Commit 36480e5
committed
Refactor the decrypt function
This allows for the decryption of the Dutch eHerkenning SAML implementation.
The logic is as follows:
Find all the EncryptedKey nodes in the XML and loop over these nodes. Because
the encrypted data belongs to the same grandparent
(keyNode->parentNode->parentNode) we can get the encrypted node and decrypt it
based on the key. That is if it is signed against our key.
A similar approach is taken for nodes which have a RetrievalMethod element.
Signed-off-by: Wesley Schwengle <waterkip@cpan.org>1 parent 5115344 commit 36480e5
File tree
5 files changed
+350
-228
lines changed- lib/XML
- t
5 files changed
+350
-228
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
24 | 24 | | |
25 | 25 | | |
26 | 26 | | |
| 27 | + | |
27 | 28 | | |
28 | 29 | | |
29 | 30 | | |
| |||
38 | 39 | | |
39 | 40 | | |
40 | 41 | | |
41 | | - | |
| 42 | + | |
42 | 43 | | |
43 | 44 | | |
44 | 45 | | |
| |||
61 | 62 | | |
62 | 63 | | |
63 | 64 | | |
| 65 | + | |
64 | 66 | | |
65 | 67 | | |
66 | 68 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
2 | 2 | | |
3 | 3 | | |
4 | 4 | | |
5 | | - | |
| 5 | + | |
6 | 6 | | |
7 | 7 | | |
8 | 8 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
8 | 8 | | |
9 | 9 | | |
10 | 10 | | |
| 11 | + | |
11 | 12 | | |
12 | 13 | | |
13 | 14 | | |
| |||
0 commit comments