From c0f294ce42b72787a14d91e0ca340abc71844051 Mon Sep 17 00:00:00 2001 From: Scott Cantor Date: Fri, 20 Jul 2012 20:12:06 +0000 Subject: [PATCH] Rename authenticatedCipher option. --- schemas/shibboleth-2.0-native-sp-config.xsd | 2 +- shibsp/attribute/resolver/impl/QueryAttributeResolver.cpp | 2 +- .../attribute/resolver/impl/SimpleAggregationAttributeResolver.cpp | 2 +- shibsp/handler/impl/SAML2Consumer.cpp | 6 +++--- 4 files changed, 6 insertions(+), 6 deletions(-) diff --git a/schemas/shibboleth-2.0-native-sp-config.xsd b/schemas/shibboleth-2.0-native-sp-config.xsd index 7fb84f0..d398e7e 100644 --- a/schemas/shibboleth-2.0-native-sp-config.xsd +++ b/schemas/shibboleth-2.0-native-sp-config.xsd @@ -444,7 +444,7 @@ - + diff --git a/shibsp/attribute/resolver/impl/QueryAttributeResolver.cpp b/shibsp/attribute/resolver/impl/QueryAttributeResolver.cpp index 402dfba..a9e4dc4 100644 --- a/shibsp/attribute/resolver/impl/QueryAttributeResolver.cpp +++ b/shibsp/attribute/resolver/impl/QueryAttributeResolver.cpp @@ -561,7 +561,7 @@ void QueryResolver::SAML2Query(QueryContext& ctx) const // With this flag on, we block unauthenticated ciphertext when decrypting, // unless the protocol was authenticated. - pair authenticatedCipher = application.getBool("requireAuthenticatedCipher"); + pair authenticatedCipher = application.getBool("requireAuthenticatedEncryption"); if (policy->isAuthenticated()) authenticatedCipher.second = false; diff --git a/shibsp/attribute/resolver/impl/SimpleAggregationAttributeResolver.cpp b/shibsp/attribute/resolver/impl/SimpleAggregationAttributeResolver.cpp index f21e75f..fb52752 100644 --- a/shibsp/attribute/resolver/impl/SimpleAggregationAttributeResolver.cpp +++ b/shibsp/attribute/resolver/impl/SimpleAggregationAttributeResolver.cpp @@ -465,7 +465,7 @@ void SimpleAggregationResolver::doQuery(SimpleAggregationContext& ctx, const cha // With this flag on, we block unauthenticated ciphertext when decrypting, // unless the protocol was authenticated. - pair authenticatedCipher = application.getBool("requireAuthenticatedCipher"); + pair authenticatedCipher = application.getBool("requireAuthenticatedEncryption"); if (policy->isAuthenticated()) authenticatedCipher.second = false; diff --git a/shibsp/handler/impl/SAML2Consumer.cpp b/shibsp/handler/impl/SAML2Consumer.cpp index f90f7ca..ec62384 100644 --- a/shibsp/handler/impl/SAML2Consumer.cpp +++ b/shibsp/handler/impl/SAML2Consumer.cpp @@ -170,9 +170,9 @@ void SAML2Consumer::implementProtocol( // With this flag on, we block unauthenticated ciphertext when decrypting, // unless the protocol was authenticated. - pair requireAuthenticatedCipher = application.getBool("requireAuthenticatedCipher"); + pair requireAuthenticatedEncryption = application.getBool("requireAuthenticatedEncryption"); if (alreadySecured) - requireAuthenticatedCipher.second = false; + requireAuthenticatedEncryption.second = false; // With this flag on, we ignore any unsigned assertions. const EntityDescriptor* entity = nullptr; @@ -291,7 +291,7 @@ void SAML2Consumer::implementProtocol( *cr, application.getRelyingParty(entity)->getXMLString("entityID").second, mcc.get(), - requireAuthenticatedCipher.first && requireAuthenticatedCipher.second + requireAuthenticatedEncryption.first && requireAuthenticatedEncryption.second ) ); decrypted = dynamic_pointer_cast(wrapper); -- 2.1.4