+ Put(keys, thiskey, strlen(thiskey), strdup(thisdata), free_oid_key);
+ }
+
+
+ /* Now that we have all of the parameters, we have to validate the signature against the server */
+
+ CURL *curl;
+ CURLcode res;
+ struct curl_httppost *formpost = NULL;
+ struct curl_httppost *lastptr = NULL;
+ char errmsg[1024] = "";
+
+ curl_formadd(&formpost, &lastptr,
+ CURLFORM_COPYNAME, "openid.mode",
+ CURLFORM_COPYCONTENTS, "check_authentication",
+ CURLFORM_END);
+
+ curl = curl_easy_init();
+ // curl_easy_setopt(curl, CURLOPT_URL, FIXME ); /* FIXME need to bring this over */
+ curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0);
+ curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0);
+ // curl_easy_setopt(curl, CURLOPT_WRITEDATA, &fh);
+ // curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, fh_callback);
+ curl_easy_setopt(curl, CURLOPT_HTTPPOST, formpost);
+ curl_easy_setopt(curl, CURLOPT_ERRORBUFFER, errmsg);
+ curl_easy_setopt(curl, CURLOPT_FOLLOWLOCATION, 1);
+ res = curl_easy_perform(curl);
+ if (res) {
+ CtdlLogPrintf(CTDL_DEBUG, "cmd_oidf() libcurl error %d: %s\n", res, errmsg);