1 /* ***** BEGIN LICENSE BLOCK *****
2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
4 * The contents of this file are subject to the Mozilla Public License Version
5 * 1.1 (the "License"); you may not use this file except in compliance with
6 * the License. You may obtain a copy of the License at
7 * http://www.mozilla.org/MPL/
9 * Software distributed under the License is distributed on an "AS IS" basis,
10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
11 * for the specific language governing rights and limitations under the
14 * The Original Code is the Netscape security libraries.
16 * The Initial Developer of the Original Code is
17 * Netscape Communications Corporation.
18 * Portions created by the Initial Developer are Copyright (C) 1994-2000
19 * the Initial Developer. All Rights Reserved.
24 * Alternatively, the contents of this file may be used under the terms of
25 * either the GNU General Public License Version 2 or later (the "GPL"), or
26 * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
27 * in which case the provisions of the GPL or the LGPL are applicable instead
28 * of those above. If you wish to allow use of your version of this file only
29 * under the terms of either the GPL or the LGPL, and not to allow others to
30 * use your version of this file under the terms of the MPL, indicate your
31 * decision by deleting the provisions above and replace them with the notice
32 * and other provisions required by the GPL or the LGPL. If you do not delete
33 * the provisions above, a recipient may use your version of this file under
34 * the terms of any one of the MPL, the GPL or the LGPL.
36 * ***** END LICENSE BLOCK ***** */
38 * pkix_policychecker.h
40 * Header file for policy checker.
44 #ifndef _PKIX_POLICYCHECKER_H
45 #define _PKIX_POLICYCHECKER_H
47 #include "pkix_tools.h"
53 typedef struct PKIX_PolicyCheckerStateStruct PKIX_PolicyCheckerState
;
55 struct PKIX_PolicyCheckerStateStruct
{
56 PKIX_PL_OID
*certPoliciesExtension
; /* const */
57 PKIX_PL_OID
*policyMappingsExtension
; /* const */
58 PKIX_PL_OID
*policyConstraintsExtension
; /* const */
59 PKIX_PL_OID
*inhibitAnyPolicyExtension
; /* const */
60 PKIX_PL_OID
*anyPolicyOID
; /* const */
61 PKIX_Boolean initialIsAnyPolicy
; /* const */
62 PKIX_PolicyNode
*validPolicyTree
;
63 PKIX_List
*userInitialPolicySet
; /* immutable */
64 PKIX_List
*mappedUserInitialPolicySet
;
65 PKIX_Boolean policyQualifiersRejected
;
66 PKIX_Boolean initialPolicyMappingInhibit
;
67 PKIX_Boolean initialExplicitPolicy
;
68 PKIX_Boolean initialAnyPolicyInhibit
;
69 PKIX_UInt32 explicitPolicy
;
70 PKIX_UInt32 inhibitAnyPolicy
;
71 PKIX_UInt32 policyMapping
;
73 PKIX_UInt32 certsProcessed
;
74 PKIX_PolicyNode
*anyPolicyNodeAtBottom
;
75 PKIX_PolicyNode
*newAnyPolicyNode
;
77 * The following variables do not survive from one
78 * certificate to the next. They are needed at each
79 * level of recursive routines, any by placing them
80 * in the state object we can pass fewer arguments.
82 PKIX_Boolean certPoliciesCritical
;
83 PKIX_List
*mappedPolicyOIDs
;
87 pkix_PolicyChecker_Initialize(
88 PKIX_List
*initialPolicies
,
89 PKIX_Boolean policyQualifiersRejected
,
90 PKIX_Boolean initialPolicyMappingInhibit
,
91 PKIX_Boolean initialExplicitPolicy
,
92 PKIX_Boolean initialAnyPolicyInhibit
,
94 PKIX_CertChainChecker
**pChecker
,
97 /* --Private-Functions-------------------------------------------- */
100 pkix_PolicyCheckerState_RegisterSelf(void *plContext
);
106 #endif /* _PKIX_POLICYCHECKER_H */