- case 'Z': {
- if(++arg == argc) {
- /* requires another arg */
- usage(argv);
- }
- if (pargs.alpnNames == NULL) {
- pargs.alpnNames = CFArrayCreateMutableForCFTypes(NULL);
- }
-
- CFDataRef alpn = CFDataCreate(NULL, (const UInt8 *)argv[arg], strlen(argv[arg]));
- CFArrayAppendValue(pargs.alpnNames, alpn);
- CFReleaseNull(alpn);
- break;
- }
- case 'W':
- case 'w': {
- CFDictionaryRef context = NULL;
-
- if(++arg == argc) {
- /* requires another arg */
- usage(argv);
- }
-
- if (argp[0] == 'W') {
- context = CFDictionaryCreateForCFTypes(NULL,
- CFSTR("AppleServerAuthenticationAllowUATAPN"), kCFBooleanTrue,
- CFSTR("AppleServerAuthenticationAllowUATIDS"), kCFBooleanTrue,
- CFSTR("AppleServerAuthenticationAllowUATGS"), kCFBooleanTrue,
- NULL);
- }
- const char *verifyName = pargs.hostName;
-
- if (pargs.policies == NULL) {
- pargs.policies = CFArrayCreateMutableForCFTypes(NULL);
- }
-
- if (pargs.vfyHostName)
- verifyName = pargs.vfyHostName;
-
- SecPolicyRef policy = NULL;
- CFStringRef hostname = CFStringCreateWithCString(NULL, verifyName, kCFStringEncodingUTF8);
-
- if (strcasecmp(argv[arg], "PushLegacy") == 0) {
- policy = SecPolicyCreateApplePushServiceLegacy(hostname);
- } else if (strcasecmp(argv[arg], "Push") == 0) {
- policy = SecPolicyCreateApplePushService(hostname, context);
- } else if (strcasecmp(argv[arg], "IDS") == 0) {
- policy = SecPolicyCreateAppleIDSServiceContext(hostname, context);
- } else if (strcasecmp(argv[arg], "GS") == 0) {
- policy = SecPolicyCreateAppleGSService(hostname, context);
- } else {
- printf("unknown policy: %s", argv[arg]);
- CFReleaseNull(hostname);
- CFReleaseNull(context);
- usage(argv);
- }
-
- if (policy) {
- CFArrayAppendValue(pargs.policies, policy);
- }
-
- CFReleaseNull(policy);
- CFReleaseNull(hostname);
- CFReleaseNull(context);
-
- break;
- }
+ case 'Z': {
+ if(++arg == argc) {
+ /* requires another arg */
+ usage(argv);
+ }
+ if (pargs.alpnNames == NULL) {
+ pargs.alpnNames = CFArrayCreateMutableForCFTypes(NULL);
+ }
+
+ CFDataRef alpn = CFDataCreate(NULL, (const UInt8 *)argv[arg], strlen(argv[arg]));
+ CFArrayAppendValue(pargs.alpnNames, alpn);
+ CFReleaseNull(alpn);
+ break;
+ }
+ case 'W':
+ case 'w': {
+ CFDictionaryRef context = NULL;
+
+ if(++arg == argc) {
+ /* requires another arg */
+ usage(argv);
+ }
+
+ if (argp[0] == 'W') {
+ context = CFDictionaryCreateForCFTypes(NULL,
+ CFSTR("AppleServerAuthenticationAllowUATAPN"), kCFBooleanTrue,
+ CFSTR("AppleServerAuthenticationAllowUATIDS"), kCFBooleanTrue,
+ CFSTR("AppleServerAuthenticationAllowUATGS"), kCFBooleanTrue,
+ NULL);
+ }
+ const char *verifyName = pargs.hostName;
+
+ if (pargs.policies == NULL) {
+ pargs.policies = CFArrayCreateMutableForCFTypes(NULL);
+ }
+
+ if (pargs.vfyHostName)
+ verifyName = pargs.vfyHostName;
+
+ SecPolicyRef policy = NULL;
+ CFStringRef hostname = CFStringCreateWithCString(NULL, verifyName, kCFStringEncodingUTF8);
+
+ if (strcasecmp(argv[arg], "PushLegacy") == 0) {
+ policy = SecPolicyCreateApplePushServiceLegacy(hostname);
+ } else if (strcasecmp(argv[arg], "Push") == 0) {
+ policy = SecPolicyCreateApplePushService(hostname, context);
+ } else if (strcasecmp(argv[arg], "IDS") == 0) {
+ policy = SecPolicyCreateAppleIDSServiceContext(hostname, context);
+ } else if (strcasecmp(argv[arg], "GS") == 0) {
+ policy = SecPolicyCreateAppleGSService(hostname, context);
+ } else {
+ printf("unknown policy: %s", argv[arg]);
+ CFReleaseNull(hostname);
+ CFReleaseNull(context);
+ usage(argv);
+ }
+
+ if (policy) {
+ CFArrayAppendValue(pargs.policies, policy);
+ }
+
+ CFReleaseNull(policy);
+ CFReleaseNull(hostname);
+ CFReleaseNull(context);
+
+ break;
+ }