auto_ptr<SAMLResponse> r(m_binding->send(*ab, req, conf));
if (r->isSigned() && !t.validate(m_revocations,m_AA,*r))
throw TrustException("ShibBinding::send() unable to verify signed response");
+
+ unsigned long i;
Iterator<SAMLAssertion*> _a=r->getAssertions();
- for (unsigned long i=0; i < _a.size(); i++) {
+ for (i=0; i < _a.size(); i++) {
// Check any conditions.
Iterator<SAMLCondition*> conds=_a[i]->getConditions();
while (conds.hasNext()) {
break;
}
}
-
+ }
+
+ for (i=0; i < _a.size(); i++) {
// Check signature.
if (_a[i]->isSigned() && !t.validate(m_revocations,m_AA,*(_a[i]))) {
log.warn("signed assertion failed to validate, removing it");
if (r->isSigned() && !t.validate(m_revocations,m_AA,*r))
throw TrustException("ShibBinding::send() unable to verify signed response");
+ unsigned long i;
Iterator<SAMLAssertion*> _a=r->getAssertions();
- for (unsigned long i=0; i < _a.size(); i++) {
+ for (i=0; i < _a.size(); i++) {
// Check any conditions.
Iterator<SAMLCondition*> conds=_a[i]->getConditions();
while (conds.hasNext()) {
i--;
}
}
-
+ }
+
+ for (i=0; i < _a.size(); i++) {
// Check signature.
if (_a[i]->isSigned() && !t.validate(m_revocations,m_AA,*(_a[i]))) {
log.warn("signed assertion failed to validate, removing it");