X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;ds=sidebyside;f=samltest%2Fsaml2%2Fbinding%2FSAML2ArtifactTest.h;h=46c33b0f2e62cfc9f5108385fa6a1c38fa2e9664;hb=96437360be3fa1f0c182bdd13b54e00110e45f11;hp=329af90bef19e6658b70e556ec31e9fe4efca839;hpb=99156c335b5f553a38749d8e10000d1b4ccf3a3b;p=shibboleth%2Fcpp-opensaml.git diff --git a/samltest/saml2/binding/SAML2ArtifactTest.h b/samltest/saml2/binding/SAML2ArtifactTest.h index 329af90..46c33b0 100644 --- a/samltest/saml2/binding/SAML2ArtifactTest.h +++ b/samltest/saml2/binding/SAML2ArtifactTest.h @@ -39,7 +39,7 @@ public: try { QName idprole(samlconstants::SAML20MD_NS, IDPSSODescriptor::LOCAL_NAME); SecurityPolicy policy(m_metadata, &idprole, m_trust, false); - policy.getRules().assign(m_rules2.begin(), m_rules2.end()); + policy.getRules().assign(m_rules.begin(), m_rules.end()); // Read message to use from file. string path = data_path + "saml2/binding/SAML2Response.xml"; @@ -85,7 +85,7 @@ public: // Test the results. TSM_ASSERT_EQUALS("RelayState was not the expected result.", relayState, "state"); TSM_ASSERT("SAML Response not decoded successfully.", response.get()); - TSM_ASSERT("Message was not verified.", policy.isSecure()); + TSM_ASSERT("Message was not verified.", policy.isAuthenticated()); auto_ptr_char entityID(policy.getIssuer()->getName()); TSM_ASSERT("Issuer was not expected.", !strcmp(entityID.get(),"https://idp.example.org/")); TSM_ASSERT_EQUALS("Assertion count was not correct.", response->getAssertions().size(), 1); @@ -135,7 +135,7 @@ public: sc->setValue(StatusCode::SUCCESS); response->marshall(); SchemaValidators.validate(response.get()); - policy.evaluate(*(response.get()), this, samlconstants::SAML20P_NS); + policy.evaluate(*(response.get()), this); return response.release(); } };