gecko/security/nss/lib/libpkix/pkix/top/pkix_policychecker.h

107 lines
3.9 KiB
C
Raw Normal View History

2008-06-06 05:40:11 -07:00
/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is the PKIX-C library.
*
* The Initial Developer of the Original Code is
* Sun Microsystems, Inc.
* Portions created by the Initial Developer are
* Copyright 2004-2007 Sun Microsystems, Inc. All Rights Reserved.
*
* Contributor(s):
* Sun Microsystems, Inc.
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
/*
* pkix_policychecker.h
*
* Header file for policy checker.
*
*/
#ifndef _PKIX_POLICYCHECKER_H
#define _PKIX_POLICYCHECKER_H
#include "pkix_tools.h"
#ifdef __cplusplus
extern "C" {
#endif
typedef struct PKIX_PolicyCheckerStateStruct PKIX_PolicyCheckerState;
struct PKIX_PolicyCheckerStateStruct{
PKIX_PL_OID *certPoliciesExtension; /* const */
PKIX_PL_OID *policyMappingsExtension; /* const */
PKIX_PL_OID *policyConstraintsExtension; /* const */
PKIX_PL_OID *inhibitAnyPolicyExtension; /* const */
PKIX_PL_OID *anyPolicyOID; /* const */
PKIX_Boolean initialIsAnyPolicy; /* const */
PKIX_PolicyNode *validPolicyTree;
PKIX_List *userInitialPolicySet; /* immutable */
PKIX_List *mappedUserInitialPolicySet;
PKIX_Boolean policyQualifiersRejected;
PKIX_Boolean initialPolicyMappingInhibit;
PKIX_Boolean initialExplicitPolicy;
PKIX_Boolean initialAnyPolicyInhibit;
PKIX_UInt32 explicitPolicy;
PKIX_UInt32 inhibitAnyPolicy;
PKIX_UInt32 policyMapping;
PKIX_UInt32 numCerts;
PKIX_UInt32 certsProcessed;
PKIX_PolicyNode *anyPolicyNodeAtBottom;
PKIX_PolicyNode *newAnyPolicyNode;
/*
* The following variables do not survive from one
* certificate to the next. They are needed at each
* level of recursive routines, any by placing them
* in the state object we can pass fewer arguments.
*/
PKIX_Boolean certPoliciesCritical;
PKIX_List *mappedPolicyOIDs;
};
PKIX_Error *
pkix_PolicyChecker_Initialize(
PKIX_List *initialPolicies,
PKIX_Boolean policyQualifiersRejected,
PKIX_Boolean initialPolicyMappingInhibit,
PKIX_Boolean initialExplicitPolicy,
PKIX_Boolean initialAnyPolicyInhibit,
PKIX_UInt32 numCerts,
PKIX_CertChainChecker **pChecker,
void *plContext);
/* --Private-Functions-------------------------------------------- */
PKIX_Error *
pkix_PolicyCheckerState_RegisterSelf(void *plContext);
#ifdef __cplusplus
}
#endif
#endif /* _PKIX_POLICYCHECKER_H */