https://issues.shibboleth.net/jira/browse/SSPCPP-200
authorScott Cantor <cantor.2@osu.edu>
Mon, 20 Apr 2009 19:17:23 +0000 (19:17 +0000)
committerScott Cantor <cantor.2@osu.edu>
Mon, 20 Apr 2009 19:17:23 +0000 (19:17 +0000)
adfs/adfs.cpp
shibsp/handler/impl/SAML1Consumer.cpp
shibsp/handler/impl/SAML2Consumer.cpp

index c002b2f..a2d50e3 100644 (file)
@@ -619,7 +619,7 @@ void ADFSConsumer::implementProtocol(
 
     // Run the policy over the assertion. Handles replay, freshness, and
     // signature verification, assuming the relevant rules are configured.
-    policy.evaluate(*token);
+    policy.evaluate(*token, &httpRequest);
 
     // If no security is in place now, we kick it.
     if (!policy.isAuthenticated())
index 30c059d..239d7d2 100644 (file)
@@ -205,7 +205,7 @@ void SAML1Consumer::implementProtocol(
             // Run the policy over the assertion. Handles replay, freshness, and
             // signature verification, assuming the relevant rules are configured,
             // along with condition and profile enforcement.
-            policy.evaluate(*(*a));
+            policy.evaluate(*(*a), &httpRequest);
 
             // If no security is in place now, we kick it.
             if (!alreadySecured && !policy.isAuthenticated())
index 8dc51e5..532c0ac 100644 (file)
@@ -195,7 +195,7 @@ void SAML2Consumer::implementProtocol(
             // Run the policy over the assertion. Handles replay, freshness, and
             // signature verification, assuming the relevant rules are configured,
             // along with condition and profile enforcement.
-            policy.evaluate(*(*a));
+            policy.evaluate(*(*a), &httpRequest);
 
             // If no security is in place now, we kick it.
             if (!alreadySecured && !policy.isAuthenticated())
@@ -284,7 +284,7 @@ void SAML2Consumer::implementProtocol(
             // We have to marshall the object first to ensure signatures can be checked.
             if (!decrypted->getDOM())
                 decrypted->marshall();
-            policy.evaluate(*decrypted);
+            policy.evaluate(*decrypted, &httpRequest);
 
             // If no security is in place now, we kick it.
             if (!alreadySecured && !policy.isAuthenticated())