{
int ret=0;
SAMLConfig& conf=SAMLConfig::getConfig();
- bool verify=true;
+ bool verify=true,quiet=false;
char* url_param=NULL;
char* cert_param=NULL;
char* out_param=NULL;
url_param=argv[++i];
else if (!strcmp(argv[i],"--noverify"))
verify=false;
+ else if (!strcmp(argv[i],"--quiet") || !strcmp(argv[i],"-q"))
+ quiet=true;
else if (!strcmp(argv[i],"--cert") && i+1<argc)
cert_param=argv[++i];
else if (!strcmp(argv[i],"--out") && i+1<argc)
"\t[--out <pathname to copy data to>]" << endl <<
"\t[--schema <schema path>]" << endl <<
"\t[--rootns <root element XML namespace>]" << endl <<
- "\t[--rootname <root element name>]" << endl;
+ "\t[--rootname <root element name>]" << endl <<
+ "\t[--quiet]" << endl;
return -100;
}
}
}
else if (rootSig) {
- log.warn("verification of signer disabled, make sure you trust the source of this file!");
+ if (!quiet)
+ log.warn("verification of signer disabled, make sure you trust the source of this file!");
verifySignature(doc,rootSig,cert_param);
}
else {
- log.warn("verification disabled, and file is unsigned!");
+ if (!quiet)
+ log.warn("verification disabled, and file is unsigned!");
}
// Verify all signatures.