<attribute name="unsetHeaders" type="conf:listOfStrings"/>
<attribute name="metadataAttributePrefix" type="conf:string"/>
<attribute name="attributePrefix" type="conf:string"/>
- <attribute name="requireAuthenticatedCipher" type="boolean"/>
+ <attribute name="requireAuthenticatedEncryption" type="boolean"/>
</attributeGroup>
<attributeGroup name="RelyingPartyGroup">
// With this flag on, we block unauthenticated ciphertext when decrypting,
// unless the protocol was authenticated.
- pair<bool,bool> authenticatedCipher = application.getBool("requireAuthenticatedCipher");
+ pair<bool,bool> authenticatedCipher = application.getBool("requireAuthenticatedEncryption");
if (policy->isAuthenticated())
authenticatedCipher.second = false;
// With this flag on, we block unauthenticated ciphertext when decrypting,
// unless the protocol was authenticated.
- pair<bool,bool> authenticatedCipher = application.getBool("requireAuthenticatedCipher");
+ pair<bool,bool> authenticatedCipher = application.getBool("requireAuthenticatedEncryption");
if (policy->isAuthenticated())
authenticatedCipher.second = false;
// With this flag on, we block unauthenticated ciphertext when decrypting,
// unless the protocol was authenticated.
- pair<bool,bool> requireAuthenticatedCipher = application.getBool("requireAuthenticatedCipher");
+ pair<bool,bool> requireAuthenticatedEncryption = application.getBool("requireAuthenticatedEncryption");
if (alreadySecured)
- requireAuthenticatedCipher.second = false;
+ requireAuthenticatedEncryption.second = false;
// With this flag on, we ignore any unsigned assertions.
const EntityDescriptor* entity = nullptr;
*cr,
application.getRelyingParty(entity)->getXMLString("entityID").second,
mcc.get(),
- requireAuthenticatedCipher.first && requireAuthenticatedCipher.second
+ requireAuthenticatedEncryption.first && requireAuthenticatedEncryption.second
)
);
decrypted = dynamic_pointer_cast<saml2::Assertion>(wrapper);