| 
<?php
 if (!array_key_exists('SAMLResponse', $_REQUEST) && !array_key_exists('SAMLart', $_REQUEST)) {
 throw new SimpleSAML_Error_BadRequest('Missing SAMLResponse or SAMLart parameter.');
 }
 
 if (!array_key_exists('TARGET', $_REQUEST)) {
 throw new SimpleSAML_Error_BadRequest('Missing TARGET parameter.');
 }
 
 $sourceId = $_SERVER['PATH_INFO'];
 $end = strpos($sourceId, '/', 1);
 if ($end === FALSE) {
 $end = strlen($sourceId);
 }
 $sourceId = substr($sourceId, 1, $end - 1);
 
 $source = SimpleSAML_Auth_Source::getById($sourceId, 'sspmod_saml_Auth_Source_SP');
 
 SimpleSAML_Logger::debug('Received SAML1 response');
 
 $target = (string)$_REQUEST['TARGET'];
 
 if (preg_match('@^https?://@i', $target)) {
 /* Unsolicited response. */
 $state = array(
 'saml:sp:isUnsolicited' => TRUE,
 'saml:sp:AuthId' => $sourceId,
 'saml:sp:RelayState' => SimpleSAML_Utilities::checkURLAllowed($target),
 );
 } else {
 $stateID = $_REQUEST['TARGET'];
 
 // sanitize the input
 $sid = SimpleSAML_Utilities::parseStateID($stateID);
 if (!is_null($sid['url'])) {
 SimpleSAML_Utilities::checkURLAllowed($sid['url']);
 }
 
 $state = SimpleSAML_Auth_State::loadState($stateID, 'saml:sp:sso');
 
 /* Check that the authentication source is correct. */
 assert('array_key_exists("saml:sp:AuthId", $state)');
 if ($state['saml:sp:AuthId'] !== $sourceId) {
 throw new SimpleSAML_Error_Exception('The authentication source id in the URL does not match the authentication source which sent the request.');
 }
 
 assert('isset($state["saml:idp"])');
 }
 
 $spMetadata = $source->getMetadata();
 
 if (array_key_exists('SAMLart', $_REQUEST)) {
 if (!isset($state['saml:idp'])) {
 /* Unsolicited response. */
 throw new SimpleSAML_Error_Exception('IdP initiated authentication not supported with the SAML 1.1 SAMLart protocol.');
 }
 $idpMetadata = $source->getIdPMetadata($state['saml:idp']);
 
 $responseXML = SimpleSAML_Bindings_Shib13_Artifact::receive($spMetadata, $idpMetadata);
 $isValidated = TRUE; /* Artifact binding validated with ssl certificate. */
 } elseif (array_key_exists('SAMLResponse', $_REQUEST)) {
 $responseXML = $_REQUEST['SAMLResponse'];
 $responseXML = base64_decode($responseXML);
 $isValidated = FALSE; /* Must check signature on response. */
 } else {
 assert('FALSE');
 }
 
 $response = new SimpleSAML_XML_Shib13_AuthnResponse();
 $response->setXML($responseXML);
 
 $response->setMessageValidated($isValidated);
 $response->validate();
 
 $responseIssuer = $response->getIssuer();
 $attributes = $response->getAttributes();
 
 if (isset($state['saml:idp']) && $responseIssuer !== $state['saml:idp']) {
 throw new SimpleSAML_Error_Exception('The issuer of the response wasn\'t the destination of the request.');
 }
 
 $logoutState = array(
 'saml:logout:Type' => 'saml1'
 );
 $state['LogoutState'] = $logoutState;
 
 $source->handleResponse($state, $responseIssuer, $attributes);
 assert('FALSE');
 
 ?>
 
 |