if (!bFound)
throw TrustException(SAMLException::RESPONDER, "ShibPOSTProfile::accept() detected an untrusted HS for the origin site");
- Iterator<XSECCryptoX509*> certs=hs->getCertificates();
+ Trust t;
+ Iterator<XSECCryptoX509*> certs=t.getCertificates(hs->getName());
// Signature verification now takes place. We check the assertion and the response.
// Assertion signing is optional, response signing is mandatory.
const XMLCh* getName() const { return m_name; }
const char* getURL() const { return m_url.get(); }
- Iterator<XSECCryptoX509*> getCertificates() const { return Iterator<XSECCryptoX509*>(); }
private:
const XMLCh* m_name;
{
virtual const XMLCh* getName() const=0;
virtual const char* getURL() const=0;
- virtual saml::Iterator<XSECCryptoX509*> getCertificates() const=0;
virtual ~IAuthority() {}
};