summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* Initialize all uninitialized rc variablesBenjamin Dauvergne2010-04-3023-32/+32
|
* Test: only test custom namespace if ID-WSF is enabledBenjamin Dauvergne2010-04-301-1/+2
|
* in lasso_idwsf2_data_service_build_response_msg, allows SOAPFault as responsesBenjamin Dauvergne2010-04-281-15/+17
|
* Fix uninitialized local variableBenjamin Dauvergne2010-04-281-1/+1
|
* in lasso_session_count_assertions, do not emit warning if session is not an ↵Benjamin Dauvergne2010-04-281-3/+3
| | | | object
* SAML 2.0: always restart initial request processing in ↵Benjamin Dauvergne2010-04-271-63/+41
| | | | | | | | | | lasso_logout_build_response_msg * Does it also in process_response_msg if no more assertions are present. * Take into account that lasso_saml20_profile_process_any_response already check for the status code, and so specify finer error code in the cleanup code.
* SAML 2.0: fix lasso_saml20_provider_get_first_http_methodBenjamin Dauvergne2010-04-271-1/+13
| | | | | * LassoServer object can have many roles, use the default role of the remote provider to decide on which to assume.
* SAML 2.0 Logout: in init_request, remove the assertion anywayBenjamin Dauvergne2010-04-271-17/+5
| | | | | | | * lasso/saml-2.0/logout.c: when initiating a logout, if no problem is found, remove the assertion. you can always continue by changing profile->http_request_method to SOAP for example and redo a build_request_msg.
* SAML 2.0: lasso_saml20_profile_process_any_response_msg, change status code ↵Benjamin Dauvergne2010-04-271-5/+13
| | | | checking
* SAML 2.0: lasso_logout_build_response_msg, just verify there is saved data ↵Benjamin Dauvergne2010-04-221-20/+12
| | | | | | | | | from a previous request before switching them * lasso/saml-2.0/logout.c: There is no need to check what the previous remote provider ID was, just that initial_remote_providerID is not NULL in order to switch request, response and remote_providerID.
* Fix wrong change g_free -> lasso_release inside example codeBenjamin Dauvergne2010-04-221-2/+2
|
* Provider: fix problem when reusing the same lists nodes in DescriptorsBenjamin Dauvergne2010-04-221-5/+7
|
* Improve safety by replacing all g_hash_table_destroy use by ↵Benjamin Dauvergne2010-04-227-36/+18
| | | | lasso_release_ghashtable
* Improve safety by replacing all g_list_free use by lasso_release_listBenjamin Dauvergne2010-04-2210-40/+20
|
* Improve safety by replacing all g_string_free use by lasso_release_gstringBenjamin Dauvergne2010-04-225-7/+8
|
* Improve safety by replacing all g_free use by lasso_releaseBenjamin Dauvergne2010-04-2228-85/+87
|
* Start an example listing for an IdP SingleSignOn endpointBenjamin Dauvergne2010-04-221-0/+34
|
* Free xmlSecKeyBenjamin Dauvergne2010-04-221-0/+1
|
* Fix potential SEGFAULT in _lasso_node_free_custom_elementBenjamin Dauvergne2010-04-221-4/+6
|
* Utils: add lasso_assign_listBenjamin Dauvergne2010-04-221-0/+8
|
* Add lasso_release_gstringBenjamin Dauvergne2010-04-221-0/+9
|
* Utils: add lasso_release_ghashtableBenjamin Dauvergne2010-04-221-0/+3
|
* SAML 2.0 Profile: remove unused must_sign variableBenjamin Dauvergne2010-04-221-2/+0
|
* First try to check that objects are fully functionals before proceedingBenjamin Dauvergne2010-04-221-0/+4
|
* Fix potential SEGFAULT of an unknown providerBenjamin Dauvergne2010-04-221-0/+5
|
* SAML 2.0: in lasso_saml20_process_federation, only handle the case of ↵Benjamin Dauvergne2010-04-201-41/+28
| | | | | | | | | | | | | | PERSISTENT format * lasso/saml-2.0/login.c: in lasso_saml20_process_federation: - if no name id format can be found by the request, use the default from the metadata file (first declared NameIDFormat) - instead of checking if format is TRANSIENT, check if it is PERSISTENT, and proceed with the federation, if not just return 0. - return LASSO_PROFILE_ERROR_UNKNOWN_PROVIDER instead of LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND. - in any case, check for consent.
* SAML 2.0: in lasso_saml20_login_validate_request, do not check signature if ↵Benjamin Dauvergne2010-04-201-23/+21
| | | | not necessary
* SAML 2.0: find binding when only AssertionConsumerServiceURL is set, do not ↵Benjamin Dauvergne2010-04-201-31/+69
| | | | check signature on request if asked
* SAML 2.0: add internal method to retrieve the binding for an URLBenjamin Dauvergne2010-04-202-2/+65
|
* Login: add internal function _lasso_login_must_verify_*signatureBenjamin Dauvergne2010-04-202-2/+48
|
* Login: remove symbol markers in example codeBenjamin Dauvergne2010-04-191-8/+8
|
* Fix documentation problemsBenjamin Dauvergne2010-04-198-20/+16
|
* Ameliorate support for lasso_profile_set_signature_verify_hintBenjamin Dauvergne2010-04-166-33/+64
| | | | | | | | | | | | | | | | | | | | * lasso/id-ff/profile.h: - add end symbol for enum LassoProfileSignatureVerifyHint * lasso/id-ff/profile.c: - fix documentation of lasso_profile_set_signature_verify_hint - do not allow to set or return invalid value for the signature_verify_hint attribute. * lasso/saml-2.0/login.c: - handle new enum value * lasso/saml-2.0/profile.c: - handle new enum value - fix missing catch of signature error reporting when signature_verify_hint is IGNORE. * docs/reference/lasso/lasso-sections.txt: - export enums LassoProfileSignatureHint and LassoProfileSignatureVerifyHint * tests/metadata_tests.c: - fix test of all Role enumerations
* Revert "Core: add XML schemas for SAML 2.0"Benjamin Dauvergne2010-04-0633-4345/+0
| | | | This reverts commit 5250c2c89e3983189a3c52cd85ad221ff7b6f64b.
* SAML 2.0: add Destination attribute to requestsBenjamin Dauvergne2010-04-061-0/+5
| | | | | | | | * lasso/saml-2.0/profile.c: this change make Lasso respect paragraphs 3.4.5.2 (HTTP-Redirect binding securit considerations ) and 3.5.5.2 (the same for HTTP-Post) of the saml-bindings-2.0-os.pdf document, and should allow our Authn Requests to be accepted by shiboleth IdP.
* Tools: add usage statement to check-lasso-sections.pyBenjamin Dauvergne2010-04-061-0/+3
|
* Docs: add/remove symbols from lasso-sections.txtBenjamin Dauvergne2010-04-061-1/+2
|
* ID-WSF 2.0 DST: make lasso_idwsf2_data_service_set_status_code works event ↵Benjamin Dauvergne2010-04-061-24/+28
| | | | if no response is initialized
* Tests: add tests for custom namespace functionsBenjamin Dauvergne2010-04-061-0/+44
|
* ID-FF 1.2 & SAML 2.0: factorize access to role prefixBenjamin Dauvergne2010-04-061-13/+23
|
* Tests: make role descriptor loading test less verboseBenjamin Dauvergne2010-04-061-3/+8
| | | | | * tests/metadata_tests.c: remove printf, add checks
* Tests: show actual value in check_equals test macroBenjamin Dauvergne2010-04-061-1/+1
|
* XML: add custom namespace definition handlingBenjamin Dauvergne2010-04-063-0/+53
|
* SAML 2.0: fix default assertion consumer handling when isDefault is missingBenjamin Dauvergne2010-04-061-1/+69
| | | | | | * if no default_assertion_consumer value is set after traversing the list of endpoint, try to find the first one without isDefault="false" and finally take the first one.
* SAML 2.0: fix default assertion consumer handlingBenjamin Dauvergne2010-04-061-1/+1
| | | | | * the default one is the first with the attribute isDefault not the last.
* Binding python tests: update idwsf1 to explicitely register PP10 HREFBenjamin Dauvergne2010-04-061-0/+1
|
* Binding python: update idwsf2 test for method change dst.initResponse -> ↵Benjamin Dauvergne2010-04-061-1/+1
| | | | validateRequest
* XML: do not register any DST namespace by defaultBenjamin Dauvergne2010-04-061-7/+0
|
* XML: add a SNIPPET_COLLECT_NAMESPACES snippet to DstRefResultQueryBenjamin Dauvergne2010-04-063-5/+9
|
* ID-WSF 2.0 Data Service: new accessor, fix use of build_unique_id, change ↵Benjamin Dauvergne2010-04-063-3/+45
| | | | init_response to validate_request