|
Packit |
40b132 |
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
Packit |
40b132 |
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
Packit |
40b132 |
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* pkix_pl_certpolicymap.c
|
|
Packit |
40b132 |
*
|
|
Packit |
40b132 |
* CertPolicyMap Type Functions
|
|
Packit |
40b132 |
*
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
#include "pkix_pl_certpolicymap.h"
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* FUNCTION: pkix_pl_CertPolicyMap_Create
|
|
Packit |
40b132 |
* DESCRIPTION:
|
|
Packit |
40b132 |
*
|
|
Packit |
40b132 |
* Creates a new CertPolicyMap Object pairing the OID given by
|
|
Packit |
40b132 |
* "issuerDomainPolicy" with the OID given by "subjectDomainPolicy", and
|
|
Packit |
40b132 |
* stores the result at "pCertPolicyMap".
|
|
Packit |
40b132 |
*
|
|
Packit |
40b132 |
* PARAMETERS
|
|
Packit |
40b132 |
* "issuerDomainPolicy"
|
|
Packit |
40b132 |
* Address of the OID of the IssuerDomainPolicy. Must be non-NULL.
|
|
Packit |
40b132 |
* "subjectDomainPolicy"
|
|
Packit |
40b132 |
* Address of the OID of the SubjectDomainPolicy. Must be non-NULL.
|
|
Packit |
40b132 |
* "pCertPolicyMap"
|
|
Packit |
40b132 |
* Address where CertPolicyMap pointer will be stored. Must be non-NULL.
|
|
Packit |
40b132 |
* "plContext"
|
|
Packit |
40b132 |
* Platform-specific context pointer.
|
|
Packit |
40b132 |
* THREAD SAFETY:
|
|
Packit |
40b132 |
* Thread Safe (see Thread Safety Definitions in Programmer's Guide)
|
|
Packit |
40b132 |
* RETURNS:
|
|
Packit |
40b132 |
* Returns NULL if the function succeeds.
|
|
Packit |
40b132 |
* Returns a CertPolicyMap Error if the function fails in a non-fatal way.
|
|
Packit |
40b132 |
* Returns a Fatal Error if the function fails in an unrecoverable way.
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
PKIX_Error *
|
|
Packit |
40b132 |
pkix_pl_CertPolicyMap_Create(
|
|
Packit |
40b132 |
PKIX_PL_OID *issuerDomainPolicy,
|
|
Packit |
40b132 |
PKIX_PL_OID *subjectDomainPolicy,
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap **pCertPolicyMap,
|
|
Packit |
40b132 |
void *plContext)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap *policyMap = NULL;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_Create");
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_NULLCHECK_THREE
|
|
Packit |
40b132 |
(issuerDomainPolicy, subjectDomainPolicy, pCertPolicyMap);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_CHECK(PKIX_PL_Object_Alloc
|
|
Packit |
40b132 |
(PKIX_CERTPOLICYMAP_TYPE,
|
|
Packit |
40b132 |
sizeof (PKIX_PL_CertPolicyMap),
|
|
Packit |
40b132 |
(PKIX_PL_Object **)&policyMap,
|
|
Packit |
40b132 |
plContext),
|
|
Packit |
40b132 |
PKIX_COULDNOTCREATECERTPOLICYMAPOBJECT);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_INCREF(issuerDomainPolicy);
|
|
Packit |
40b132 |
policyMap->issuerDomainPolicy = issuerDomainPolicy;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_INCREF(subjectDomainPolicy);
|
|
Packit |
40b132 |
policyMap->subjectDomainPolicy = subjectDomainPolicy;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
*pCertPolicyMap = policyMap;
|
|
Packit |
40b132 |
policyMap = NULL;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
cleanup:
|
|
Packit |
40b132 |
PKIX_DECREF(policyMap);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_RETURN(CERTPOLICYMAP);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* FUNCTION: pkix_pl_CertPolicyMap_Destroy
|
|
Packit |
40b132 |
* (see comments for PKIX_PL_DestructorCallback in pkix_pl_system.h)
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
static PKIX_Error *
|
|
Packit |
40b132 |
pkix_pl_CertPolicyMap_Destroy(
|
|
Packit |
40b132 |
PKIX_PL_Object *object,
|
|
Packit |
40b132 |
void *plContext)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap *certMap = NULL;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_Destroy");
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_NULLCHECK_ONE(object);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_CHECK(pkix_CheckType(object, PKIX_CERTPOLICYMAP_TYPE, plContext),
|
|
Packit |
40b132 |
PKIX_OBJECTNOTCERTPOLICYMAP);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
certMap = (PKIX_PL_CertPolicyMap*)object;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_DECREF(certMap->issuerDomainPolicy);
|
|
Packit |
40b132 |
PKIX_DECREF(certMap->subjectDomainPolicy);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
cleanup:
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_RETURN(CERTPOLICYMAP);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* FUNCTION: pkix_pl_CertPolicyMap_ToString
|
|
Packit |
40b132 |
* (see comments for PKIX_PL_ToStringCallback in pkix_pl_system.h)
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
static PKIX_Error *
|
|
Packit |
40b132 |
pkix_pl_CertPolicyMap_ToString(
|
|
Packit |
40b132 |
PKIX_PL_Object *object,
|
|
Packit |
40b132 |
PKIX_PL_String **pString,
|
|
Packit |
40b132 |
void *plContext)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap *certMap = NULL;
|
|
Packit |
40b132 |
PKIX_PL_String *format = NULL;
|
|
Packit |
40b132 |
PKIX_PL_String *outString = NULL;
|
|
Packit |
40b132 |
PKIX_PL_String *issuerString = NULL;
|
|
Packit |
40b132 |
PKIX_PL_String *subjectString = NULL;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_ToString");
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_NULLCHECK_TWO(object, pString);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_CHECK(pkix_CheckType(object, PKIX_CERTPOLICYMAP_TYPE, plContext),
|
|
Packit |
40b132 |
PKIX_OBJECTNOTCERTPOLICYMAP);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
certMap = (PKIX_PL_CertPolicyMap *)object;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_TOSTRING
|
|
Packit |
40b132 |
(certMap->issuerDomainPolicy,
|
|
Packit |
40b132 |
&issuerString,
|
|
Packit |
40b132 |
plContext,
|
|
Packit |
40b132 |
PKIX_OBJECTTOSTRINGFAILED);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_TOSTRING
|
|
Packit |
40b132 |
(certMap->subjectDomainPolicy,
|
|
Packit |
40b132 |
&subjectString,
|
|
Packit |
40b132 |
plContext,
|
|
Packit |
40b132 |
PKIX_OBJECTTOSTRINGFAILED);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/* Put them together in the form issuerPolicy=>subjectPolicy */
|
|
Packit |
40b132 |
PKIX_CHECK(PKIX_PL_String_Create
|
|
Packit |
40b132 |
(PKIX_ESCASCII, "%s=>%s", 0, &format, plContext),
|
|
Packit |
40b132 |
PKIX_ERRORINSTRINGCREATE);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_CHECK(PKIX_PL_Sprintf
|
|
Packit |
40b132 |
(&outString, plContext, format, issuerString, subjectString),
|
|
Packit |
40b132 |
PKIX_ERRORINSPRINTF);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
*pString = outString;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
cleanup:
|
|
Packit |
40b132 |
PKIX_DECREF(format);
|
|
Packit |
40b132 |
PKIX_DECREF(issuerString);
|
|
Packit |
40b132 |
PKIX_DECREF(subjectString);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_RETURN(CERTPOLICYMAP);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* FUNCTION: pkix_pl_CertPolicyMap_Hashcode
|
|
Packit |
40b132 |
* (see comments for PKIX_PL_HashcodeCallback in pkix_pl_system.h)
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
static PKIX_Error *
|
|
Packit |
40b132 |
pkix_pl_CertPolicyMap_Hashcode(
|
|
Packit |
40b132 |
PKIX_PL_Object *object,
|
|
Packit |
40b132 |
PKIX_UInt32 *pHashcode,
|
|
Packit |
40b132 |
void *plContext)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
PKIX_UInt32 issuerHash = 0;
|
|
Packit |
40b132 |
PKIX_UInt32 subjectHash = 0;
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap *certMap = NULL;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_Hashcode");
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_NULLCHECK_TWO(object, pHashcode);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_CHECK(pkix_CheckType(object, PKIX_CERTPOLICYMAP_TYPE, plContext),
|
|
Packit |
40b132 |
PKIX_OBJECTNOTCERTPOLICYMAP);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
certMap = (PKIX_PL_CertPolicyMap *)object;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_HASHCODE
|
|
Packit |
40b132 |
(certMap->issuerDomainPolicy,
|
|
Packit |
40b132 |
&issuerHash,
|
|
Packit |
40b132 |
plContext,
|
|
Packit |
40b132 |
PKIX_OBJECTHASHCODEFAILED);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_HASHCODE
|
|
Packit |
40b132 |
(certMap->subjectDomainPolicy,
|
|
Packit |
40b132 |
&subjectHash,
|
|
Packit |
40b132 |
plContext,
|
|
Packit |
40b132 |
PKIX_OBJECTHASHCODEFAILED);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
*pHashcode = issuerHash*31 + subjectHash;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
cleanup:
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_RETURN(CERTPOLICYMAP);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* FUNCTION: pkix_pl_CertPolicyMap_Equals
|
|
Packit |
40b132 |
* (see comments for PKIX_PL_Equals_Callback in pkix_pl_system.h)
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
static PKIX_Error *
|
|
Packit |
40b132 |
pkix_pl_CertPolicyMap_Equals(
|
|
Packit |
40b132 |
PKIX_PL_Object *firstObject,
|
|
Packit |
40b132 |
PKIX_PL_Object *secondObject,
|
|
Packit |
40b132 |
PKIX_Boolean *pResult,
|
|
Packit |
40b132 |
void *plContext)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap *firstCertMap = NULL;
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap *secondCertMap = NULL;
|
|
Packit |
40b132 |
PKIX_UInt32 secondType = 0;
|
|
Packit |
40b132 |
PKIX_Boolean compare = PKIX_FALSE;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_Equals");
|
|
Packit |
40b132 |
PKIX_NULLCHECK_THREE(firstObject, secondObject, pResult);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/* test that firstObject is a CertPolicyMap */
|
|
Packit |
40b132 |
PKIX_CHECK(pkix_CheckType
|
|
Packit |
40b132 |
(firstObject, PKIX_CERTPOLICYMAP_TYPE, plContext),
|
|
Packit |
40b132 |
PKIX_FIRSTOBJECTNOTCERTPOLICYMAP);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* Since we know firstObject is a CertPolicyMap,
|
|
Packit |
40b132 |
* if both references are identical, they must be equal
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
if (firstObject == secondObject){
|
|
Packit |
40b132 |
*pResult = PKIX_TRUE;
|
|
Packit |
40b132 |
goto cleanup;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* If secondObject isn't a CertPolicyMap, we
|
|
Packit |
40b132 |
* don't throw an error. We simply return FALSE.
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
PKIX_CHECK(PKIX_PL_Object_GetType
|
|
Packit |
40b132 |
(secondObject, &secondType, plContext),
|
|
Packit |
40b132 |
PKIX_COULDNOTGETTYPEOFSECONDARGUMENT);
|
|
Packit |
40b132 |
if (secondType != PKIX_CERTPOLICYMAP_TYPE) {
|
|
Packit |
40b132 |
*pResult = PKIX_FALSE;
|
|
Packit |
40b132 |
goto cleanup;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
firstCertMap = (PKIX_PL_CertPolicyMap *)firstObject;
|
|
Packit |
40b132 |
secondCertMap = (PKIX_PL_CertPolicyMap *)secondObject;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_EQUALS
|
|
Packit |
40b132 |
(firstCertMap->issuerDomainPolicy,
|
|
Packit |
40b132 |
secondCertMap->issuerDomainPolicy,
|
|
Packit |
40b132 |
&compare,
|
|
Packit |
40b132 |
plContext,
|
|
Packit |
40b132 |
PKIX_OBJECTEQUALSFAILED);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
if (compare) {
|
|
Packit |
40b132 |
PKIX_EQUALS
|
|
Packit |
40b132 |
(firstCertMap->subjectDomainPolicy,
|
|
Packit |
40b132 |
secondCertMap->subjectDomainPolicy,
|
|
Packit |
40b132 |
&compare,
|
|
Packit |
40b132 |
plContext,
|
|
Packit |
40b132 |
PKIX_OBJECTEQUALSFAILED);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
*pResult = compare;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
cleanup:
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_RETURN(CERTPOLICYMAP);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* FUNCTION: pkix_pl_CertPolicyMap_Duplicate
|
|
Packit |
40b132 |
* (see comments for PKIX_PL_Duplicate_Callback in pkix_pl_system.h)
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
static PKIX_Error *
|
|
Packit |
40b132 |
pkix_pl_CertPolicyMap_Duplicate(
|
|
Packit |
40b132 |
PKIX_PL_Object *object,
|
|
Packit |
40b132 |
PKIX_PL_Object **pNewObject,
|
|
Packit |
40b132 |
void *plContext)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap *original = NULL;
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap *copy = NULL;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_Duplicate");
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_NULLCHECK_TWO(object, pNewObject);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_CHECK(pkix_CheckType
|
|
Packit |
40b132 |
(object, PKIX_CERTPOLICYMAP_TYPE, plContext),
|
|
Packit |
40b132 |
PKIX_OBJECTARGUMENTNOTPOLICYMAP);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
original = (PKIX_PL_CertPolicyMap *)object;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_CHECK(pkix_pl_CertPolicyMap_Create
|
|
Packit |
40b132 |
(original->issuerDomainPolicy,
|
|
Packit |
40b132 |
original->subjectDomainPolicy,
|
|
Packit |
40b132 |
©,
|
|
Packit |
40b132 |
plContext),
|
|
Packit |
40b132 |
PKIX_CERTPOLICYMAPCREATEFAILED);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
*pNewObject = (PKIX_PL_Object *)copy;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
cleanup:
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_RETURN(CERTPOLICYMAP);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* FUNCTION: pkix_pl_CertPolicyMap_RegisterSelf
|
|
Packit |
40b132 |
* DESCRIPTION:
|
|
Packit |
40b132 |
* Registers PKIX_CERTPOLICYMAP_TYPE and its related
|
|
Packit |
40b132 |
* functions with systemClasses[]
|
|
Packit |
40b132 |
* THREAD SAFETY:
|
|
Packit |
40b132 |
* Not Thread Safe - for performance and complexity reasons
|
|
Packit |
40b132 |
*
|
|
Packit |
40b132 |
* Since this function is only called by PKIX_PL_Initialize,
|
|
Packit |
40b132 |
* which should only be called once, it is acceptable that
|
|
Packit |
40b132 |
* this function is not thread-safe.
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
PKIX_Error *
|
|
Packit |
40b132 |
pkix_pl_CertPolicyMap_RegisterSelf(void *plContext)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
extern pkix_ClassTable_Entry systemClasses[PKIX_NUMTYPES];
|
|
Packit |
40b132 |
pkix_ClassTable_Entry entry;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_ENTER(CERTPOLICYMAP, "pkix_pl_CertPolicyMap_RegisterSelf");
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
entry.description = "CertPolicyMap";
|
|
Packit |
40b132 |
entry.objCounter = 0;
|
|
Packit |
40b132 |
entry.typeObjectSize = sizeof(PKIX_PL_CertPolicyMap);
|
|
Packit |
40b132 |
entry.destructor = pkix_pl_CertPolicyMap_Destroy;
|
|
Packit |
40b132 |
entry.equalsFunction = pkix_pl_CertPolicyMap_Equals;
|
|
Packit |
40b132 |
entry.hashcodeFunction = pkix_pl_CertPolicyMap_Hashcode;
|
|
Packit |
40b132 |
entry.toStringFunction = pkix_pl_CertPolicyMap_ToString;
|
|
Packit |
40b132 |
entry.comparator = NULL;
|
|
Packit |
40b132 |
entry.duplicateFunction = pkix_pl_CertPolicyMap_Duplicate;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
systemClasses[PKIX_CERTPOLICYMAP_TYPE] = entry;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_RETURN(CERTPOLICYMAP);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/* --Public-CertPolicyMap-Functions------------------------- */
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* FUNCTION: PKIX_PL_CertPolicyMap_GetIssuerDomainPolicy
|
|
Packit |
40b132 |
* (see comments in pkix_pl_pki.h)
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
PKIX_Error *
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap_GetIssuerDomainPolicy(
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap *policyMapping,
|
|
Packit |
40b132 |
PKIX_PL_OID **pIssuerDomainPolicy,
|
|
Packit |
40b132 |
void *plContext)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
PKIX_ENTER
|
|
Packit |
40b132 |
(CERTPOLICYMAP, "PKIX_PL_CertPolicyMap_GetIssuerDomainPolicy");
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_NULLCHECK_TWO(policyMapping, pIssuerDomainPolicy);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_INCREF(policyMapping->issuerDomainPolicy);
|
|
Packit |
40b132 |
*pIssuerDomainPolicy = policyMapping->issuerDomainPolicy;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
cleanup:
|
|
Packit |
40b132 |
PKIX_RETURN(CERTPOLICYMAP);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* FUNCTION: PKIX_PL_CertPolicyMap_GetSubjectDomainPolicy
|
|
Packit |
40b132 |
* (see comments in pkix_pl_pki.h)
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
PKIX_Error *
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap_GetSubjectDomainPolicy(
|
|
Packit |
40b132 |
PKIX_PL_CertPolicyMap *policyMapping,
|
|
Packit |
40b132 |
PKIX_PL_OID **pSubjectDomainPolicy,
|
|
Packit |
40b132 |
void *plContext)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
PKIX_ENTER
|
|
Packit |
40b132 |
(CERTPOLICYMAP, "PKIX_PL_CertPolicyMap_GetSubjectDomainPolicy");
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_NULLCHECK_TWO(policyMapping, pSubjectDomainPolicy);
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
PKIX_INCREF(policyMapping->subjectDomainPolicy);
|
|
Packit |
40b132 |
*pSubjectDomainPolicy = policyMapping->subjectDomainPolicy;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
cleanup:
|
|
Packit |
40b132 |
PKIX_RETURN(CERTPOLICYMAP);
|
|
Packit |
40b132 |
}
|