security/nss/lib/libpkix/pkix/checker/pkix_policychecker.h

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rwxr-xr-x

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 /* This Source Code Form is subject to the terms of the Mozilla Public
michael@0 2 * License, v. 2.0. If a copy of the MPL was not distributed with this
michael@0 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
michael@0 4 /*
michael@0 5 * pkix_policychecker.h
michael@0 6 *
michael@0 7 * Header file for policy checker.
michael@0 8 *
michael@0 9 */
michael@0 10
michael@0 11 #ifndef _PKIX_POLICYCHECKER_H
michael@0 12 #define _PKIX_POLICYCHECKER_H
michael@0 13
michael@0 14 #include "pkix_tools.h"
michael@0 15
michael@0 16 #ifdef __cplusplus
michael@0 17 extern "C" {
michael@0 18 #endif
michael@0 19
michael@0 20 typedef struct PKIX_PolicyCheckerStateStruct PKIX_PolicyCheckerState;
michael@0 21
michael@0 22 struct PKIX_PolicyCheckerStateStruct{
michael@0 23 PKIX_PL_OID *certPoliciesExtension; /* const */
michael@0 24 PKIX_PL_OID *policyMappingsExtension; /* const */
michael@0 25 PKIX_PL_OID *policyConstraintsExtension; /* const */
michael@0 26 PKIX_PL_OID *inhibitAnyPolicyExtension; /* const */
michael@0 27 PKIX_PL_OID *anyPolicyOID; /* const */
michael@0 28 PKIX_Boolean initialIsAnyPolicy; /* const */
michael@0 29 PKIX_PolicyNode *validPolicyTree;
michael@0 30 PKIX_List *userInitialPolicySet; /* immutable */
michael@0 31 PKIX_List *mappedUserInitialPolicySet;
michael@0 32 PKIX_Boolean policyQualifiersRejected;
michael@0 33 PKIX_Boolean initialPolicyMappingInhibit;
michael@0 34 PKIX_Boolean initialExplicitPolicy;
michael@0 35 PKIX_Boolean initialAnyPolicyInhibit;
michael@0 36 PKIX_UInt32 explicitPolicy;
michael@0 37 PKIX_UInt32 inhibitAnyPolicy;
michael@0 38 PKIX_UInt32 policyMapping;
michael@0 39 PKIX_UInt32 numCerts;
michael@0 40 PKIX_UInt32 certsProcessed;
michael@0 41 PKIX_PolicyNode *anyPolicyNodeAtBottom;
michael@0 42 PKIX_PolicyNode *newAnyPolicyNode;
michael@0 43 /*
michael@0 44 * The following variables do not survive from one
michael@0 45 * certificate to the next. They are needed at each
michael@0 46 * level of recursive routines, any by placing them
michael@0 47 * in the state object we can pass fewer arguments.
michael@0 48 */
michael@0 49 PKIX_Boolean certPoliciesCritical;
michael@0 50 PKIX_List *mappedPolicyOIDs;
michael@0 51 };
michael@0 52
michael@0 53 PKIX_Error *
michael@0 54 pkix_PolicyChecker_Initialize(
michael@0 55 PKIX_List *initialPolicies,
michael@0 56 PKIX_Boolean policyQualifiersRejected,
michael@0 57 PKIX_Boolean initialPolicyMappingInhibit,
michael@0 58 PKIX_Boolean initialExplicitPolicy,
michael@0 59 PKIX_Boolean initialAnyPolicyInhibit,
michael@0 60 PKIX_UInt32 numCerts,
michael@0 61 PKIX_CertChainChecker **pChecker,
michael@0 62 void *plContext);
michael@0 63
michael@0 64 /* --Private-Functions-------------------------------------------- */
michael@0 65
michael@0 66 PKIX_Error *
michael@0 67 pkix_PolicyCheckerState_RegisterSelf(void *plContext);
michael@0 68
michael@0 69 #ifdef __cplusplus
michael@0 70 }
michael@0 71 #endif
michael@0 72
michael@0 73 #endif /* _PKIX_POLICYCHECKER_H */

mercurial