Skip to content

Commit edfd11c

Browse files
committed
pep8
1 parent 55ea299 commit edfd11c

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

src/onelogin/saml2/response.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -323,14 +323,14 @@ def is_valid(self, request_data, request_id=None, raise_exceptions=False):
323323
multicerts = idp_data['x509certMulti']['signing']
324324

325325
# If find a Signature on the Response, validates it checking the original response
326-
if has_signed_response and not OneLogin_Saml2_Utils.validate_sign(self.document, cert, fingerprint, fingerprintalg, xpath=OneLogin_Saml2_Utils.RESPONSE_SIGNATURE_XPATH, multicerts=multicerts, raise_exceptions=False):
326+
if has_signed_response and not OneLogin_Saml2_Utils.validate_sign(self.document, cert, fingerprint, fingerprintalg, xpath=OneLogin_Saml2_Utils.RESPONSE_SIGNATURE_XPATH, multicerts=multicerts, raise_exceptions=False):
327327
raise OneLogin_Saml2_ValidationError(
328328
'Signature validation failed. SAML Response rejected',
329329
OneLogin_Saml2_ValidationError.INVALID_SIGNATURE
330330
)
331331

332332
document_check_assertion = self.decrypted_document if self.encrypted else self.document
333-
if has_signed_assertion and not OneLogin_Saml2_Utils.validate_sign(document_check_assertion, cert, fingerprint, fingerprintalg, xpath=OneLogin_Saml2_Utils.ASSERTION_SIGNATURE_XPATH, multicerts=multicerts, raise_exceptions=False):
333+
if has_signed_assertion and not OneLogin_Saml2_Utils.validate_sign(document_check_assertion, cert, fingerprint, fingerprintalg, xpath=OneLogin_Saml2_Utils.ASSERTION_SIGNATURE_XPATH, multicerts=multicerts, raise_exceptions=False):
334334
raise OneLogin_Saml2_ValidationError(
335335
'Signature validation failed. SAML Response rejected',
336336
OneLogin_Saml2_ValidationError.INVALID_SIGNATURE

0 commit comments

Comments
 (0)