Index: nss/lib/certdb/secname.c |
diff --git a/nss/lib/certdb/secname.c b/nss/lib/certdb/secname.c |
index 88a0cf75ef3ccb90b7a28cfce86e50ae56c9ab15..1fcae97762f2eef9adc1490659a921f7844130b0 100644 |
--- a/nss/lib/certdb/secname.c |
+++ b/nss/lib/certdb/secname.c |
@@ -4,7 +4,7 @@ |
#include "cert.h" |
#include "secoid.h" |
-#include "secder.h" /* XXX remove this when remove the DERTemplates */ |
+#include "secder.h" /* XXX remove this when remove the DERTemplates */ |
#include "secasn1.h" |
#include "secitem.h" |
#include <stdarg.h> |
@@ -12,29 +12,25 @@ |
#include "certi.h" |
static const SEC_ASN1Template cert_AVATemplate[] = { |
- { SEC_ASN1_SEQUENCE, |
- 0, NULL, sizeof(CERTAVA) }, |
- { SEC_ASN1_OBJECT_ID, |
- offsetof(CERTAVA,type), }, |
- { SEC_ASN1_ANY, |
- offsetof(CERTAVA,value), }, |
- { 0, } |
+ { SEC_ASN1_SEQUENCE, 0, NULL, sizeof(CERTAVA) }, |
+ { SEC_ASN1_OBJECT_ID, offsetof(CERTAVA, type) }, |
+ { SEC_ASN1_ANY, offsetof(CERTAVA, value) }, |
+ { 0 } |
}; |
const SEC_ASN1Template CERT_RDNTemplate[] = { |
- { SEC_ASN1_SET_OF, |
- offsetof(CERTRDN,avas), cert_AVATemplate, sizeof(CERTRDN) } |
+ { SEC_ASN1_SET_OF, offsetof(CERTRDN, avas), cert_AVATemplate, |
+ sizeof(CERTRDN) } |
}; |
- |
static int |
CountArray(void **array) |
{ |
int count = 0; |
if (array) { |
- while (*array++) { |
- count++; |
- } |
+ while (*array++) { |
+ count++; |
+ } |
} |
return count; |
} |
@@ -49,36 +45,36 @@ AddToArray(PLArenaPool *arena, void **array, void *element) |
count = 0; |
ap = array; |
if (ap) { |
- while (*ap++) { |
- count++; |
- } |
+ while (*ap++) { |
+ count++; |
+ } |
} |
if (array) { |
- array = (void**) PORT_ArenaGrow(arena, array, |
- (count + 1) * sizeof(void *), |
- (count + 2) * sizeof(void *)); |
+ array = |
+ (void **)PORT_ArenaGrow(arena, array, (count + 1) * sizeof(void *), |
+ (count + 2) * sizeof(void *)); |
} else { |
- array = (void**) PORT_ArenaAlloc(arena, (count + 2) * sizeof(void *)); |
+ array = (void **)PORT_ArenaAlloc(arena, (count + 2) * sizeof(void *)); |
} |
if (array) { |
- array[count] = element; |
- array[count+1] = 0; |
+ array[count] = element; |
+ array[count + 1] = 0; |
} |
return array; |
} |
- |
SECOidTag |
CERT_GetAVATag(CERTAVA *ava) |
{ |
SECOidData *oid; |
- if (!ava->type.data) return (SECOidTag)-1; |
+ if (!ava->type.data) |
+ return (SECOidTag)-1; |
oid = SECOID_FindOID(&ava->type); |
- |
- if ( oid ) { |
- return(oid->offset); |
+ |
+ if (oid) { |
+ return (oid->offset); |
} |
return (SECOidTag)-1; |
} |
@@ -89,25 +85,25 @@ SetupAVAType(PLArenaPool *arena, SECOidTag type, SECItem *it, unsigned *maxLenp) |
unsigned char *oid; |
unsigned oidLen; |
unsigned char *cp; |
- int maxLen; |
+ int maxLen; |
SECOidData *oidrec; |
oidrec = SECOID_FindOIDByTag(type); |
if (oidrec == NULL) |
- return SECFailure; |
+ return SECFailure; |
oid = oidrec->oid.data; |
oidLen = oidrec->oid.len; |
maxLen = cert_AVAOidTagToMaxLen(type); |
if (maxLen < 0) { |
- PORT_SetError(SEC_ERROR_INVALID_ARGS); |
- return SECFailure; |
+ PORT_SetError(SEC_ERROR_INVALID_ARGS); |
+ return SECFailure; |
} |
- it->data = cp = (unsigned char*) PORT_ArenaAlloc(arena, oidLen); |
+ it->data = cp = (unsigned char *)PORT_ArenaAlloc(arena, oidLen); |
if (cp == NULL) { |
- return SECFailure; |
+ return SECFailure; |
} |
it->len = oidLen; |
PORT_Memcpy(cp, oid, oidLen); |
@@ -123,65 +119,66 @@ SetupAVAValue(PLArenaPool *arena, int valueType, const SECItem *in, |
unsigned valueLen, valueLenLen, total; |
unsigned ucs4Len = 0, ucs4MaxLen; |
- value = in->data; |
+ value = in->data; |
valueLen = in->len; |
switch (valueType) { |
- case SEC_ASN1_PRINTABLE_STRING: |
- case SEC_ASN1_IA5_STRING: |
- case SEC_ASN1_T61_STRING: |
- case SEC_ASN1_UTF8_STRING: /* no conversion required */ |
- break; |
- case SEC_ASN1_UNIVERSAL_STRING: |
- ucs4MaxLen = valueLen * 6; |
- ucs4Val = (PRUint8 *)PORT_ArenaZAlloc(arena, ucs4MaxLen); |
- if(!ucs4Val || !PORT_UCS4_UTF8Conversion(PR_TRUE, value, valueLen, |
- ucs4Val, ucs4MaxLen, &ucs4Len)) { |
- PORT_SetError(SEC_ERROR_INVALID_ARGS); |
- return SECFailure; |
- } |
- value = ucs4Val; |
- valueLen = ucs4Len; |
- maxLen *= 4; |
- break; |
- default: |
- PORT_SetError(SEC_ERROR_INVALID_ARGS); |
- return SECFailure; |
+ case SEC_ASN1_PRINTABLE_STRING: |
+ case SEC_ASN1_IA5_STRING: |
+ case SEC_ASN1_T61_STRING: |
+ case SEC_ASN1_UTF8_STRING: /* no conversion required */ |
+ break; |
+ case SEC_ASN1_UNIVERSAL_STRING: |
+ ucs4MaxLen = valueLen * 6; |
+ ucs4Val = (PRUint8 *)PORT_ArenaZAlloc(arena, ucs4MaxLen); |
+ if (!ucs4Val || |
+ !PORT_UCS4_UTF8Conversion(PR_TRUE, value, valueLen, ucs4Val, |
+ ucs4MaxLen, &ucs4Len)) { |
+ PORT_SetError(SEC_ERROR_INVALID_ARGS); |
+ return SECFailure; |
+ } |
+ value = ucs4Val; |
+ valueLen = ucs4Len; |
+ maxLen *= 4; |
+ break; |
+ default: |
+ PORT_SetError(SEC_ERROR_INVALID_ARGS); |
+ return SECFailure; |
} |
if (valueLen > maxLen) { |
- PORT_SetError(SEC_ERROR_INVALID_ARGS); |
- return SECFailure; |
- } |
+ PORT_SetError(SEC_ERROR_INVALID_ARGS); |
+ return SECFailure; |
+ } |
valueLenLen = DER_LengthLength(valueLen); |
total = 1 + valueLenLen + valueLen; |
- cp = (PRUint8*)PORT_ArenaAlloc(arena, total); |
+ cp = (PRUint8 *)PORT_ArenaAlloc(arena, total); |
if (!cp) { |
- return SECFailure; |
+ return SECFailure; |
} |
out->data = cp; |
- out->len = total; |
+ out->len = total; |
cp = (PRUint8 *)DER_StoreHeader(cp, valueType, valueLen); |
PORT_Memcpy(cp, value, valueLen); |
return SECSuccess; |
} |
CERTAVA * |
-CERT_CreateAVAFromRaw(PLArenaPool *pool, const SECItem * OID, |
- const SECItem * value) |
+CERT_CreateAVAFromRaw(PLArenaPool *pool, const SECItem *OID, |
+ const SECItem *value) |
{ |
CERTAVA *ava; |
int rv; |
ava = PORT_ArenaZNew(pool, CERTAVA); |
if (ava) { |
- rv = SECITEM_CopyItem(pool, &ava->type, OID); |
- if (rv) |
- return NULL; |
+ rv = SECITEM_CopyItem(pool, &ava->type, OID); |
+ if (rv) |
+ return NULL; |
- rv = SECITEM_CopyItem(pool, &ava->value, value); |
- if (rv) |
- return NULL; |
+ rv = SECITEM_CopyItem(pool, &ava->value, value); |
+ if (rv) |
+ return NULL; |
} |
return ava; |
} |
@@ -194,18 +191,18 @@ CERT_CreateAVAFromSECItem(PLArenaPool *arena, SECOidTag kind, int valueType, |
int rv; |
unsigned maxLen; |
- ava = (CERTAVA*) PORT_ArenaZAlloc(arena, sizeof(CERTAVA)); |
+ ava = (CERTAVA *)PORT_ArenaZAlloc(arena, sizeof(CERTAVA)); |
if (ava) { |
- rv = SetupAVAType(arena, kind, &ava->type, &maxLen); |
- if (rv) { |
- /* Illegal AVA type */ |
- return NULL; |
- } |
- rv = SetupAVAValue(arena, valueType, value, &ava->value, maxLen); |
- if (rv) { |
- /* Illegal value type */ |
- return NULL; |
- } |
+ rv = SetupAVAType(arena, kind, &ava->type, &maxLen); |
+ if (rv) { |
+ /* Illegal AVA type */ |
+ return NULL; |
+ } |
+ rv = SetupAVAValue(arena, valueType, value, &ava->value, maxLen); |
+ if (rv) { |
+ /* Illegal value type */ |
+ return NULL; |
+ } |
} |
return ava; |
} |
@@ -216,7 +213,7 @@ CERT_CreateAVA(PLArenaPool *arena, SECOidTag kind, int valueType, char *value) |
SECItem item = { siBuffer, NULL, 0 }; |
item.data = (PRUint8 *)value; |
- item.len = PORT_Strlen(value); |
+ item.len = PORT_Strlen(value); |
return CERT_CreateAVAFromSECItem(arena, kind, valueType, &item); |
} |
@@ -227,16 +224,18 @@ CERT_CopyAVA(PLArenaPool *arena, CERTAVA *from) |
CERTAVA *ava; |
int rv; |
- ava = (CERTAVA*) PORT_ArenaZAlloc(arena, sizeof(CERTAVA)); |
+ ava = (CERTAVA *)PORT_ArenaZAlloc(arena, sizeof(CERTAVA)); |
if (ava) { |
- rv = SECITEM_CopyItem(arena, &ava->type, &from->type); |
- if (rv) goto loser; |
- rv = SECITEM_CopyItem(arena, &ava->value, &from->value); |
- if (rv) goto loser; |
+ rv = SECITEM_CopyItem(arena, &ava->type, &from->type); |
+ if (rv) |
+ goto loser; |
+ rv = SECITEM_CopyItem(arena, &ava->value, &from->value); |
+ if (rv) |
+ goto loser; |
} |
return ava; |
- loser: |
+loser: |
return 0; |
} |
@@ -249,34 +248,34 @@ CERT_CreateRDN(PLArenaPool *arena, CERTAVA *ava0, ...) |
unsigned count; |
CERTAVA **avap; |
- rdn = (CERTRDN*) PORT_ArenaAlloc(arena, sizeof(CERTRDN)); |
+ rdn = (CERTRDN *)PORT_ArenaAlloc(arena, sizeof(CERTRDN)); |
if (rdn) { |
- /* Count number of avas going into the rdn */ |
- count = 0; |
- if (ava0) { |
- count++; |
- va_start(ap, ava0); |
- while ((ava = va_arg(ap, CERTAVA*)) != 0) { |
- count++; |
- } |
- va_end(ap); |
- } |
- |
- /* Now fill in the pointers */ |
- rdn->avas = avap = |
- (CERTAVA**) PORT_ArenaAlloc( arena, (count + 1)*sizeof(CERTAVA*)); |
- if (!avap) { |
- return 0; |
- } |
- if (ava0) { |
- *avap++ = ava0; |
- va_start(ap, ava0); |
- while ((ava = va_arg(ap, CERTAVA*)) != 0) { |
- *avap++ = ava; |
- } |
- va_end(ap); |
- } |
- *avap++ = 0; |
+ /* Count number of avas going into the rdn */ |
+ count = 0; |
+ if (ava0) { |
+ count++; |
+ va_start(ap, ava0); |
+ while ((ava = va_arg(ap, CERTAVA *)) != 0) { |
+ count++; |
+ } |
+ va_end(ap); |
+ } |
+ |
+ /* Now fill in the pointers */ |
+ rdn->avas = avap = |
+ (CERTAVA **)PORT_ArenaAlloc(arena, (count + 1) * sizeof(CERTAVA *)); |
+ if (!avap) { |
+ return 0; |
+ } |
+ if (ava0) { |
+ *avap++ = ava0; |
+ va_start(ap, ava0); |
+ while ((ava = va_arg(ap, CERTAVA *)) != 0) { |
+ *avap++ = ava; |
+ } |
+ va_end(ap); |
+ } |
+ *avap++ = 0; |
} |
return rdn; |
} |
@@ -284,7 +283,7 @@ CERT_CreateRDN(PLArenaPool *arena, CERTAVA *ava0, ...) |
SECStatus |
CERT_AddAVA(PLArenaPool *arena, CERTRDN *rdn, CERTAVA *ava) |
{ |
- rdn->avas = (CERTAVA**) AddToArray(arena, (void**) rdn->avas, ava); |
+ rdn->avas = (CERTAVA **)AddToArray(arena, (void **)rdn->avas, ava); |
return rdn->avas ? SECSuccess : SECFailure; |
} |
@@ -297,20 +296,20 @@ CERT_CopyRDN(PLArenaPool *arena, CERTRDN *to, CERTRDN *from) |
/* Copy each ava from from */ |
avas = from->avas; |
if (avas) { |
- if (avas[0] == NULL) { |
- rv = CERT_AddAVA(arena, to, NULL); |
- return rv; |
- } |
- while ((fava = *avas++) != 0) { |
- tava = CERT_CopyAVA(arena, fava); |
- if (!tava) { |
- rv = SECFailure; |
- break; |
- } |
- rv = CERT_AddAVA(arena, to, tava); |
- if (rv != SECSuccess) |
- break; |
- } |
+ if (avas[0] == NULL) { |
+ rv = CERT_AddAVA(arena, to, NULL); |
+ return rv; |
+ } |
+ while ((fava = *avas++) != 0) { |
+ tava = CERT_CopyAVA(arena, fava); |
+ if (!tava) { |
+ rv = SECFailure; |
+ break; |
+ } |
+ rv = CERT_AddAVA(arena, to, tava); |
+ if (rv != SECSuccess) |
+ break; |
+ } |
} |
return rv; |
} |
@@ -318,8 +317,8 @@ CERT_CopyRDN(PLArenaPool *arena, CERTRDN *to, CERTRDN *from) |
/************************************************************************/ |
const SEC_ASN1Template CERT_NameTemplate[] = { |
- { SEC_ASN1_SEQUENCE_OF, |
- offsetof(CERTName,rdns), CERT_RDNTemplate, sizeof(CERTName) } |
+ { SEC_ASN1_SEQUENCE_OF, offsetof(CERTName, rdns), CERT_RDNTemplate, |
+ sizeof(CERTName) } |
}; |
SEC_ASN1_CHOOSER_IMPLEMENT(CERT_NameTemplate) |
@@ -333,71 +332,71 @@ CERT_CreateName(CERTRDN *rdn0, ...) |
unsigned count; |
CERTRDN **rdnp; |
PLArenaPool *arena; |
- |
+ |
arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); |
- if ( !arena ) { |
- return(0); |
+ if (!arena) { |
+ return (0); |
} |
- |
- name = (CERTName*) PORT_ArenaAlloc(arena, sizeof(CERTName)); |
+ |
+ name = (CERTName *)PORT_ArenaAlloc(arena, sizeof(CERTName)); |
if (name) { |
- name->arena = arena; |
- |
- /* Count number of RDNs going into the Name */ |
- if (!rdn0) { |
- count = 0; |
- } else { |
- count = 1; |
- va_start(ap, rdn0); |
- while ((rdn = va_arg(ap, CERTRDN*)) != 0) { |
- count++; |
- } |
- va_end(ap); |
- } |
- |
- /* Allocate space (including space for terminal null ptr) */ |
- name->rdns = rdnp = |
- (CERTRDN**) PORT_ArenaAlloc(arena, (count + 1) * sizeof(CERTRDN*)); |
- if (!name->rdns) { |
- goto loser; |
- } |
- |
- /* Now fill in the pointers */ |
- if (count > 0) { |
- *rdnp++ = rdn0; |
- va_start(ap, rdn0); |
- while ((rdn = va_arg(ap, CERTRDN*)) != 0) { |
- *rdnp++ = rdn; |
- } |
- va_end(ap); |
- } |
- |
- /* null terminate the list */ |
- *rdnp++ = 0; |
+ name->arena = arena; |
+ |
+ /* Count number of RDNs going into the Name */ |
+ if (!rdn0) { |
+ count = 0; |
+ } else { |
+ count = 1; |
+ va_start(ap, rdn0); |
+ while ((rdn = va_arg(ap, CERTRDN *)) != 0) { |
+ count++; |
+ } |
+ va_end(ap); |
+ } |
+ |
+ /* Allocate space (including space for terminal null ptr) */ |
+ name->rdns = rdnp = |
+ (CERTRDN **)PORT_ArenaAlloc(arena, (count + 1) * sizeof(CERTRDN *)); |
+ if (!name->rdns) { |
+ goto loser; |
+ } |
+ |
+ /* Now fill in the pointers */ |
+ if (count > 0) { |
+ *rdnp++ = rdn0; |
+ va_start(ap, rdn0); |
+ while ((rdn = va_arg(ap, CERTRDN *)) != 0) { |
+ *rdnp++ = rdn; |
+ } |
+ va_end(ap); |
+ } |
+ |
+ /* null terminate the list */ |
+ *rdnp++ = 0; |
} |
return name; |
loser: |
PORT_FreeArena(arena, PR_FALSE); |
- return(0); |
+ return (0); |
} |
void |
CERT_DestroyName(CERTName *name) |
{ |
- if (name) |
- { |
+ if (name) { |
PLArenaPool *arena = name->arena; |
name->rdns = NULL; |
- name->arena = NULL; |
- if (arena) PORT_FreeArena(arena, PR_FALSE); |
+ name->arena = NULL; |
+ if (arena) |
+ PORT_FreeArena(arena, PR_FALSE); |
} |
} |
SECStatus |
CERT_AddRDN(CERTName *name, CERTRDN *rdn) |
{ |
- name->rdns = (CERTRDN**) AddToArray(name->arena, (void**) name->rdns, rdn); |
+ name->rdns = (CERTRDN **)AddToArray(name->arena, (void **)name->rdns, rdn); |
return name->rdns ? SECSuccess : SECFailure; |
} |
@@ -408,8 +407,8 @@ CERT_CopyName(PLArenaPool *arena, CERTName *to, const CERTName *from) |
SECStatus rv = SECSuccess; |
if (!to || !from) { |
- PORT_SetError(SEC_ERROR_INVALID_ARGS); |
- return SECFailure; |
+ PORT_SetError(SEC_ERROR_INVALID_ARGS); |
+ return SECFailure; |
} |
CERT_DestroyName(to); |
@@ -418,23 +417,23 @@ CERT_CopyName(PLArenaPool *arena, CERTName *to, const CERTName *from) |
/* Copy each rdn from from */ |
rdns = from->rdns; |
if (rdns) { |
- if (rdns[0] == NULL) { |
- rv = CERT_AddRDN(to, NULL); |
- return rv; |
- } |
- while ((frdn = *rdns++) != NULL) { |
- trdn = CERT_CreateRDN(arena, NULL); |
- if (!trdn) { |
- rv = SECFailure; |
- break; |
- } |
- rv = CERT_CopyRDN(arena, trdn, frdn); |
- if (rv != SECSuccess) |
- break; |
- rv = CERT_AddRDN(to, trdn); |
- if (rv != SECSuccess) |
- break; |
- } |
+ if (rdns[0] == NULL) { |
+ rv = CERT_AddRDN(to, NULL); |
+ return rv; |
+ } |
+ while ((frdn = *rdns++) != NULL) { |
+ trdn = CERT_CreateRDN(arena, NULL); |
+ if (!trdn) { |
+ rv = SECFailure; |
+ break; |
+ } |
+ rv = CERT_CopyRDN(arena, trdn, frdn); |
+ if (rv != SECSuccess) |
+ break; |
+ rv = CERT_AddRDN(to, trdn); |
+ if (rv != SECSuccess) |
+ break; |
+ } |
} |
return rv; |
} |
@@ -442,34 +441,35 @@ CERT_CopyName(PLArenaPool *arena, CERTName *to, const CERTName *from) |
/************************************************************************/ |
static void |
-canonicalize(SECItem * foo) |
+canonicalize(SECItem *foo) |
{ |
int ch, lastch, len, src, dest; |
/* strip trailing whitespace. */ |
len = foo->len; |
- while (len > 0 && ((ch = foo->data[len - 1]) == ' ' || |
- ch == '\t' || ch == '\r' || ch == '\n')) { |
- len--; |
+ while (len > 0 && ((ch = foo->data[len - 1]) == ' ' || ch == '\t' || |
+ ch == '\r' || ch == '\n')) { |
+ len--; |
} |
src = 0; |
/* strip leading whitespace. */ |
- while (src < len && ((ch = foo->data[src]) == ' ' || |
- ch == '\t' || ch == '\r' || ch == '\n')) { |
- src++; |
+ while (src < len && ((ch = foo->data[src]) == ' ' || ch == '\t' || |
+ ch == '\r' || ch == '\n')) { |
+ src++; |
} |
- dest = 0; lastch = ' '; |
+ dest = 0; |
+ lastch = ' '; |
while (src < len) { |
ch = foo->data[src++]; |
- if (ch == ' ' || ch == '\t' || ch == '\r' || ch == '\n') { |
- ch = ' '; |
- if (ch == lastch) |
- continue; |
- } else if (ch >= 'A' && ch <= 'Z') { |
- ch |= 0x20; /* downshift */ |
- } |
- foo->data[dest++] = lastch = ch; |
+ if (ch == ' ' || ch == '\t' || ch == '\r' || ch == '\n') { |
+ ch = ' '; |
+ if (ch == lastch) |
+ continue; |
+ } else if (ch >= 'A' && ch <= 'Z') { |
+ ch |= 0x20; /* downshift */ |
+ } |
+ foo->data[dest++] = lastch = ch; |
} |
foo->len = dest; |
} |
@@ -479,14 +479,13 @@ SECComparison |
CERT_CompareDERPrintableStrings(const SECItem *a, const SECItem *b) |
{ |
SECComparison rv = SECLessThan; |
- SECItem * aVal = CERT_DecodeAVAValue(a); |
- SECItem * bVal = CERT_DecodeAVAValue(b); |
+ SECItem *aVal = CERT_DecodeAVAValue(a); |
+ SECItem *bVal = CERT_DecodeAVAValue(b); |
- if (aVal && aVal->len && aVal->data && |
- bVal && bVal->len && bVal->data) { |
- canonicalize(aVal); |
- canonicalize(bVal); |
- rv = SECITEM_CompareItem(aVal, bVal); |
+ if (aVal && aVal->len && aVal->data && bVal && bVal->len && bVal->data) { |
+ canonicalize(aVal); |
+ canonicalize(bVal); |
+ rv = SECITEM_CompareItem(aVal, bVal); |
} |
SECITEM_FreeItem(aVal, PR_TRUE); |
SECITEM_FreeItem(bVal, PR_TRUE); |
@@ -500,30 +499,30 @@ CERT_CompareAVA(const CERTAVA *a, const CERTAVA *b) |
rv = SECITEM_CompareItem(&a->type, &b->type); |
if (SECEqual != rv) |
- return rv; /* Attribute types don't match. */ |
+ return rv; /* Attribute types don't match. */ |
/* Let's be optimistic. Maybe the values will just compare equal. */ |
rv = SECITEM_CompareItem(&a->value, &b->value); |
if (SECEqual == rv) |
- return rv; /* values compared exactly. */ |
+ return rv; /* values compared exactly. */ |
if (a->value.len && a->value.data && b->value.len && b->value.data) { |
- /* Here, the values did not match. |
- ** If the values had different encodings, convert them to the same |
- ** encoding and compare that way. |
- */ |
- if (a->value.data[0] != b->value.data[0]) { |
- /* encodings differ. Convert both to UTF-8 and compare. */ |
- SECItem * aVal = CERT_DecodeAVAValue(&a->value); |
- SECItem * bVal = CERT_DecodeAVAValue(&b->value); |
- if (aVal && aVal->len && aVal->data && |
- bVal && bVal->len && bVal->data) { |
- rv = SECITEM_CompareItem(aVal, bVal); |
- } |
- SECITEM_FreeItem(aVal, PR_TRUE); |
- SECITEM_FreeItem(bVal, PR_TRUE); |
- } else if (a->value.data[0] == 0x13) { /* both are printable strings. */ |
- /* printable strings */ |
- rv = CERT_CompareDERPrintableStrings(&a->value, &b->value); |
- } |
+ /* Here, the values did not match. |
+ ** If the values had different encodings, convert them to the same |
+ ** encoding and compare that way. |
+ */ |
+ if (a->value.data[0] != b->value.data[0]) { |
+ /* encodings differ. Convert both to UTF-8 and compare. */ |
+ SECItem *aVal = CERT_DecodeAVAValue(&a->value); |
+ SECItem *bVal = CERT_DecodeAVAValue(&b->value); |
+ if (aVal && aVal->len && aVal->data && bVal && bVal->len && |
+ bVal->data) { |
+ rv = SECITEM_CompareItem(aVal, bVal); |
+ } |
+ SECITEM_FreeItem(aVal, PR_TRUE); |
+ SECITEM_FreeItem(bVal, PR_TRUE); |
+ } else if (a->value.data[0] == 0x13) { /* both are printable strings. */ |
+ /* printable strings */ |
+ rv = CERT_CompareDERPrintableStrings(&a->value, &b->value); |
+ } |
} |
return rv; |
} |
@@ -543,23 +542,25 @@ CERT_CompareRDN(const CERTRDN *a, const CERTRDN *b) |
** Make sure array of ava's are the same length. If not, then we are |
** not equal |
*/ |
- ac = CountArray((void**) aavas); |
- bc = CountArray((void**) bavas); |
- if (ac < bc) return SECLessThan; |
- if (ac > bc) return SECGreaterThan; |
+ ac = CountArray((void **)aavas); |
+ bc = CountArray((void **)bavas); |
+ if (ac < bc) |
+ return SECLessThan; |
+ if (ac > bc) |
+ return SECGreaterThan; |
while (NULL != (aava = *aavas++)) { |
- for (bavas = b->avas; NULL != (bava = *bavas++); ) { |
- rv = SECITEM_CompareItem(&aava->type, &bava->type); |
- if (SECEqual == rv) { |
- rv = CERT_CompareAVA(aava, bava); |
- if (SECEqual != rv) |
- return rv; |
- break; |
- } |
- } |
- if (!bava) /* didn't find a match */ |
- return SECGreaterThan; |
+ for (bavas = b->avas; NULL != (bava = *bavas++);) { |
+ rv = SECITEM_CompareItem(&aava->type, &bava->type); |
+ if (SECEqual == rv) { |
+ rv = CERT_CompareAVA(aava, bava); |
+ if (SECEqual != rv) |
+ return rv; |
+ break; |
+ } |
+ } |
+ if (!bava) /* didn't find a match */ |
+ return SECGreaterThan; |
} |
return rv; |
} |
@@ -579,19 +580,22 @@ CERT_CompareName(const CERTName *a, const CERTName *b) |
** Make sure array of rdn's are the same length. If not, then we are |
** not equal |
*/ |
- ac = CountArray((void**) ardns); |
- bc = CountArray((void**) brdns); |
- if (ac < bc) return SECLessThan; |
- if (ac > bc) return SECGreaterThan; |
+ ac = CountArray((void **)ardns); |
+ bc = CountArray((void **)brdns); |
+ if (ac < bc) |
+ return SECLessThan; |
+ if (ac > bc) |
+ return SECGreaterThan; |
for (;;) { |
- ardn = *ardns++; |
- brdn = *brdns++; |
- if (!ardn) { |
- break; |
- } |
- rv = CERT_CompareRDN(ardn, brdn); |
- if (rv) return rv; |
+ ardn = *ardns++; |
+ brdn = *brdns++; |
+ if (!ardn) { |
+ break; |
+ } |
+ rv = CERT_CompareRDN(ardn, brdn); |
+ if (rv) |
+ return rv; |
} |
return rv; |
} |
@@ -600,47 +604,47 @@ CERT_CompareName(const CERTName *a, const CERTName *b) |
SECItem * |
CERT_DecodeAVAValue(const SECItem *derAVAValue) |
{ |
- SECItem *retItem; |
- const SEC_ASN1Template *theTemplate = NULL; |
- enum { conv_none, conv_ucs4, conv_ucs2, conv_iso88591 } convert = conv_none; |
- SECItem avaValue = {siBuffer, 0}; |
- PLArenaPool *newarena = NULL; |
+ SECItem *retItem; |
+ const SEC_ASN1Template *theTemplate = NULL; |
+ enum { conv_none, conv_ucs4, conv_ucs2, conv_iso88591 } convert = conv_none; |
+ SECItem avaValue = { siBuffer, 0 }; |
+ PLArenaPool *newarena = NULL; |
if (!derAVAValue || !derAVAValue->len || !derAVAValue->data) { |
- PORT_SetError(SEC_ERROR_INVALID_ARGS); |
- return NULL; |
- } |
- |
- switch(derAVAValue->data[0]) { |
- case SEC_ASN1_UNIVERSAL_STRING: |
- convert = conv_ucs4; |
- theTemplate = SEC_ASN1_GET(SEC_UniversalStringTemplate); |
- break; |
- case SEC_ASN1_IA5_STRING: |
- theTemplate = SEC_ASN1_GET(SEC_IA5StringTemplate); |
- break; |
- case SEC_ASN1_PRINTABLE_STRING: |
- theTemplate = SEC_ASN1_GET(SEC_PrintableStringTemplate); |
- break; |
- case SEC_ASN1_T61_STRING: |
- /* |
- * Per common practice, we're not decoding actual T.61, but instead |
- * treating T61-labeled strings as containing ISO-8859-1. |
- */ |
- convert = conv_iso88591; |
- theTemplate = SEC_ASN1_GET(SEC_T61StringTemplate); |
- break; |
- case SEC_ASN1_BMP_STRING: |
- convert = conv_ucs2; |
- theTemplate = SEC_ASN1_GET(SEC_BMPStringTemplate); |
- break; |
- case SEC_ASN1_UTF8_STRING: |
- /* No conversion needed ! */ |
- theTemplate = SEC_ASN1_GET(SEC_UTF8StringTemplate); |
- break; |
- default: |
- PORT_SetError(SEC_ERROR_INVALID_AVA); |
- return NULL; |
+ PORT_SetError(SEC_ERROR_INVALID_ARGS); |
+ return NULL; |
+ } |
+ |
+ switch (derAVAValue->data[0]) { |
+ case SEC_ASN1_UNIVERSAL_STRING: |
+ convert = conv_ucs4; |
+ theTemplate = SEC_ASN1_GET(SEC_UniversalStringTemplate); |
+ break; |
+ case SEC_ASN1_IA5_STRING: |
+ theTemplate = SEC_ASN1_GET(SEC_IA5StringTemplate); |
+ break; |
+ case SEC_ASN1_PRINTABLE_STRING: |
+ theTemplate = SEC_ASN1_GET(SEC_PrintableStringTemplate); |
+ break; |
+ case SEC_ASN1_T61_STRING: |
+ /* |
+ * Per common practice, we're not decoding actual T.61, but instead |
+ * treating T61-labeled strings as containing ISO-8859-1. |
+ */ |
+ convert = conv_iso88591; |
+ theTemplate = SEC_ASN1_GET(SEC_T61StringTemplate); |
+ break; |
+ case SEC_ASN1_BMP_STRING: |
+ convert = conv_ucs2; |
+ theTemplate = SEC_ASN1_GET(SEC_BMPStringTemplate); |
+ break; |
+ case SEC_ASN1_UTF8_STRING: |
+ /* No conversion needed ! */ |
+ theTemplate = SEC_ASN1_GET(SEC_UTF8StringTemplate); |
+ break; |
+ default: |
+ PORT_SetError(SEC_ERROR_INVALID_AVA); |
+ return NULL; |
} |
PORT_Memset(&avaValue, 0, sizeof(SECItem)); |
@@ -648,51 +652,54 @@ CERT_DecodeAVAValue(const SECItem *derAVAValue) |
if (!newarena) { |
return NULL; |
} |
- if(SEC_QuickDERDecodeItem(newarena, &avaValue, theTemplate, derAVAValue) |
- != SECSuccess) { |
- PORT_FreeArena(newarena, PR_FALSE); |
- return NULL; |
+ if (SEC_QuickDERDecodeItem(newarena, &avaValue, theTemplate, derAVAValue) != |
+ SECSuccess) { |
+ PORT_FreeArena(newarena, PR_FALSE); |
+ return NULL; |
} |
if (convert != conv_none) { |
- unsigned int utf8ValLen = avaValue.len * 3; |
- unsigned char *utf8Val = (unsigned char*) |
- PORT_ArenaZAlloc(newarena, utf8ValLen); |
+ unsigned int utf8ValLen = avaValue.len * 3; |
+ unsigned char *utf8Val = |
+ (unsigned char *)PORT_ArenaZAlloc(newarena, utf8ValLen); |
switch (convert) { |
- case conv_ucs4: |
- if(avaValue.len % 4 != 0 || |
- !PORT_UCS4_UTF8Conversion(PR_FALSE, avaValue.data, avaValue.len, |
- utf8Val, utf8ValLen, &utf8ValLen)) { |
- PORT_FreeArena(newarena, PR_FALSE); |
- PORT_SetError(SEC_ERROR_INVALID_AVA); |
- return NULL; |
- } |
- break; |
- case conv_ucs2: |
- if(avaValue.len % 2 != 0 || |
- !PORT_UCS2_UTF8Conversion(PR_FALSE, avaValue.data, avaValue.len, |
- utf8Val, utf8ValLen, &utf8ValLen)) { |
- PORT_FreeArena(newarena, PR_FALSE); |
- PORT_SetError(SEC_ERROR_INVALID_AVA); |
- return NULL; |
- } |
- break; |
- case conv_iso88591: |
- if(!PORT_ISO88591_UTF8Conversion(avaValue.data, avaValue.len, |
- utf8Val, utf8ValLen, &utf8ValLen)) { |
- PORT_FreeArena(newarena, PR_FALSE); |
- PORT_SetError(SEC_ERROR_INVALID_AVA); |
- return NULL; |
- } |
- break; |
- case conv_none: |
- PORT_Assert(0); /* not reached */ |
- break; |
- } |
- |
- avaValue.data = utf8Val; |
- avaValue.len = utf8ValLen; |
+ case conv_ucs4: |
+ if (avaValue.len % 4 != 0 || |
+ !PORT_UCS4_UTF8Conversion(PR_FALSE, avaValue.data, |
+ avaValue.len, utf8Val, utf8ValLen, |
+ &utf8ValLen)) { |
+ PORT_FreeArena(newarena, PR_FALSE); |
+ PORT_SetError(SEC_ERROR_INVALID_AVA); |
+ return NULL; |
+ } |
+ break; |
+ case conv_ucs2: |
+ if (avaValue.len % 2 != 0 || |
+ !PORT_UCS2_UTF8Conversion(PR_FALSE, avaValue.data, |
+ avaValue.len, utf8Val, utf8ValLen, |
+ &utf8ValLen)) { |
+ PORT_FreeArena(newarena, PR_FALSE); |
+ PORT_SetError(SEC_ERROR_INVALID_AVA); |
+ return NULL; |
+ } |
+ break; |
+ case conv_iso88591: |
+ if (!PORT_ISO88591_UTF8Conversion(avaValue.data, avaValue.len, |
+ utf8Val, utf8ValLen, |
+ &utf8ValLen)) { |
+ PORT_FreeArena(newarena, PR_FALSE); |
+ PORT_SetError(SEC_ERROR_INVALID_AVA); |
+ return NULL; |
+ } |
+ break; |
+ case conv_none: |
+ PORT_Assert(0); /* not reached */ |
+ break; |
+ } |
+ |
+ avaValue.data = utf8Val; |
+ avaValue.len = utf8ValLen; |
} |
retItem = SECITEM_DupItem(&avaValue); |