#ifdef HAVE_GOOD_STL
XMLRevocationImpl::AuthMap::const_iterator c=impl->m_map.find(*name);
if (c!=impl->m_map.end()) {
- if (log.isDebugEnabled()) {
+ if (log.isInfoEnabled()) {
auto_ptr_char temp(*name);
- log.debug("revocation list match on %s",temp.get());
+ log.info("revocation list match on %s",temp.get());
}
return c->second->m_crls;
}
for (vector<XMLRevocationImpl::KeyAuthority*>::const_iterator keyauths=impl->m_keyauths.begin(); keyauths!=impl->m_keyauths.end(); keyauths++) {
for (vector<const XMLCh*>::const_iterator subs=(*keyauths)->m_subjects.begin(); subs!=(*keyauths)->m_subjects.end(); subs++) {
if (!XMLString::compareString(*name,*subs)) {
- if (log.isDebugEnabled()) {
+ if (log.isInfoEnabled()) {
auto_ptr_char temp(*name);
- log.debug("revocation list match on %s",temp.get());
+ log.info("revocation list match on %s",temp.get());
}
return (*keyauths)->m_crls;
}
}
if (impl->m_wildcard) {
- log.debug("no matching revocation list, using wildcard list");
+ log.info("no matching revocation list, using wildcard list");
return impl->m_wildcard->m_crls;
}
- log.debug("no matching revocation list");
+ log.info("no matching revocation list");
return EMPTY(void*);
}
XMLTrustImpl::AuthMap::const_iterator c=impl->m_authMap.find(*name);
if (c!=impl->m_authMap.end()) {
kauth=c->second;
- if (log.isDebugEnabled()) {
+ if (log.isInfoEnabled()) {
auto_ptr_char temp(*name);
- log.debug("KeyAuthority match on %s",temp.get());
+ log.info("KeyAuthority match on %s",temp.get());
}
}
#else
for (vector<const XMLCh*>::const_iterator subs=(*keyauths)->m_subjects.begin(); !kauth && subs!=(*keyauths)->m_subjects.end(); subs++) {
if (!XMLString::compareString(*name,*subs)) {
kauth=*keyauths;
- if (log.isDebugEnabled()) {
+ if (log.isInfoEnabled()) {
auto_ptr_char temp(*name);
- log.debug("KeyAuthority match on %s",temp.get());
+ log.info("KeyAuthority match on %s",temp.get());
}
}
}
continue;
XSECCryptoKey* key=keyResolver.resolveKey(KIL);
if (key) {
- log.debug("found an inline key, trying it...");
+ log.debug("found an inline key descriptor, trying it...");
try {
token.verify(key);
unlock();
- log.info("token verified with inline key, nothing more to verify");
+ log.info("token verified with inline key descriptor, nothing more to verify");
return true;
}
catch (SAMLException& e) {
- log.debug("inline key failed: %s", e.what());
+ log.warn("inline key descriptor failed: %s", e.what());
}
}
else {
XMLTrustImpl::BindMap::const_iterator c=impl->m_bindMap.find(*name);
if (c!=impl->m_bindMap.end()) {
KIL=c->second;
- if (log.isDebugEnabled()) {
+ if (log.isInfoEnabled()) {
auto_ptr_char temp(*name);
- log.debug("KeyInfo match on %s",temp.get());
+ log.info("KeyInfo match on %s",temp.get());
}
}
#else
for (size_t s=0; !KIL && s<(*keybinds)->getSize(); s++) {
if (!XMLString::compareString(*name,(*keybinds)->item(s)->getKeyName())) {
KIL=*keybinds;
- if (log.isDebugEnabled()) {
+ if (log.isInfoEnabled()) {
auto_ptr_char temp(*name);
- log.debug("KeyInfo match on %s",temp.get());
+ log.info("KeyInfo match on %s",temp.get());
}
}
}
return true;
}
catch (SAMLException& e) {
- log.debug("inline key failed: %s", e.what());
+ log.warn("inline key failed: %s", e.what());
}
}
else
}
catch (SAMLException& e) {
unlock();
- log.debug("verification using key inside token failed: %s", e.what());
+ log.warn("verification using key inside token failed: %s", e.what());
return false;
}
X509* x=B64_to_X509(EE.get());
if (!x) {
unlock();
- log.error("unable to decode X.509 signing certificate");
+ log.error("unable to decode X.509 EE certificate");
return false;
}
XMLTrustImpl::AuthMap::const_iterator c=impl->m_authMap.find(*name2);
if (c!=impl->m_authMap.end()) {
kauth=c->second;
- if (log.isDebugEnabled()) {
+ if (log.isInfoEnabled()) {
auto_ptr_char temp(*name2);
- log.debug("KeyAuthority match on %s",temp.get());
+ log.info("KeyAuthority match on %s",temp.get());
}
}
#else
for (vector<const XMLCh*>::const_iterator subs=(*keyauths)->m_subjects.begin(); !kauth && subs!=(*keyauths)->m_subjects.end(); subs++) {
if (!XMLString::compareString(*name2,*subs)) {
kauth=*keyauths;
- if (log.isDebugEnabled()) {
+ if (log.isInfoEnabled()) {
auto_ptr_char temp(*name2);
- log.debug("KeyAuthority match on %s",temp.get());
+ log.info("KeyAuthority match on %s",temp.get());
}
}
}