| Index: nss/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/pkix_pl_certpolicymap.c
|
| ===================================================================
|
| --- nss/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/pkix_pl_certpolicymap.c (revision 0)
|
| +++ nss/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/pkix_pl_certpolicymap.c (revision 0)
|
| @@ -0,0 +1,419 @@
|
| +/* ***** BEGIN LICENSE BLOCK *****
|
| + * Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
| + *
|
| + * The contents of this file are subject to the Mozilla Public License Version
|
| + * 1.1 (the "License"); you may not use this file except in compliance with
|
| + * the License. You may obtain a copy of the License at
|
| + * http://www.mozilla.org/MPL/
|
| + *
|
| + * Software distributed under the License is distributed on an "AS IS" basis,
|
| + * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
| + * for the specific language governing rights and limitations under the
|
| + * License.
|
| + *
|
| + * The Original Code is the PKIX-C library.
|
| + *
|
| + * The Initial Developer of the Original Code is
|
| + * Sun Microsystems, Inc.
|
| + * Portions created by the Initial Developer are
|
| + * Copyright 2004-2007 Sun Microsystems, Inc. All Rights Reserved.
|
| + *
|
| + * Contributor(s):
|
| + * Sun Microsystems, Inc.
|
| + *
|
| + * Alternatively, the contents of this file may be used under the terms of
|
| + * either the GNU General Public License Version 2 or later (the "GPL"), or
|
| + * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
| + * in which case the provisions of the GPL or the LGPL are applicable instead
|
| + * of those above. If you wish to allow use of your version of this file only
|
| + * under the terms of either the GPL or the LGPL, and not to allow others to
|
| + * use your version of this file under the terms of the MPL, indicate your
|
| + * decision by deleting the provisions above and replace them with the notice
|
| + * and other provisions required by the GPL or the LGPL. If you do not delete
|
| + * the provisions above, a recipient may use your version of this file under
|
| + * the terms of any one of the MPL, the GPL or the LGPL.
|
| + *
|
| + * ***** END LICENSE BLOCK ***** */
|
| +/*
|
| + * pkix_pl_certpolicymap.c
|
| + *
|
| + * CertPolicyMap Type Functions
|
| + *
|
| + */
|
| +
|
| +#include "pkix_pl_certpolicymap.h"
|
| +
|
| +/*
|
| + * FUNCTION: pkix_pl_CertPolicyMap_Create
|
| + * DESCRIPTION:
|
| + *
|
| + * Creates a new CertPolicyMap Object pairing the OID given by
|
| + * "issuerDomainPolicy" with the OID given by "subjectDomainPolicy", and
|
| + * stores the result at "pCertPolicyMap".
|
| + *
|
| + * PARAMETERS
|
| + * "issuerDomainPolicy"
|
| + * Address of the OID of the IssuerDomainPolicy. Must be non-NULL.
|
| + * "subjectDomainPolicy"
|
| + * Address of the OID of the SubjectDomainPolicy. Must be non-NULL.
|
| + * "pCertPolicyMap"
|
| + * Address where CertPolicyMap pointer will be stored. Must be non-NULL.
|
| + * "plContext"
|
| + * Platform-specific context pointer.
|
| + * THREAD SAFETY:
|
| + * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
|
| + * RETURNS:
|
| + * Returns NULL if the function succeeds.
|
| + * Returns a CertPolicyMap Error if the function fails in a non-fatal way.
|
| + * Returns a Fatal Error if the function fails in an unrecoverable way.
|
| + */
|
| +PKIX_Error *
|
| +pkix_pl_CertPolicyMap_Create(
|
| + PKIX_PL_OID *issuerDomainPolicy,
|
| + PKIX_PL_OID *subjectDomainPolicy,
|
| + PKIX_PL_CertPolicyMap **pCertPolicyMap,
|
| + void *plContext)
|
| +{
|
| + PKIX_PL_CertPolicyMap *policyMap = NULL;
|
| +
|
| + PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_Create");
|
| +
|
| + PKIX_NULLCHECK_THREE
|
| + (issuerDomainPolicy, subjectDomainPolicy, pCertPolicyMap);
|
| +
|
| + PKIX_CHECK(PKIX_PL_Object_Alloc
|
| + (PKIX_CERTPOLICYMAP_TYPE,
|
| + sizeof (PKIX_PL_CertPolicyMap),
|
| + (PKIX_PL_Object **)&policyMap,
|
| + plContext),
|
| + PKIX_COULDNOTCREATECERTPOLICYMAPOBJECT);
|
| +
|
| + PKIX_INCREF(issuerDomainPolicy);
|
| + policyMap->issuerDomainPolicy = issuerDomainPolicy;
|
| +
|
| + PKIX_INCREF(subjectDomainPolicy);
|
| + policyMap->subjectDomainPolicy = subjectDomainPolicy;
|
| +
|
| + *pCertPolicyMap = policyMap;
|
| + policyMap = NULL;
|
| +
|
| +cleanup:
|
| + PKIX_DECREF(policyMap);
|
| +
|
| + PKIX_RETURN(CERTPOLICYMAP);
|
| +}
|
| +
|
| +/*
|
| + * FUNCTION: pkix_pl_CertPolicyMap_Destroy
|
| + * (see comments for PKIX_PL_DestructorCallback in pkix_pl_system.h)
|
| + */
|
| +static PKIX_Error *
|
| +pkix_pl_CertPolicyMap_Destroy(
|
| + PKIX_PL_Object *object,
|
| + void *plContext)
|
| +{
|
| + PKIX_PL_CertPolicyMap *certMap = NULL;
|
| +
|
| + PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_Destroy");
|
| +
|
| + PKIX_NULLCHECK_ONE(object);
|
| +
|
| + PKIX_CHECK(pkix_CheckType(object, PKIX_CERTPOLICYMAP_TYPE, plContext),
|
| + PKIX_OBJECTNOTCERTPOLICYMAP);
|
| +
|
| + certMap = (PKIX_PL_CertPolicyMap*)object;
|
| +
|
| + PKIX_DECREF(certMap->issuerDomainPolicy);
|
| + PKIX_DECREF(certMap->subjectDomainPolicy);
|
| +
|
| +cleanup:
|
| +
|
| + PKIX_RETURN(CERTPOLICYMAP);
|
| +}
|
| +
|
| +/*
|
| + * FUNCTION: pkix_pl_CertPolicyMap_ToString
|
| + * (see comments for PKIX_PL_ToStringCallback in pkix_pl_system.h)
|
| + */
|
| +static PKIX_Error *
|
| +pkix_pl_CertPolicyMap_ToString(
|
| + PKIX_PL_Object *object,
|
| + PKIX_PL_String **pString,
|
| + void *plContext)
|
| +{
|
| + PKIX_PL_CertPolicyMap *certMap = NULL;
|
| + PKIX_PL_String *format = NULL;
|
| + PKIX_PL_String *outString = NULL;
|
| + PKIX_PL_String *issuerString = NULL;
|
| + PKIX_PL_String *subjectString = NULL;
|
| +
|
| + PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_ToString");
|
| +
|
| + PKIX_NULLCHECK_TWO(object, pString);
|
| +
|
| + PKIX_CHECK(pkix_CheckType(object, PKIX_CERTPOLICYMAP_TYPE, plContext),
|
| + PKIX_OBJECTNOTCERTPOLICYMAP);
|
| +
|
| + certMap = (PKIX_PL_CertPolicyMap *)object;
|
| +
|
| + PKIX_TOSTRING
|
| + (certMap->issuerDomainPolicy,
|
| + &issuerString,
|
| + plContext,
|
| + PKIX_OBJECTTOSTRINGFAILED);
|
| +
|
| + PKIX_TOSTRING
|
| + (certMap->subjectDomainPolicy,
|
| + &subjectString,
|
| + plContext,
|
| + PKIX_OBJECTTOSTRINGFAILED);
|
| +
|
| + /* Put them together in the form issuerPolicy=>subjectPolicy */
|
| + PKIX_CHECK(PKIX_PL_String_Create
|
| + (PKIX_ESCASCII, "%s=>%s", 0, &format, plContext),
|
| + PKIX_ERRORINSTRINGCREATE);
|
| +
|
| + PKIX_CHECK(PKIX_PL_Sprintf
|
| + (&outString, plContext, format, issuerString, subjectString),
|
| + PKIX_ERRORINSPRINTF);
|
| +
|
| + *pString = outString;
|
| +
|
| +cleanup:
|
| + PKIX_DECREF(format);
|
| + PKIX_DECREF(issuerString);
|
| + PKIX_DECREF(subjectString);
|
| +
|
| + PKIX_RETURN(CERTPOLICYMAP);
|
| +}
|
| +
|
| +/*
|
| + * FUNCTION: pkix_pl_CertPolicyMap_Hashcode
|
| + * (see comments for PKIX_PL_HashcodeCallback in pkix_pl_system.h)
|
| + */
|
| +static PKIX_Error *
|
| +pkix_pl_CertPolicyMap_Hashcode(
|
| + PKIX_PL_Object *object,
|
| + PKIX_UInt32 *pHashcode,
|
| + void *plContext)
|
| +{
|
| + PKIX_UInt32 issuerHash = 0;
|
| + PKIX_UInt32 subjectHash = 0;
|
| + PKIX_PL_CertPolicyMap *certMap = NULL;
|
| +
|
| + PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_Hashcode");
|
| +
|
| + PKIX_NULLCHECK_TWO(object, pHashcode);
|
| +
|
| + PKIX_CHECK(pkix_CheckType(object, PKIX_CERTPOLICYMAP_TYPE, plContext),
|
| + PKIX_OBJECTNOTCERTPOLICYMAP);
|
| +
|
| + certMap = (PKIX_PL_CertPolicyMap *)object;
|
| +
|
| + PKIX_HASHCODE
|
| + (certMap->issuerDomainPolicy,
|
| + &issuerHash,
|
| + plContext,
|
| + PKIX_OBJECTHASHCODEFAILED);
|
| +
|
| + PKIX_HASHCODE
|
| + (certMap->subjectDomainPolicy,
|
| + &subjectHash,
|
| + plContext,
|
| + PKIX_OBJECTHASHCODEFAILED);
|
| +
|
| + *pHashcode = issuerHash*31 + subjectHash;
|
| +
|
| +cleanup:
|
| +
|
| + PKIX_RETURN(CERTPOLICYMAP);
|
| +}
|
| +
|
| +/*
|
| + * FUNCTION: pkix_pl_CertPolicyMap_Equals
|
| + * (see comments for PKIX_PL_Equals_Callback in pkix_pl_system.h)
|
| + */
|
| +static PKIX_Error *
|
| +pkix_pl_CertPolicyMap_Equals(
|
| + PKIX_PL_Object *firstObject,
|
| + PKIX_PL_Object *secondObject,
|
| + PKIX_Boolean *pResult,
|
| + void *plContext)
|
| +{
|
| + PKIX_PL_CertPolicyMap *firstCertMap = NULL;
|
| + PKIX_PL_CertPolicyMap *secondCertMap = NULL;
|
| + PKIX_UInt32 secondType = 0;
|
| + PKIX_Boolean compare = PKIX_FALSE;
|
| +
|
| + PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_Equals");
|
| + PKIX_NULLCHECK_THREE(firstObject, secondObject, pResult);
|
| +
|
| + /* test that firstObject is a CertPolicyMap */
|
| + PKIX_CHECK(pkix_CheckType
|
| + (firstObject, PKIX_CERTPOLICYMAP_TYPE, plContext),
|
| + PKIX_FIRSTOBJECTNOTCERTPOLICYMAP);
|
| +
|
| + /*
|
| + * Since we know firstObject is a CertPolicyMap,
|
| + * if both references are identical, they must be equal
|
| + */
|
| + if (firstObject == secondObject){
|
| + *pResult = PKIX_TRUE;
|
| + goto cleanup;
|
| + }
|
| +
|
| + /*
|
| + * If secondObject isn't a CertPolicyMap, we
|
| + * don't throw an error. We simply return FALSE.
|
| + */
|
| + PKIX_CHECK(PKIX_PL_Object_GetType
|
| + (secondObject, &secondType, plContext),
|
| + PKIX_COULDNOTGETTYPEOFSECONDARGUMENT);
|
| + if (secondType != PKIX_CERTPOLICYMAP_TYPE) {
|
| + *pResult = PKIX_FALSE;
|
| + goto cleanup;
|
| + }
|
| +
|
| + firstCertMap = (PKIX_PL_CertPolicyMap *)firstObject;
|
| + secondCertMap = (PKIX_PL_CertPolicyMap *)secondObject;
|
| +
|
| + PKIX_EQUALS
|
| + (firstCertMap->issuerDomainPolicy,
|
| + secondCertMap->issuerDomainPolicy,
|
| + &compare,
|
| + plContext,
|
| + PKIX_OBJECTEQUALSFAILED);
|
| +
|
| + if (compare) {
|
| + PKIX_EQUALS
|
| + (firstCertMap->subjectDomainPolicy,
|
| + secondCertMap->subjectDomainPolicy,
|
| + &compare,
|
| + plContext,
|
| + PKIX_OBJECTEQUALSFAILED);
|
| + }
|
| +
|
| + *pResult = compare;
|
| +
|
| +cleanup:
|
| +
|
| + PKIX_RETURN(CERTPOLICYMAP);
|
| +}
|
| +
|
| +/*
|
| + * FUNCTION: pkix_pl_CertPolicyMap_Duplicate
|
| + * (see comments for PKIX_PL_Duplicate_Callback in pkix_pl_system.h)
|
| + */
|
| +static PKIX_Error *
|
| +pkix_pl_CertPolicyMap_Duplicate(
|
| + PKIX_PL_Object *object,
|
| + PKIX_PL_Object **pNewObject,
|
| + void *plContext)
|
| +{
|
| + PKIX_PL_CertPolicyMap *original = NULL;
|
| + PKIX_PL_CertPolicyMap *copy = NULL;
|
| +
|
| + PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_Duplicate");
|
| +
|
| + PKIX_NULLCHECK_TWO(object, pNewObject);
|
| +
|
| + PKIX_CHECK(pkix_CheckType
|
| + (object, PKIX_CERTPOLICYMAP_TYPE, plContext),
|
| + PKIX_OBJECTARGUMENTNOTPOLICYMAP);
|
| +
|
| + original = (PKIX_PL_CertPolicyMap *)object;
|
| +
|
| + PKIX_CHECK(pkix_pl_CertPolicyMap_Create
|
| + (original->issuerDomainPolicy,
|
| + original->subjectDomainPolicy,
|
| + ©,
|
| + plContext),
|
| + PKIX_CERTPOLICYMAPCREATEFAILED);
|
| +
|
| + *pNewObject = (PKIX_PL_Object *)copy;
|
| +
|
| +cleanup:
|
| +
|
| + PKIX_RETURN(CERTPOLICYMAP);
|
| +}
|
| +
|
| +/*
|
| + * FUNCTION: pkix_pl_CertPolicyMap_RegisterSelf
|
| + * DESCRIPTION:
|
| + * Registers PKIX_CERTPOLICYMAP_TYPE and its related
|
| + * functions with systemClasses[]
|
| + * THREAD SAFETY:
|
| + * Not Thread Safe - for performance and complexity reasons
|
| + *
|
| + * Since this function is only called by PKIX_PL_Initialize,
|
| + * which should only be called once, it is acceptable that
|
| + * this function is not thread-safe.
|
| + */
|
| +PKIX_Error *
|
| +pkix_pl_CertPolicyMap_RegisterSelf(void *plContext)
|
| +{
|
| + extern pkix_ClassTable_Entry systemClasses[PKIX_NUMTYPES];
|
| + pkix_ClassTable_Entry entry;
|
| +
|
| + PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_RegisterSelf");
|
| +
|
| + entry.description = "CertPolicyMap";
|
| + entry.objCounter = 0;
|
| + entry.typeObjectSize = sizeof(PKIX_PL_CertPolicyMap);
|
| + entry.destructor = pkix_pl_CertPolicyMap_Destroy;
|
| + entry.equalsFunction = pkix_pl_CertPolicyMap_Equals;
|
| + entry.hashcodeFunction = pkix_pl_CertPolicyMap_Hashcode;
|
| + entry.toStringFunction = pkix_pl_CertPolicyMap_ToString;
|
| + entry.comparator = NULL;
|
| + entry.duplicateFunction = pkix_pl_CertPolicyMap_Duplicate;
|
| +
|
| + systemClasses[PKIX_CERTPOLICYMAP_TYPE] = entry;
|
| +
|
| + PKIX_RETURN(CERTPOLICYMAP);
|
| +}
|
| +
|
| +/* --Public-CertPolicyMap-Functions------------------------- */
|
| +
|
| +/*
|
| + * FUNCTION: PKIX_PL_CertPolicyMap_GetIssuerDomainPolicy
|
| + * (see comments in pkix_pl_pki.h)
|
| + */
|
| +PKIX_Error *
|
| +PKIX_PL_CertPolicyMap_GetIssuerDomainPolicy(
|
| + PKIX_PL_CertPolicyMap *policyMapping,
|
| + PKIX_PL_OID **pIssuerDomainPolicy,
|
| + void *plContext)
|
| +{
|
| + PKIX_ENTER
|
| + (CERTPOLICYMAP, "PKIX_PL_CertPolicyMap_GetIssuerDomainPolicy");
|
| +
|
| + PKIX_NULLCHECK_TWO(policyMapping, pIssuerDomainPolicy);
|
| +
|
| + PKIX_INCREF(policyMapping->issuerDomainPolicy);
|
| + *pIssuerDomainPolicy = policyMapping->issuerDomainPolicy;
|
| +
|
| +cleanup:
|
| + PKIX_RETURN(CERTPOLICYMAP);
|
| +}
|
| +
|
| +/*
|
| + * FUNCTION: PKIX_PL_CertPolicyMap_GetSubjectDomainPolicy
|
| + * (see comments in pkix_pl_pki.h)
|
| + */
|
| +PKIX_Error *
|
| +PKIX_PL_CertPolicyMap_GetSubjectDomainPolicy(
|
| + PKIX_PL_CertPolicyMap *policyMapping,
|
| + PKIX_PL_OID **pSubjectDomainPolicy,
|
| + void *plContext)
|
| +{
|
| + PKIX_ENTER
|
| + (CERTPOLICYMAP, "PKIX_PL_CertPolicyMap_GetSubjectDomainPolicy");
|
| +
|
| + PKIX_NULLCHECK_TWO(policyMapping, pSubjectDomainPolicy);
|
| +
|
| + PKIX_INCREF(policyMapping->subjectDomainPolicy);
|
| + *pSubjectDomainPolicy = policyMapping->subjectDomainPolicy;
|
| +
|
| +cleanup:
|
| + PKIX_RETURN(CERTPOLICYMAP);
|
| +}
|
|
|
| Property changes on: nss/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/pkix_pl_certpolicymap.c
|
| ___________________________________________________________________
|
| Added: svn:eol-style
|
| + LF
|
|
|
|
|