Mercurial > trustbridge > nss-cmake-static
comparison nss/lib/libpkix/pkix_pl_nss/pki/pkix_pl_infoaccess.c @ 0:1e5118fa0cb1
This is NSS with a Cmake Buildsyste
To compile a static NSS library for Windows we've used the
Chromium-NSS fork and added a Cmake buildsystem to compile
it statically for Windows. See README.chromium for chromium
changes and README.trustbridge for our modifications.
author | Andre Heinecke <andre.heinecke@intevation.de> |
---|---|
date | Mon, 28 Jul 2014 10:47:06 +0200 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
-1:000000000000 | 0:1e5118fa0cb1 |
---|---|
1 /* This Source Code Form is subject to the terms of the Mozilla Public | |
2 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
4 /* | |
5 * pkix_pl_infoaccess.c | |
6 * | |
7 * InfoAccess Object Definitions | |
8 * | |
9 */ | |
10 | |
11 #include "pkix_pl_infoaccess.h" | |
12 | |
13 /* --Private-InfoAccess-Functions----------------------------------*/ | |
14 | |
15 /* | |
16 * FUNCTION: pkix_pl_InfoAccess_Create | |
17 * DESCRIPTION: | |
18 * | |
19 * This function creates an InfoAccess from the method provided in "method" and | |
20 * the GeneralName provided in "generalName" and stores the result at | |
21 * "pInfoAccess". | |
22 * | |
23 * PARAMETERS | |
24 * "method" | |
25 * The UInt32 value to be stored as the method field of the InfoAccess. | |
26 * "generalName" | |
27 * The GeneralName to be stored as the generalName field of the InfoAccess. | |
28 * Must be non-NULL. | |
29 * "pInfoAccess" | |
30 * Address where the result is stored. Must be non-NULL. | |
31 * "plContext" | |
32 * Platform-specific context pointer. | |
33 * THREAD SAFETY: | |
34 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
35 * RETURNS: | |
36 * Returns NULL if the function succeeds. | |
37 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
38 */ | |
39 static PKIX_Error * | |
40 pkix_pl_InfoAccess_Create( | |
41 PKIX_UInt32 method, | |
42 PKIX_PL_GeneralName *generalName, | |
43 PKIX_PL_InfoAccess **pInfoAccess, | |
44 void *plContext) | |
45 { | |
46 | |
47 PKIX_PL_InfoAccess *infoAccess = NULL; | |
48 | |
49 PKIX_ENTER(INFOACCESS, "pkix_pl_InfoAccess_Create"); | |
50 PKIX_NULLCHECK_TWO(generalName, pInfoAccess); | |
51 | |
52 PKIX_CHECK(PKIX_PL_Object_Alloc | |
53 (PKIX_INFOACCESS_TYPE, | |
54 sizeof (PKIX_PL_InfoAccess), | |
55 (PKIX_PL_Object **)&infoAccess, | |
56 plContext), | |
57 PKIX_COULDNOTCREATEINFOACCESSOBJECT); | |
58 | |
59 infoAccess->method = method; | |
60 | |
61 PKIX_INCREF(generalName); | |
62 infoAccess->location = generalName; | |
63 | |
64 *pInfoAccess = infoAccess; | |
65 infoAccess = NULL; | |
66 | |
67 cleanup: | |
68 PKIX_DECREF(infoAccess); | |
69 | |
70 PKIX_RETURN(INFOACCESS); | |
71 } | |
72 | |
73 /* | |
74 * FUNCTION: pkix_pl_InfoAccess_Destroy | |
75 * (see comments for PKIX_PL_DestructorCallback in pkix_pl_pki.h) | |
76 */ | |
77 static PKIX_Error * | |
78 pkix_pl_InfoAccess_Destroy( | |
79 PKIX_PL_Object *object, | |
80 void *plContext) | |
81 { | |
82 PKIX_PL_InfoAccess *infoAccess = NULL; | |
83 | |
84 PKIX_ENTER(INFOACCESS, "pkix_pl_InfoAccess_Destroy"); | |
85 PKIX_NULLCHECK_ONE(object); | |
86 | |
87 PKIX_CHECK(pkix_CheckType(object, PKIX_INFOACCESS_TYPE, plContext), | |
88 PKIX_OBJECTNOTANINFOACCESS); | |
89 | |
90 infoAccess = (PKIX_PL_InfoAccess *)object; | |
91 | |
92 PKIX_DECREF(infoAccess->location); | |
93 | |
94 cleanup: | |
95 | |
96 PKIX_RETURN(INFOACCESS); | |
97 } | |
98 | |
99 /* | |
100 * FUNCTION: pkix_pl_InfoAccess_ToString | |
101 * (see comments for PKIX_PL_ToStringCallback in pkix_pl_pki.h) | |
102 */ | |
103 static PKIX_Error * | |
104 pkix_pl_InfoAccess_ToString( | |
105 PKIX_PL_Object *object, | |
106 PKIX_PL_String **pString, | |
107 void *plContext) | |
108 { | |
109 PKIX_PL_InfoAccess *infoAccess; | |
110 PKIX_PL_String *infoAccessString = NULL; | |
111 char *asciiFormat = NULL; | |
112 char *asciiMethod = NULL; | |
113 PKIX_PL_String *formatString = NULL; | |
114 PKIX_PL_String *methodString = NULL; | |
115 PKIX_PL_String *locationString = NULL; | |
116 | |
117 PKIX_ENTER(INFOACCESS, "pkix_pl_InfoAccess_ToString"); | |
118 PKIX_NULLCHECK_TWO(object, pString); | |
119 | |
120 PKIX_CHECK(pkix_CheckType | |
121 (object, PKIX_INFOACCESS_TYPE, plContext), | |
122 PKIX_OBJECTNOTINFOACCESS); | |
123 | |
124 infoAccess = (PKIX_PL_InfoAccess *)object; | |
125 | |
126 asciiFormat = | |
127 "[" | |
128 "method:%s, " | |
129 "location:%s" | |
130 "]"; | |
131 | |
132 PKIX_CHECK(PKIX_PL_String_Create | |
133 (PKIX_ESCASCII, | |
134 asciiFormat, | |
135 0, | |
136 &formatString, | |
137 plContext), | |
138 PKIX_STRINGCREATEFAILED); | |
139 | |
140 switch(infoAccess->method) { | |
141 case PKIX_INFOACCESS_CA_ISSUERS: | |
142 asciiMethod = "caIssuers"; | |
143 break; | |
144 case PKIX_INFOACCESS_OCSP: | |
145 asciiMethod = "ocsp"; | |
146 break; | |
147 case PKIX_INFOACCESS_TIMESTAMPING: | |
148 asciiMethod = "timestamping"; | |
149 break; | |
150 case PKIX_INFOACCESS_CA_REPOSITORY: | |
151 asciiMethod = "caRepository"; | |
152 break; | |
153 default: | |
154 asciiMethod = "unknown"; | |
155 } | |
156 | |
157 PKIX_CHECK(PKIX_PL_String_Create | |
158 (PKIX_ESCASCII, | |
159 asciiMethod, | |
160 0, | |
161 &methodString, | |
162 plContext), | |
163 PKIX_STRINGCREATEFAILED); | |
164 | |
165 PKIX_TOSTRING(infoAccess->location, &locationString, plContext, | |
166 PKIX_GENERALNAMETOSTRINGFAILED); | |
167 | |
168 PKIX_CHECK(PKIX_PL_Sprintf | |
169 (&infoAccessString, | |
170 plContext, | |
171 formatString, | |
172 methodString, | |
173 locationString), | |
174 PKIX_SPRINTFFAILED); | |
175 | |
176 *pString = infoAccessString; | |
177 | |
178 cleanup: | |
179 | |
180 PKIX_DECREF(formatString); | |
181 PKIX_DECREF(methodString); | |
182 PKIX_DECREF(locationString); | |
183 | |
184 PKIX_RETURN(INFOACCESS); | |
185 } | |
186 | |
187 /* | |
188 * FUNCTION: pkix_pl_InfoAccess_Hashcode | |
189 * (see comments for PKIX_PL_HashcodeCallback in pkix_pl_pki.h) | |
190 */ | |
191 static PKIX_Error * | |
192 pkix_pl_InfoAccess_Hashcode( | |
193 PKIX_PL_Object *object, | |
194 PKIX_UInt32 *pHashcode, | |
195 void *plContext) | |
196 { | |
197 PKIX_PL_InfoAccess *infoAccess = NULL; | |
198 PKIX_UInt32 infoAccessHash; | |
199 | |
200 PKIX_ENTER(INFOACCESS, "pkix_pl_InfoAccess_Hashcode"); | |
201 PKIX_NULLCHECK_TWO(object, pHashcode); | |
202 | |
203 PKIX_CHECK(pkix_CheckType | |
204 (object, PKIX_INFOACCESS_TYPE, plContext), | |
205 PKIX_OBJECTNOTINFOACCESS); | |
206 | |
207 infoAccess = (PKIX_PL_InfoAccess *)object; | |
208 | |
209 PKIX_HASHCODE(infoAccess->location, &infoAccessHash, plContext, | |
210 PKIX_OBJECTHASHCODEFAILED); | |
211 | |
212 infoAccessHash += (infoAccess->method << 7); | |
213 | |
214 *pHashcode = infoAccessHash; | |
215 | |
216 cleanup: | |
217 | |
218 PKIX_RETURN(INFOACCESS); | |
219 | |
220 } | |
221 | |
222 /* | |
223 * FUNCTION: pkix_pl_InfoAccess_Equals | |
224 * (see comments for PKIX_PL_Equals_Callback in pkix_pl_pki.h) | |
225 */ | |
226 static PKIX_Error * | |
227 pkix_pl_InfoAccess_Equals( | |
228 PKIX_PL_Object *firstObject, | |
229 PKIX_PL_Object *secondObject, | |
230 PKIX_Boolean *pResult, | |
231 void *plContext) | |
232 { | |
233 PKIX_PL_InfoAccess *firstInfoAccess = NULL; | |
234 PKIX_PL_InfoAccess *secondInfoAccess = NULL; | |
235 PKIX_UInt32 secondType; | |
236 PKIX_Boolean cmpResult; | |
237 | |
238 PKIX_ENTER(INFOACCESS, "pkix_pl_InfoAccess_Equals"); | |
239 PKIX_NULLCHECK_THREE(firstObject, secondObject, pResult); | |
240 | |
241 /* test that firstObject is a InfoAccess */ | |
242 PKIX_CHECK(pkix_CheckType | |
243 (firstObject, PKIX_INFOACCESS_TYPE, plContext), | |
244 PKIX_FIRSTOBJECTNOTINFOACCESS); | |
245 | |
246 /* | |
247 * Since we know firstObject is a InfoAccess, if both references are | |
248 * identical, they must be equal | |
249 */ | |
250 if (firstObject == secondObject){ | |
251 *pResult = PKIX_TRUE; | |
252 goto cleanup; | |
253 } | |
254 | |
255 /* | |
256 * If secondObject isn't a InfoAccess, we don't throw an error. | |
257 * We simply return a Boolean result of FALSE | |
258 */ | |
259 *pResult = PKIX_FALSE; | |
260 PKIX_CHECK(PKIX_PL_Object_GetType | |
261 (secondObject, &secondType, plContext), | |
262 PKIX_COULDNOTGETTYPEOFSECONDARGUMENT); | |
263 if (secondType != PKIX_INFOACCESS_TYPE) goto cleanup; | |
264 | |
265 firstInfoAccess = (PKIX_PL_InfoAccess *)firstObject; | |
266 secondInfoAccess = (PKIX_PL_InfoAccess *)secondObject; | |
267 | |
268 *pResult = PKIX_FALSE; | |
269 | |
270 if (firstInfoAccess->method != secondInfoAccess->method) { | |
271 goto cleanup; | |
272 } | |
273 | |
274 PKIX_EQUALS(firstInfoAccess, secondInfoAccess, &cmpResult, plContext, | |
275 PKIX_OBJECTEQUALSFAILED); | |
276 | |
277 *pResult = cmpResult; | |
278 | |
279 cleanup: | |
280 | |
281 PKIX_RETURN(INFOACCESS); | |
282 } | |
283 | |
284 /* | |
285 * FUNCTION: pkix_pl_InfoAccess_RegisterSelf | |
286 * DESCRIPTION: | |
287 * Registers PKIX_INFOACCESS_TYPE and its related functions with systemClasses[] | |
288 * THREAD SAFETY: | |
289 * Not Thread Safe - for performance and complexity reasons | |
290 * | |
291 * Since this function is only called by PKIX_PL_Initialize, which should | |
292 * only be called once, it is acceptable that this function is not | |
293 * thread-safe. | |
294 */ | |
295 PKIX_Error * | |
296 pkix_pl_InfoAccess_RegisterSelf(void *plContext) | |
297 { | |
298 extern pkix_ClassTable_Entry systemClasses[PKIX_NUMTYPES]; | |
299 pkix_ClassTable_Entry entry; | |
300 | |
301 PKIX_ENTER(INFOACCESS, | |
302 "pkix_pl_InfoAccess_RegisterSelf"); | |
303 | |
304 entry.description = "InfoAccess"; | |
305 entry.objCounter = 0; | |
306 entry.typeObjectSize = sizeof(PKIX_PL_InfoAccess); | |
307 entry.destructor = pkix_pl_InfoAccess_Destroy; | |
308 entry.equalsFunction = pkix_pl_InfoAccess_Equals; | |
309 entry.hashcodeFunction = pkix_pl_InfoAccess_Hashcode; | |
310 entry.toStringFunction = pkix_pl_InfoAccess_ToString; | |
311 entry.comparator = NULL; | |
312 entry.duplicateFunction = pkix_duplicateImmutable; | |
313 | |
314 systemClasses[PKIX_INFOACCESS_TYPE] = entry; | |
315 | |
316 PKIX_RETURN(INFOACCESS); | |
317 } | |
318 | |
319 /* | |
320 * FUNCTION: pkix_pl_InfoAccess_CreateList | |
321 * DESCRIPTION: | |
322 * | |
323 * Based on data in CERTAuthInfoAccess array "nssInfoAccess", this function | |
324 * creates and returns a PKIX_List of PKIX_PL_InfoAccess at "pInfoAccessList". | |
325 * | |
326 * PARAMETERS | |
327 * "nssInfoAccess" | |
328 * The pointer array of CERTAuthInfoAccess that contains access data. | |
329 * May be NULL. | |
330 * "pInfoAccessList" | |
331 * Address where a list of PKIX_PL_InfoAccess is returned. | |
332 * Must be non-NULL. | |
333 * "plContext" | |
334 * Platform-specific context pointer. | |
335 * THREAD SAFETY: | |
336 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
337 * RETURNS: | |
338 * Returns NULL if the function succeeds. | |
339 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
340 */ | |
341 PKIX_Error * | |
342 pkix_pl_InfoAccess_CreateList( | |
343 CERTAuthInfoAccess **nssInfoAccess, | |
344 PKIX_List **pInfoAccessList, /* of PKIX_PL_InfoAccess */ | |
345 void *plContext) | |
346 { | |
347 PKIX_List *infoAccessList = NULL; | |
348 PKIX_PL_InfoAccess *infoAccess = NULL; | |
349 PKIX_PL_GeneralName *location = NULL; | |
350 PKIX_UInt32 method; | |
351 int i; | |
352 | |
353 PKIX_ENTER(INFOACCESS, "PKIX_PL_InfoAccess_CreateList"); | |
354 PKIX_NULLCHECK_ONE(pInfoAccessList); | |
355 | |
356 PKIX_CHECK(PKIX_List_Create(&infoAccessList, plContext), | |
357 PKIX_LISTCREATEFAILED); | |
358 | |
359 if (nssInfoAccess == NULL) { | |
360 goto cleanup; | |
361 } | |
362 | |
363 for (i = 0; nssInfoAccess[i] != NULL; i++) { | |
364 | |
365 if (nssInfoAccess[i]->location == NULL) { | |
366 continue; | |
367 } | |
368 | |
369 PKIX_CHECK(pkix_pl_GeneralName_Create | |
370 (nssInfoAccess[i]->location, &location, plContext), | |
371 PKIX_GENERALNAMECREATEFAILED); | |
372 | |
373 PKIX_CERT_DEBUG("\t\tCalling SECOID_FindOIDTag).\n"); | |
374 method = SECOID_FindOIDTag(&nssInfoAccess[i]->method); | |
375 /* Map NSS access method value into PKIX constant */ | |
376 switch(method) { | |
377 case SEC_OID_PKIX_CA_ISSUERS: | |
378 method = PKIX_INFOACCESS_CA_ISSUERS; | |
379 break; | |
380 case SEC_OID_PKIX_OCSP: | |
381 method = PKIX_INFOACCESS_OCSP; | |
382 break; | |
383 case SEC_OID_PKIX_TIMESTAMPING: | |
384 method = PKIX_INFOACCESS_TIMESTAMPING; | |
385 break; | |
386 case SEC_OID_PKIX_CA_REPOSITORY: | |
387 method = PKIX_INFOACCESS_CA_REPOSITORY; | |
388 break; | |
389 default: | |
390 PKIX_ERROR(PKIX_UNKNOWNINFOACCESSMETHOD); | |
391 } | |
392 | |
393 PKIX_CHECK(pkix_pl_InfoAccess_Create | |
394 (method, location, &infoAccess, plContext), | |
395 PKIX_INFOACCESSCREATEFAILED); | |
396 | |
397 PKIX_CHECK(PKIX_List_AppendItem | |
398 (infoAccessList, | |
399 (PKIX_PL_Object *)infoAccess, | |
400 plContext), | |
401 PKIX_LISTAPPENDITEMFAILED); | |
402 PKIX_DECREF(infoAccess); | |
403 PKIX_DECREF(location); | |
404 } | |
405 | |
406 *pInfoAccessList = infoAccessList; | |
407 infoAccessList = NULL; | |
408 | |
409 cleanup: | |
410 | |
411 PKIX_DECREF(infoAccessList); | |
412 PKIX_DECREF(infoAccess); | |
413 PKIX_DECREF(location); | |
414 | |
415 PKIX_RETURN(INFOACCESS); | |
416 } | |
417 | |
418 /* --Public-Functions------------------------------------------------------- */ | |
419 | |
420 /* | |
421 * FUNCTION: PKIX_PL_InfoAccess_GetMethod (see comments in pkix_pl_pki.h) | |
422 */ | |
423 PKIX_Error * | |
424 PKIX_PL_InfoAccess_GetMethod( | |
425 PKIX_PL_InfoAccess *infoAccess, | |
426 PKIX_UInt32 *pMethod, | |
427 void *plContext) | |
428 { | |
429 PKIX_ENTER(INFOACCESS, "PKIX_PL_InfoAccess_GetMethod"); | |
430 PKIX_NULLCHECK_TWO(infoAccess, pMethod); | |
431 | |
432 *pMethod = infoAccess->method; | |
433 | |
434 PKIX_RETURN(INFOACCESS); | |
435 } | |
436 | |
437 /* | |
438 * FUNCTION: PKIX_PL_InfoAccess_GetLocation (see comments in pkix_pl_pki.h) | |
439 */ | |
440 PKIX_Error * | |
441 PKIX_PL_InfoAccess_GetLocation( | |
442 PKIX_PL_InfoAccess *infoAccess, | |
443 PKIX_PL_GeneralName **pLocation, | |
444 void *plContext) | |
445 { | |
446 PKIX_ENTER(INFOACCESS, "PKIX_PL_InfoAccess_GetLocation"); | |
447 PKIX_NULLCHECK_TWO(infoAccess, pLocation); | |
448 | |
449 PKIX_INCREF(infoAccess->location); | |
450 | |
451 *pLocation = infoAccess->location; | |
452 | |
453 cleanup: | |
454 PKIX_RETURN(INFOACCESS); | |
455 } | |
456 | |
457 /* | |
458 * FUNCTION: PKIX_PL_InfoAccess_GetLocationType (see comments in pkix_pl_pki.h) | |
459 */ | |
460 PKIX_Error * | |
461 PKIX_PL_InfoAccess_GetLocationType( | |
462 PKIX_PL_InfoAccess *infoAccess, | |
463 PKIX_UInt32 *pType, | |
464 void *plContext) | |
465 { | |
466 PKIX_PL_String *locationString = NULL; | |
467 PKIX_UInt32 type = PKIX_INFOACCESS_LOCATION_UNKNOWN; | |
468 PKIX_UInt32 len = 0; | |
469 void *location = NULL; | |
470 | |
471 PKIX_ENTER(INFOACCESS, "PKIX_PL_InfoAccess_GetLocationType"); | |
472 PKIX_NULLCHECK_TWO(infoAccess, pType); | |
473 | |
474 if (infoAccess->location != NULL) { | |
475 | |
476 PKIX_TOSTRING(infoAccess->location, &locationString, plContext, | |
477 PKIX_GENERALNAMETOSTRINGFAILED); | |
478 | |
479 PKIX_CHECK(PKIX_PL_String_GetEncoded | |
480 (locationString, PKIX_ESCASCII, &location, &len, plContext), | |
481 PKIX_STRINGGETENCODEDFAILED); | |
482 | |
483 PKIX_OID_DEBUG("\tCalling PORT_Strcmp).\n"); | |
484 #ifndef NSS_PKIX_NO_LDAP | |
485 if (PORT_Strncmp(location, "ldap:", 5) == 0){ | |
486 type = PKIX_INFOACCESS_LOCATION_LDAP; | |
487 } else | |
488 #endif | |
489 if (PORT_Strncmp(location, "http:", 5) == 0){ | |
490 type = PKIX_INFOACCESS_LOCATION_HTTP; | |
491 } | |
492 } | |
493 | |
494 *pType = type; | |
495 | |
496 cleanup: | |
497 | |
498 PKIX_PL_Free(location, plContext); | |
499 PKIX_DECREF(locationString); | |
500 | |
501 PKIX_RETURN(INFOACCESS); | |
502 } | |
503 | |
504 #ifndef NSS_PKIX_NO_LDAP | |
505 /* | |
506 * FUNCTION: pkix_pl_InfoAccess_ParseTokens | |
507 * DESCRIPTION: | |
508 * | |
509 * This function parses the string beginning at "startPos" into tokens using | |
510 * the separator contained in "separator" and the terminator contained in | |
511 * "terminator", copying the tokens into space allocated from the arena | |
512 * pointed to by "arena". It stores in "tokens" a null-terminated array of | |
513 * pointers to those tokens. | |
514 * | |
515 * PARAMETERS | |
516 * "arena" | |
517 * Address of a PLArenaPool to be used in populating the LDAPLocation. | |
518 * Must be non-NULL. | |
519 * "startPos" | |
520 * The address of char string that contains a subset of ldap location. | |
521 * "tokens" | |
522 * The address of an array of char string for storing returned tokens. | |
523 * Must be non-NULL. | |
524 * "separator" | |
525 * The character that is taken as token separator. Must be non-NULL. | |
526 * "terminator" | |
527 * The character that is taken as parsing terminator. Must be non-NULL. | |
528 * "plContext" | |
529 * Platform-specific context pointer. | |
530 * THREAD SAFETY: | |
531 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
532 * RETURNS: | |
533 * Returns NULL if the function succeeds. | |
534 * Returns an InfoAccess Error if the function fails in a non-fatal way. | |
535 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
536 */ | |
537 static PKIX_Error * | |
538 pkix_pl_InfoAccess_ParseTokens( | |
539 PLArenaPool *arena, | |
540 char **startPos, /* return update */ | |
541 char ***tokens, | |
542 char separator, | |
543 char terminator, | |
544 void *plContext) | |
545 { | |
546 PKIX_UInt32 numFilters = 0; | |
547 char *endPos = NULL; | |
548 char **filterP = NULL; | |
549 | |
550 PKIX_ENTER(INFOACCESS, "pkix_pl_InfoAccess_ParseTokens"); | |
551 PKIX_NULLCHECK_THREE(arena, startPos, tokens); | |
552 | |
553 endPos = *startPos; | |
554 | |
555 /* First pass: parse to <terminator> to count number of components */ | |
556 numFilters = 0; | |
557 while (*endPos != terminator && *endPos != '\0') { | |
558 endPos++; | |
559 if (*endPos == separator) { | |
560 numFilters++; | |
561 } | |
562 } | |
563 | |
564 if (*endPos != terminator) { | |
565 PKIX_ERROR(PKIX_LOCATIONSTRINGNOTPROPERLYTERMINATED); | |
566 } | |
567 | |
568 /* Last component doesn't need a separator, although we allow it */ | |
569 if (endPos > *startPos && *(endPos-1) != separator) { | |
570 numFilters++; | |
571 } | |
572 | |
573 /* | |
574 * If string is a=xx, b=yy, c=zz, etc., use a=xx for filter, | |
575 * and everything else for the base | |
576 */ | |
577 if (numFilters > 2) numFilters = 2; | |
578 | |
579 filterP = PORT_ArenaZNewArray(arena, char*, numFilters+1); | |
580 if (filterP == NULL) { | |
581 PKIX_ERROR(PKIX_PORTARENAALLOCFAILED); | |
582 } | |
583 | |
584 /* Second pass: parse to fill in components in token array */ | |
585 *tokens = filterP; | |
586 endPos = *startPos; | |
587 | |
588 while (numFilters) { | |
589 if (*endPos == separator || *endPos == terminator) { | |
590 PKIX_UInt32 len = endPos - *startPos; | |
591 char *p = PORT_ArenaZAlloc(arena, len+1); | |
592 if (p == NULL) { | |
593 PKIX_ERROR(PKIX_PORTARENAALLOCFAILED); | |
594 } | |
595 | |
596 PORT_Memcpy(p, *startPos, len); | |
597 p[len] = '\0'; | |
598 | |
599 *filterP = p; | |
600 filterP++; | |
601 numFilters--; | |
602 | |
603 separator = terminator; | |
604 | |
605 if (*endPos == '\0') { | |
606 *startPos = endPos; | |
607 break; | |
608 } else { | |
609 endPos++; | |
610 *startPos = endPos; | |
611 continue; | |
612 } | |
613 } | |
614 endPos++; | |
615 } | |
616 | |
617 *filterP = NULL; | |
618 | |
619 cleanup: | |
620 | |
621 PKIX_RETURN(INFOACCESS); | |
622 } | |
623 | |
624 static int | |
625 pkix_pl_HexDigitToInt( | |
626 int ch) | |
627 { | |
628 if (isdigit(ch)) { | |
629 ch = ch - '0'; | |
630 } else if (isupper(ch)) { | |
631 ch = ch - 'A' + 10; | |
632 } else { | |
633 ch = ch - 'a' + 10; | |
634 } | |
635 return ch; | |
636 } | |
637 | |
638 /* | |
639 * Convert the "%" hex hex escape sequences in the URL 'location' in place. | |
640 */ | |
641 static void | |
642 pkix_pl_UnescapeURL( | |
643 char *location) | |
644 { | |
645 const char *src; | |
646 char *dst; | |
647 | |
648 for (src = dst = location; *src != '\0'; src++, dst++) { | |
649 if (*src == '%' && isxdigit((unsigned char)*(src+1)) && | |
650 isxdigit((unsigned char)*(src+2))) { | |
651 *dst = pkix_pl_HexDigitToInt((unsigned char)*(src+1)); | |
652 *dst *= 16; | |
653 *dst += pkix_pl_HexDigitToInt((unsigned char)*(src+2)); | |
654 src += 2; | |
655 } else { | |
656 *dst = *src; | |
657 } | |
658 } | |
659 *dst = *src; /* the terminating null */ | |
660 } | |
661 | |
662 /* | |
663 * FUNCTION: pkix_pl_InfoAccess_ParseLocation | |
664 * DESCRIPTION: | |
665 * | |
666 * This function parses the GeneralName pointed to by "generalName" into the | |
667 * fields of the LDAPRequestParams pointed to by "request" and a domainName | |
668 * pointed to by "pDomainName", using the PLArenaPool pointed to by "arena" to | |
669 * allocate storage for the request components and for the domainName string. | |
670 * | |
671 * The expected GeneralName string should be in the format described by the | |
672 * following BNF: | |
673 * | |
674 * ldap://<ldap-server-site>/[cn=<cname>][,o=<org>][,c=<country>]? | |
675 * [caCertificate|crossCertificatPair|certificateRevocationList]; | |
676 * [binary|<other-type>] | |
677 * [[,caCertificate|crossCertificatPair|certificateRevocationList] | |
678 * [binary|<other-type>]]* | |
679 * | |
680 * PARAMETERS | |
681 * "generalName" | |
682 * Address of the GeneralName whose LDAPLocation is to be parsed. Must be | |
683 * non-NULL. | |
684 * "arena" | |
685 * Address of PLArenaPool to be used for the domainName and for components | |
686 * of the LDAPRequest. Must be non-NULL. | |
687 * "request" | |
688 * Address of the LDAPRequestParams into which request components are | |
689 * stored. Must be non-NULL. | |
690 * *pDomainName" | |
691 * Address at which the domainName is stored. Must be non-NULL. | |
692 * "plContext" | |
693 * Platform-specific context pointer. | |
694 * THREAD SAFETY: | |
695 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
696 * RETURNS: | |
697 * Returns NULL if the function succeeds. | |
698 * Returns an InfoAccess Error if the function fails in a non-fatal way. | |
699 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
700 */ | |
701 PKIX_Error * | |
702 pkix_pl_InfoAccess_ParseLocation( | |
703 PKIX_PL_GeneralName *generalName, | |
704 PLArenaPool *arena, | |
705 LDAPRequestParams *request, | |
706 char **pDomainName, | |
707 void *plContext) | |
708 { | |
709 PKIX_PL_String *locationString = NULL; | |
710 PKIX_UInt32 len = 0; | |
711 PKIX_UInt32 ncIndex = 0; | |
712 char *domainName = NULL; | |
713 char **avaArray = NULL; | |
714 char **attrArray = NULL; | |
715 char *attr = NULL; | |
716 char *locationAscii = NULL; | |
717 char *startPos = NULL; | |
718 char *endPos = NULL; | |
719 char *avaPtr = NULL; | |
720 LdapAttrMask attrBit = 0; | |
721 LDAPNameComponent **setOfNameComponent = NULL; | |
722 LDAPNameComponent *nameComponent = NULL; | |
723 | |
724 PKIX_ENTER(INFOACCESS, "pkix_pl_InfoAccess_ParseLocation"); | |
725 PKIX_NULLCHECK_FOUR(generalName, arena, request, pDomainName); | |
726 | |
727 PKIX_TOSTRING(generalName, &locationString, plContext, | |
728 PKIX_GENERALNAMETOSTRINGFAILED); | |
729 | |
730 PKIX_CHECK(PKIX_PL_String_GetEncoded | |
731 (locationString, | |
732 PKIX_ESCASCII, | |
733 (void **)&locationAscii, | |
734 &len, | |
735 plContext), | |
736 PKIX_STRINGGETENCODEDFAILED); | |
737 | |
738 pkix_pl_UnescapeURL(locationAscii); | |
739 | |
740 /* Skip "ldap:" */ | |
741 endPos = locationAscii; | |
742 while (*endPos != ':' && *endPos != '\0') { | |
743 endPos++; | |
744 } | |
745 if (*endPos == '\0') { | |
746 PKIX_ERROR(PKIX_GENERALNAMESTRINGMISSINGLOCATIONTYPE); | |
747 } | |
748 | |
749 /* Skip "//" */ | |
750 endPos++; | |
751 if (*endPos != '\0' && *(endPos+1) != '0' && | |
752 *endPos == '/' && *(endPos+1) == '/') { | |
753 endPos += 2; | |
754 } else { | |
755 PKIX_ERROR(PKIX_GENERALNAMESTRINGMISSINGDOUBLESLASH); | |
756 } | |
757 | |
758 /* Get the server-site */ | |
759 startPos = endPos; | |
760 while(*endPos != '/' && *(endPos) != '\0') { | |
761 endPos++; | |
762 } | |
763 if (*endPos == '\0') { | |
764 PKIX_ERROR(PKIX_GENERALNAMESTRINGMISSINGSERVERSITE); | |
765 } | |
766 | |
767 len = endPos - startPos; | |
768 endPos++; | |
769 | |
770 domainName = PORT_ArenaZAlloc(arena, len + 1); | |
771 if (!domainName) { | |
772 PKIX_ERROR(PKIX_PORTARENAALLOCFAILED); | |
773 } | |
774 | |
775 PORT_Memcpy(domainName, startPos, len); | |
776 | |
777 domainName[len] = '\0'; | |
778 | |
779 *pDomainName = domainName; | |
780 | |
781 /* | |
782 * Get a list of AttrValueAssertions (such as | |
783 * "cn=CommonName, o=Organization, c=US" into a null-terminated array | |
784 */ | |
785 startPos = endPos; | |
786 PKIX_CHECK(pkix_pl_InfoAccess_ParseTokens | |
787 (arena, | |
788 &startPos, | |
789 (char ***) &avaArray, | |
790 ',', | |
791 '?', | |
792 plContext), | |
793 PKIX_INFOACCESSPARSETOKENSFAILED); | |
794 | |
795 /* Count how many AVAs we have */ | |
796 for (len = 0; avaArray[len] != NULL; len++) {} | |
797 | |
798 if (len < 2) { | |
799 PKIX_ERROR(PKIX_NOTENOUGHNAMECOMPONENTSINGENERALNAME); | |
800 } | |
801 | |
802 /* Use last name component for baseObject */ | |
803 request->baseObject = avaArray[len - 1]; | |
804 | |
805 /* Use only one component for filter. LDAP servers aren't too smart. */ | |
806 len = 2; /* Eliminate this when servers get smarter. */ | |
807 | |
808 avaArray[len - 1] = NULL; | |
809 | |
810 /* Get room for null-terminated array of (LdapNameComponent *) */ | |
811 setOfNameComponent = PORT_ArenaZNewArray(arena, LDAPNameComponent *, len); | |
812 if (setOfNameComponent == NULL) { | |
813 PKIX_ERROR(PKIX_PORTARENAALLOCFAILED); | |
814 } | |
815 | |
816 /* Get room for the remaining LdapNameComponents */ | |
817 nameComponent = PORT_ArenaZNewArray(arena, LDAPNameComponent, --len); | |
818 if (nameComponent == NULL) { | |
819 PKIX_ERROR(PKIX_PORTARENAALLOCFAILED); | |
820 } | |
821 | |
822 /* Convert remaining AVAs to LDAPNameComponents */ | |
823 for (ncIndex = 0; ncIndex < len; ncIndex ++) { | |
824 setOfNameComponent[ncIndex] = nameComponent; | |
825 avaPtr = avaArray[ncIndex]; | |
826 nameComponent->attrType = (unsigned char *)avaPtr; | |
827 while ((*avaPtr != '=') && (*avaPtr != '\0')) { | |
828 avaPtr++; | |
829 if (*avaPtr == '\0') { | |
830 PKIX_ERROR(PKIX_NAMECOMPONENTWITHNOEQ); | |
831 } | |
832 } | |
833 *(avaPtr++) = '\0'; | |
834 nameComponent->attrValue = (unsigned char *)avaPtr; | |
835 nameComponent++; | |
836 } | |
837 | |
838 setOfNameComponent[len] = NULL; | |
839 request->nc = setOfNameComponent; | |
840 | |
841 /* | |
842 * Get a list of AttrTypes (such as | |
843 * "caCertificate;binary, crossCertificatePair;binary") into | |
844 * a null-terminated array | |
845 */ | |
846 | |
847 PKIX_CHECK(pkix_pl_InfoAccess_ParseTokens | |
848 (arena, | |
849 (char **) &startPos, | |
850 (char ***) &attrArray, | |
851 ',', | |
852 '\0', | |
853 plContext), | |
854 PKIX_INFOACCESSPARSETOKENSFAILED); | |
855 | |
856 /* Convert array of Attr Types into a bit mask */ | |
857 request->attributes = 0; | |
858 attr = attrArray[0]; | |
859 while (attr != NULL) { | |
860 PKIX_CHECK(pkix_pl_LdapRequest_AttrStringToBit | |
861 (attr, &attrBit, plContext), | |
862 PKIX_LDAPREQUESTATTRSTRINGTOBITFAILED); | |
863 request->attributes |= attrBit; | |
864 attr = *(++attrArray); | |
865 } | |
866 | |
867 cleanup: | |
868 | |
869 PKIX_PL_Free(locationAscii, plContext); | |
870 PKIX_DECREF(locationString); | |
871 | |
872 PKIX_RETURN(INFOACCESS); | |
873 } | |
874 #endif /* !NSS_PKIX_NO_LDAP */ |