Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 2 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 3 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 4 | /* |
michael@0 | 5 | * pkix_policychecker.h |
michael@0 | 6 | * |
michael@0 | 7 | * Header file for policy checker. |
michael@0 | 8 | * |
michael@0 | 9 | */ |
michael@0 | 10 | |
michael@0 | 11 | #ifndef _PKIX_POLICYCHECKER_H |
michael@0 | 12 | #define _PKIX_POLICYCHECKER_H |
michael@0 | 13 | |
michael@0 | 14 | #include "pkix_tools.h" |
michael@0 | 15 | |
michael@0 | 16 | #ifdef __cplusplus |
michael@0 | 17 | extern "C" { |
michael@0 | 18 | #endif |
michael@0 | 19 | |
michael@0 | 20 | typedef struct PKIX_PolicyCheckerStateStruct PKIX_PolicyCheckerState; |
michael@0 | 21 | |
michael@0 | 22 | struct PKIX_PolicyCheckerStateStruct{ |
michael@0 | 23 | PKIX_PL_OID *certPoliciesExtension; /* const */ |
michael@0 | 24 | PKIX_PL_OID *policyMappingsExtension; /* const */ |
michael@0 | 25 | PKIX_PL_OID *policyConstraintsExtension; /* const */ |
michael@0 | 26 | PKIX_PL_OID *inhibitAnyPolicyExtension; /* const */ |
michael@0 | 27 | PKIX_PL_OID *anyPolicyOID; /* const */ |
michael@0 | 28 | PKIX_Boolean initialIsAnyPolicy; /* const */ |
michael@0 | 29 | PKIX_PolicyNode *validPolicyTree; |
michael@0 | 30 | PKIX_List *userInitialPolicySet; /* immutable */ |
michael@0 | 31 | PKIX_List *mappedUserInitialPolicySet; |
michael@0 | 32 | PKIX_Boolean policyQualifiersRejected; |
michael@0 | 33 | PKIX_Boolean initialPolicyMappingInhibit; |
michael@0 | 34 | PKIX_Boolean initialExplicitPolicy; |
michael@0 | 35 | PKIX_Boolean initialAnyPolicyInhibit; |
michael@0 | 36 | PKIX_UInt32 explicitPolicy; |
michael@0 | 37 | PKIX_UInt32 inhibitAnyPolicy; |
michael@0 | 38 | PKIX_UInt32 policyMapping; |
michael@0 | 39 | PKIX_UInt32 numCerts; |
michael@0 | 40 | PKIX_UInt32 certsProcessed; |
michael@0 | 41 | PKIX_PolicyNode *anyPolicyNodeAtBottom; |
michael@0 | 42 | PKIX_PolicyNode *newAnyPolicyNode; |
michael@0 | 43 | /* |
michael@0 | 44 | * The following variables do not survive from one |
michael@0 | 45 | * certificate to the next. They are needed at each |
michael@0 | 46 | * level of recursive routines, any by placing them |
michael@0 | 47 | * in the state object we can pass fewer arguments. |
michael@0 | 48 | */ |
michael@0 | 49 | PKIX_Boolean certPoliciesCritical; |
michael@0 | 50 | PKIX_List *mappedPolicyOIDs; |
michael@0 | 51 | }; |
michael@0 | 52 | |
michael@0 | 53 | PKIX_Error * |
michael@0 | 54 | pkix_PolicyChecker_Initialize( |
michael@0 | 55 | PKIX_List *initialPolicies, |
michael@0 | 56 | PKIX_Boolean policyQualifiersRejected, |
michael@0 | 57 | PKIX_Boolean initialPolicyMappingInhibit, |
michael@0 | 58 | PKIX_Boolean initialExplicitPolicy, |
michael@0 | 59 | PKIX_Boolean initialAnyPolicyInhibit, |
michael@0 | 60 | PKIX_UInt32 numCerts, |
michael@0 | 61 | PKIX_CertChainChecker **pChecker, |
michael@0 | 62 | void *plContext); |
michael@0 | 63 | |
michael@0 | 64 | /* --Private-Functions-------------------------------------------- */ |
michael@0 | 65 | |
michael@0 | 66 | PKIX_Error * |
michael@0 | 67 | pkix_PolicyCheckerState_RegisterSelf(void *plContext); |
michael@0 | 68 | |
michael@0 | 69 | #ifdef __cplusplus |
michael@0 | 70 | } |
michael@0 | 71 | #endif |
michael@0 | 72 | |
michael@0 | 73 | #endif /* _PKIX_POLICYCHECKER_H */ |