const char* getType() const {
return CLIENTCERTAUTH_POLICY_RULE;
}
- void evaluate(const XMLObject& message, const GenericRequest* request, const XMLCh* protocol, SecurityPolicy& policy) const;
+ void evaluate(const XMLObject& message, const GenericRequest* request, SecurityPolicy& policy) const;
};
SecurityPolicyRule* SAML_DLLLOCAL ClientCertAuthRuleFactory(const DOMElement* const & e)
}
};
-void ClientCertAuthRule::evaluate(
- const XMLObject& message, const GenericRequest* request, const XMLCh* protocol, SecurityPolicy& policy
- ) const
+void ClientCertAuthRule::evaluate(const XMLObject& message, const GenericRequest* request, SecurityPolicy& policy) const
{
Category& log=Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.ClientCertAuth");
MetadataCredentialCriteria cc(*(policy.getIssuerMetadata()));
auto_ptr_char pn(policy.getIssuer()->getName());
cc.setPeerName(pn.get());
- cc.setUsage(CredentialCriteria::TLS_CREDENTIAL);
+ cc.setUsage(Credential::TLS_CREDENTIAL);
if (!x509trust->validate(chain.front(), chain, *(policy.getMetadataProvider()), &cc)) {
log.error("unable to verify certificate chain with supplied trust engine");
}
log.debug("client certificate verified against message issuer");
- policy.setSecure(true);
+ policy.setAuthenticated(true);
}