Init logging.
authorScott Cantor <cantor.2@osu.edu>
Tue, 11 Sep 2007 18:39:57 +0000 (18:39 +0000)
committerScott Cantor <cantor.2@osu.edu>
Tue, 11 Sep 2007 18:39:57 +0000 (18:39 +0000)
samlsign/samlsign.cpp

index d20f256..04ceb52 100644 (file)
@@ -181,11 +181,12 @@ int main(int argc,char* argv[])
         cerr << "either -k or -R option required when signing, see documentation for usage" << endl;
         return -1;
     }
-
+    
+    XMLToolingConfig& xmlconf = XMLToolingConfig::getConfig();
+    xmlconf.log_config();
     SAMLConfig& conf=SAMLConfig::getConfig();
     if (!conf.init())
         return -2;
-    XMLToolingConfig& xmlconf = XMLToolingConfig::getConfig();
     Category& log = Category::getInstance("OpenSAML.Utility.SAMLSign");
 
     int ret = 0;
@@ -279,34 +280,34 @@ int main(int argc,char* argv[])
                 auto_ptr<TrustEngine> trust(buildPlugin(t_param, xmlconf.TrustEngineManager));
                 SignatureTrustEngine* sigtrust = dynamic_cast<SignatureTrustEngine*>(trust.get());
                 if (m_param && rname && issuer) {
-                    if (!protocol) {\r
-                        if (prot)\r
-                            protocol = XMLString::transcode(prot);\r
-                    }\r
-                    if (!protocol) {\r
-                        conf.term();\r
-                        cerr << "use of metadata option requires a protocol option" << endl;\r
-                        return -1;\r
-                    }\r
+                    if (!protocol) {
+                        if (prot)
+                            protocol = XMLString::transcode(prot);
+                    }
+                    if (!protocol) {
+                        conf.term();
+                        cerr << "use of metadata option requires a protocol option" << endl;
+                        return -1;
+                    }
                     auto_ptr<MetadataProvider> metadata(buildPlugin(m_param, conf.MetadataProviderManager));
                     metadata->init();
                     
                     Locker locker(metadata.get());
-                    const EntityDescriptor* entity = metadata->getEntityDescriptor(issuer);\r
-                    if (!entity)\r
-                        throw MetadataException("no metadata found for ($1)", params(1, issuer));\r
-                    const XMLCh* ns = rns ? XMLString::transcode(rns) : samlconstants::SAML20MD_NS;\r
-                    auto_ptr_XMLCh n(rname);\r
-                    QName q(ns, n.get());\r
-                    const RoleDescriptor* role = entity->getRoleDescriptor(q, protocol);\r
-                    if (!role)\r
-                        throw MetadataException("compatible role $1 not found for ($2)", params(2, q.toString().c_str(), issuer));\r
-\r
-                    MetadataCredentialCriteria mcc(*role);\r
-                    if (sigtrust->validate(*signable->getSignature(), *metadata.get(), &mcc))\r
+                    const EntityDescriptor* entity = metadata->getEntityDescriptor(issuer);
+                    if (!entity)
+                        throw MetadataException("no metadata found for ($1)", params(1, issuer));
+                    const XMLCh* ns = rns ? XMLString::transcode(rns) : samlconstants::SAML20MD_NS;
+                    auto_ptr_XMLCh n(rname);
+                    QName q(ns, n.get());
+                    const RoleDescriptor* role = entity->getRoleDescriptor(q, protocol);
+                    if (!role)
+                        throw MetadataException("compatible role $1 not found for ($2)", params(2, q.toString().c_str(), issuer));
+
+                    MetadataCredentialCriteria mcc(*role);
+                    if (sigtrust->validate(*signable->getSignature(), *metadata.get(), &mcc))
                         log.info("successful signature verification");
-                    else\r
-                        throw SignatureException("Unable to verify signature with TrustEngine and supplied metadata.");\r
+                    else
+                        throw SignatureException("Unable to verify signature with TrustEngine and supplied metadata.");
                 }
                 else {
                     // Set up criteria.
@@ -316,10 +317,10 @@ int main(int argc,char* argv[])
                     if (issuer)
                         cc.setPeerName(issuer);
                     DummyCredentialResolver dummy;
-                    if (sigtrust->validate(*signable->getSignature(), dummy, &cc))\r
+                    if (sigtrust->validate(*signable->getSignature(), dummy, &cc))
                         log.info("successful signature verification");
-                    else\r
-                        throw SignatureException("Unable to verify signature with TrustEngine (no metadata supplied).");\r
+                    else
+                        throw SignatureException("Unable to verify signature with TrustEngine (no metadata supplied).");
                 }
             }
         }