@@ -323,14 +323,14 @@ def is_valid(self, request_data, request_id=None, raise_exceptions=False):
323323 multicerts = idp_data ['x509certMulti' ]['signing' ]
324324
325325 # If find a Signature on the Response, validates it checking the original response
326- if has_signed_response and not OneLogin_Saml2_Utils .validate_sign (self .document , cert , fingerprint , fingerprintalg , xpath = OneLogin_Saml2_Utils .RESPONSE_SIGNATURE_XPATH , multicerts = multicerts , raise_exceptions = False ):
326+ if has_signed_response and not OneLogin_Saml2_Utils .validate_sign (self .document , cert , fingerprint , fingerprintalg , xpath = OneLogin_Saml2_Utils .RESPONSE_SIGNATURE_XPATH , multicerts = multicerts , raise_exceptions = False ):
327327 raise OneLogin_Saml2_ValidationError (
328328 'Signature validation failed. SAML Response rejected' ,
329329 OneLogin_Saml2_ValidationError .INVALID_SIGNATURE
330330 )
331331
332332 document_check_assertion = self .decrypted_document if self .encrypted else self .document
333- if has_signed_assertion and not OneLogin_Saml2_Utils .validate_sign (document_check_assertion , cert , fingerprint , fingerprintalg , xpath = OneLogin_Saml2_Utils .ASSERTION_SIGNATURE_XPATH , multicerts = multicerts , raise_exceptions = False ):
333+ if has_signed_assertion and not OneLogin_Saml2_Utils .validate_sign (document_check_assertion , cert , fingerprint , fingerprintalg , xpath = OneLogin_Saml2_Utils .ASSERTION_SIGNATURE_XPATH , multicerts = multicerts , raise_exceptions = False ):
334334 raise OneLogin_Saml2_ValidationError (
335335 'Signature validation failed. SAML Response rejected' ,
336336 OneLogin_Saml2_ValidationError .INVALID_SIGNATURE
0 commit comments