X-Git-Url: http://www.project-moonshot.org/gitweb/?p=shibboleth%2Fcpp-opensaml.git;a=blobdiff_plain;f=saml%2Fbinding%2Fimpl%2FClientCertAuthRule.cpp;h=f1850903fe1c6e88c267d3c04586b2229186e573;hp=4662392acd8e468b2465cafc42f7895e492c140d;hb=bf32f9265ac717ee1537ec442e5a2d54e169d486;hpb=197bcbae7339bc779bc5780882d11fdeb45f8223 diff --git a/saml/binding/impl/ClientCertAuthRule.cpp b/saml/binding/impl/ClientCertAuthRule.cpp index 4662392..f185090 100644 --- a/saml/binding/impl/ClientCertAuthRule.cpp +++ b/saml/binding/impl/ClientCertAuthRule.cpp @@ -55,13 +55,11 @@ namespace opensaml { void ClientCertAuthRule::evaluate(const XMLObject& message, const GenericRequest* request, SecurityPolicy& policy) const { Category& log=Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.ClientCertAuth"); - log.debug("evaluating client certificate authentication policy"); - if (!request) { - log.debug("ignoring message, no protocol request available"); + if (!request) return; - } - else if (!policy.getIssuerMetadata()) { + + if (!policy.getIssuerMetadata()) { log.debug("ignoring message, no issuer metadata supplied"); return; } @@ -73,10 +71,8 @@ void ClientCertAuthRule::evaluate(const XMLObject& message, const GenericRequest } const std::vector& chain = request->getClientCertificates(); - if (chain.empty()) { - log.debug("ignoring message, no client certificates in request"); + if (chain.empty()) return; - } if (!x509trust->validate(chain.front(), chain, *(policy.getIssuerMetadata()), true, policy.getMetadataProvider()->getKeyResolver())) {