['oid-srv'];
var openIdSig = uriParams['openid.sig'];
var openIdIdentity = uriParams['openid.identity'];
var openIdAssoc_handle = uriParams['openid.assoc_handle'];
var openIdSigned = uriParams['openid.signed'];
var url = openIdServer + ((openIdServer.lastIndexOf('?') != -1)? '&': '?') +
'openid.mode=check_authentication' +
'&openid.assoc_handle=' + encodeURIComponent (openIdAssoc_handle) +
'&openid.sig=' + encodeURIComponent (openIdSig) +
'&openid.signed=' + encodeURIComponent (openIdSigned);
var sig = openIdSigned.split(',');
for (var i = 0; i < sig.length; i++)
{
var _key = sig[i].trim ();
if (_key != 'mode' &&
_key != 'signed' &&
_key != 'assoc_handle')
name: 'steamLoginSecure',
domain: 'store.steampowered.com'
})
const sid = await window.remote.session.defaultSession.cookies.get({
name: 'sessionid',
})
const cookie = sls[0].value
const cookieSess = sid[0].value
authWindow.removeAllListeners('closed');
setImmediate(function () {
authWindow.close();
});
resolve({
response_nonce: query['openid.response_nonce'],
assoc_handle: query['openid.assoc_handle'],
identity: query['openid.identity'],
steam_id: query['openid.identity'].match(/\/id\/(.*$)/)[1],
sig: query['openid.sig'],
cookie,
cookieSess,
});
}
}
if(!!provider.version && provider.version.indexOf('2.0') !== -1)
{
var endpoint = params['openid.op_endpoint'];
if (provider.endpoint != endpoint)
{
continue;
}
if(provider.claimedIdentifier) {
var claimedIdentifier = _getCanonicalClaimedIdentifier(params['openid.claimed_id']);
if(provider.claimedIdentifier != claimedIdentifier) {
return callback({ message: 'Claimed identifier in assertion response does not match discovered claimed identifier' });
}
}
}
if(!!provider.localIdentifier && provider.localIdentifier != params['openid.identity'])
{
return callback({ message: 'Identity in assertion response does not match discovered local identifier' });
}
return _checkSignature(params, provider, stateless, function(error, result)
{
if(error)
{
return callback(error);
}
if(extensions && result.authenticated)
{
for(var ext in extensions)
{
if (!hasOwnProperty(extensions, ext))
{
{
if (!extension.requestParams.hasOwnProperty(key)) { continue; }
params[key] = extension.requestParams[key];
}
}
if(provider.claimedIdentifier)
{
params['openid.claimed_id'] = provider.claimedIdentifier;
if(provider.localIdentifier)
{
params['openid.identity'] = provider.localIdentifier;
}
else
{
params['openid.identity'] = provider.claimedIdentifier;
}
}
else if(provider.version.indexOf('2.0') !== -1)
{
params['openid.claimed_id'] = params['openid.identity'] =
'http://specs.openid.net/auth/2.0/identifier_select';
}
else {
return callback({ message: 'OpenID 1.0/1.1 provider cannot be used without a claimed identifier' });
}
if(assoc_handle)
{
params['openid.assoc_handle'] = assoc_handle;
}
{
if (!hasOwnProperty(extension.requestParams, key)) { continue; }
params[key] = extension.requestParams[key];
}
}
if(provider.claimedIdentifier)
{
params['openid.claimed_id'] = provider.claimedIdentifier;
if(provider.localIdentifier)
{
params['openid.identity'] = provider.localIdentifier;
}
else
{
params['openid.identity'] = provider.claimedIdentifier;
}
}
else if(provider.version.indexOf('2.0') !== -1)
{
params['openid.claimed_id'] = params['openid.identity'] =
'http://specs.openid.net/auth/2.0/identifier_select';
}
else {
return callback({ message: 'OpenID 1.0/1.1 provider cannot be used without a claimed identifier' });
}
if(assoc_handle)
{
params['openid.assoc_handle'] = assoc_handle;
}