X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=samltest%2Fsecurity%2FExplicitKeyTrustEngineTest.h;h=c014404e88608647fdfda50ceaaacd53e43d26c1;hb=5cd3da8d9bd792f4a24372ab8e6d24b8409df41a;hp=a172a49154a77d1a9301451405601bf885039695;hpb=0beb48ce00d0b6a3f177f7d9b48af1870ee92190;p=shibboleth%2Fcpp-opensaml.git diff --git a/samltest/security/ExplicitKeyTrustEngineTest.h b/samltest/security/ExplicitKeyTrustEngineTest.h index a172a49..c014404 100644 --- a/samltest/security/ExplicitKeyTrustEngineTest.h +++ b/samltest/security/ExplicitKeyTrustEngineTest.h @@ -18,8 +18,9 @@ #include #include #include +#include #include -#include +#include using namespace opensaml::saml2; using namespace opensaml::saml2md; @@ -72,7 +73,7 @@ public: janitor2.release(); Locker locker(metadataProvider.get()); - const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor("https://idp.example.org"); + const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria("https://idp.example.org")).first; TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL); RoleDescriptor* role=descriptor->getIDPSSODescriptors().front(); @@ -80,14 +81,19 @@ public: Signature* sig=assertion->getSignature(); TSM_ASSERT("Signature not present", sig!=NULL); - TSM_ASSERT("Signature failed to validate.", trustEngine->validate(*sig, *role, metadataProvider->getKeyResolver())); - descriptor = metadataProvider->getEntityDescriptor("https://idp2.example.org"); + MetadataCredentialCriteria cc(*role); + cc.setPeerName("https://idp.example.org"); + TSM_ASSERT("Signature failed to validate.", dynamic_cast(trustEngine.get())->validate(*sig, *metadataProvider, &cc)); + + descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria("https://idp2.example.org")).first; TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL); role=descriptor->getIDPSSODescriptors().front(); TSM_ASSERT("Role not present", role!=NULL); - TSM_ASSERT("Signature validated.", !trustEngine->validate(*sig, *role, metadataProvider->getKeyResolver())); + MetadataCredentialCriteria cc2(*role); + cc2.setPeerName("https://idp2.example.org"); + TSM_ASSERT("Signature validated.", !dynamic_cast(trustEngine.get())->validate(*sig, *metadataProvider, &cc2)); } };