X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=samltest%2Fsaml2%2Fbinding%2FSAML2ArtifactTest.h;h=1c390e76355e6e2c90a31dea87e42f486fba5cef;hb=e9554c255ad3c91c7c4976e7a1a54905903e66a2;hp=9482d40a0a26d5ceabb776d072728b2270b08697;hpb=11cd3b15c71ee22f2818d810a17c213123e8c248;p=shibboleth%2Fcpp-opensaml.git diff --git a/samltest/saml2/binding/SAML2ArtifactTest.h b/samltest/saml2/binding/SAML2ArtifactTest.h index 9482d40..1c390e7 100644 --- a/samltest/saml2/binding/SAML2ArtifactTest.h +++ b/samltest/saml2/binding/SAML2ArtifactTest.h @@ -1,5 +1,5 @@ /* - * Copyright 2001-2007 Internet2 + * Copyright 2001-2010 Internet2 * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -19,6 +19,7 @@ #include #include #include +#include #include using namespace opensaml::saml2p; @@ -37,8 +38,9 @@ public: void testSAML2Artifact() { try { - QName idprole(samlconstants::SAML20MD_NS, IDPSSODescriptor::LOCAL_NAME); - SecurityPolicy policy(m_rules2, m_metadata, &idprole, m_trust, false); + xmltooling::QName idprole(samlconstants::SAML20MD_NS, IDPSSODescriptor::LOCAL_NAME); + SecurityPolicy policy(m_metadata, &idprole, m_trust, false); + policy.getRules().assign(m_rules.begin(), m_rules.end()); // Read message to use from file. string path = data_path + "saml2/binding/SAML2Response.xml"; @@ -51,23 +53,29 @@ public: janitor.release(); CredentialCriteria cc; - cc.setUsage(CredentialCriteria::SIGNING_CREDENTIAL); + cc.setUsage(Credential::SIGNING_CREDENTIAL); Locker clocker(m_creds); const Credential* cred = m_creds->resolve(&cc); - TSM_ASSERT("Retrieved credential was null", cred!=NULL); + TSM_ASSERT("Retrieved credential was null", cred!=nullptr); // Freshen timestamp. - toSend->setIssueInstant(time(NULL)); + toSend->setIssueInstant(time(nullptr)); // Encode message. auto_ptr encoder( SAMLConfig::getConfig().MessageEncoderManager.newPlugin( - samlconstants::SAML20_BINDING_HTTP_ARTIFACT, pair(NULL,NULL) + samlconstants::SAML20_BINDING_HTTP_ARTIFACT, pair(nullptr,nullptr) ) ); Locker locker(m_metadata); encoder->encode( - *this,toSend.get(),"https://sp.example.org/SAML/SSO",m_metadata->getEntityDescriptor("https://sp.example.org/"),"state",this,cred + *this, + toSend.get(), + "https://sp.example.org/SAML/SSO", + m_metadata->getEntityDescriptor(MetadataProvider::Criteria("https://sp.example.org/")).first, + "state", + this, + cred ); toSend.release(); @@ -75,7 +83,7 @@ public: string relayState; auto_ptr decoder( SAMLConfig::getConfig().MessageDecoderManager.newPlugin( - samlconstants::SAML20_BINDING_HTTP_ARTIFACT, pair(NULL,NULL) + samlconstants::SAML20_BINDING_HTTP_ARTIFACT, pair(nullptr,nullptr) ) ); decoder->setArtifactResolver(this); @@ -84,7 +92,7 @@ public: // Test the results. TSM_ASSERT_EQUALS("RelayState was not the expected result.", relayState, "state"); TSM_ASSERT("SAML Response not decoded successfully.", response.get()); - TSM_ASSERT("Message was not verified.", policy.isSecure()); + TSM_ASSERT("Message was not verified.", policy.isAuthenticated()); auto_ptr_char entityID(policy.getIssuer()->getName()); TSM_ASSERT("Issuer was not expected.", !strcmp(entityID.get(),"https://idp.example.org/")); TSM_ASSERT_EQUALS("Assertion count was not correct.", response->getAssertions().size(), 1); @@ -104,7 +112,10 @@ public: } saml2p::SAML2Artifact* generateSAML2Artifact(const EntityDescriptor* relyingParty) const { - return new SAML2ArtifactType0004(SAMLConfig::getConfig().hashSHA1("https://idp.example.org/"),1); + static const char* providerIdStr = "https://idp.example.org/"; + return new SAML2ArtifactType0004( + SecurityHelper::doHash("SHA1", providerIdStr, strlen(providerIdStr), false), 1 + ); } saml1p::Response* resolve( @@ -123,7 +134,7 @@ public: XMLObject* xmlObject = SAMLConfig::getConfig().getArtifactMap()->retrieveContent(&artifact, "https://sp.example.org/"); Response* payload = dynamic_cast(xmlObject); - TSM_ASSERT("Not a response.", payload!=NULL); + TSM_ASSERT("Not a response.", payload!=nullptr); auto_ptr response(ArtifactResponseBuilder::buildArtifactResponse()); response->setPayload(payload);