Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
4 /*
5 * pkix_targetcertchecker.h
6 *
7 * Header file for validate target cert function
8 *
9 */
11 #ifndef _PKIX_TARGETCERTCHECKER_H
12 #define _PKIX_TARGETCERTCHECKER_H
14 #include "pkix_tools.h"
16 #ifdef __cplusplus
17 extern "C" {
18 #endif
20 typedef struct pkix_TargetCertCheckerState pkix_TargetCertCheckerState;
22 struct pkix_TargetCertCheckerState {
23 PKIX_CertSelector *certSelector;
24 PKIX_List *pathToNameList;
25 PKIX_List *extKeyUsageList; /* List of PKIX_PL_OID */
26 PKIX_List *subjAltNameList;
27 PKIX_Boolean subjAltNameMatchAll;
28 PKIX_UInt32 certsRemaining;
29 PKIX_PL_OID *extKeyUsageOID;
30 PKIX_PL_OID *subjAltNameOID;
31 };
33 PKIX_Error *
34 pkix_TargetCertChecker_Initialize(
35 PKIX_CertSelector *certSelector,
36 PKIX_UInt32 certsRemaining,
37 PKIX_CertChainChecker **pChecker,
38 void *plContext);
40 PKIX_Error *
41 pkix_TargetCertCheckerState_RegisterSelf(void *plContext);
43 #ifdef __cplusplus
44 }
45 #endif
47 #endif /* _PKIX_TARGETCERTCHECKER_H */