/src/openssl111/crypto/x509v3/pcy_data.c
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | /* | 
| 2 |  |  * Copyright 2004-2020 The OpenSSL Project Authors. All Rights Reserved. | 
| 3 |  |  * | 
| 4 |  |  * Licensed under the OpenSSL license (the "License").  You may not use | 
| 5 |  |  * this file except in compliance with the License.  You can obtain a copy | 
| 6 |  |  * in the file LICENSE in the source distribution or at | 
| 7 |  |  * https://www.openssl.org/source/license.html | 
| 8 |  |  */ | 
| 9 |  |  | 
| 10 |  | #include "internal/cryptlib.h" | 
| 11 |  | #include <openssl/x509.h> | 
| 12 |  | #include <openssl/x509v3.h> | 
| 13 |  |  | 
| 14 |  | #include "pcy_local.h" | 
| 15 |  |  | 
| 16 |  | /* Policy Node routines */ | 
| 17 |  |  | 
| 18 |  | void policy_data_free(X509_POLICY_DATA *data) | 
| 19 | 0 | { | 
| 20 | 0 |     if (data == NULL) | 
| 21 | 0 |         return; | 
| 22 | 0 |     ASN1_OBJECT_free(data->valid_policy); | 
| 23 |  |     /* Don't free qualifiers if shared */ | 
| 24 | 0 |     if (!(data->flags & POLICY_DATA_FLAG_SHARED_QUALIFIERS)) | 
| 25 | 0 |         sk_POLICYQUALINFO_pop_free(data->qualifier_set, POLICYQUALINFO_free); | 
| 26 | 0 |     sk_ASN1_OBJECT_pop_free(data->expected_policy_set, ASN1_OBJECT_free); | 
| 27 | 0 |     OPENSSL_free(data); | 
| 28 | 0 | } | 
| 29 |  |  | 
| 30 |  | /* | 
| 31 |  |  * Create a data based on an existing policy. If 'id' is NULL use the OID in | 
| 32 |  |  * the policy, otherwise use 'id'. This behaviour covers the two types of | 
| 33 |  |  * data in RFC3280: data with from a CertificatePolicies extension and | 
| 34 |  |  * additional data with just the qualifiers of anyPolicy and ID from another | 
| 35 |  |  * source. | 
| 36 |  |  */ | 
| 37 |  |  | 
| 38 |  | X509_POLICY_DATA *policy_data_new(POLICYINFO *policy, | 
| 39 |  |                                   const ASN1_OBJECT *cid, int crit) | 
| 40 | 0 | { | 
| 41 | 0 |     X509_POLICY_DATA *ret; | 
| 42 | 0 |     ASN1_OBJECT *id; | 
| 43 |  | 
 | 
| 44 | 0 |     if (policy == NULL && cid == NULL) | 
| 45 | 0 |         return NULL; | 
| 46 | 0 |     if (cid) { | 
| 47 | 0 |         id = OBJ_dup(cid); | 
| 48 | 0 |         if (id == NULL) | 
| 49 | 0 |             return NULL; | 
| 50 | 0 |     } else | 
| 51 | 0 |         id = NULL; | 
| 52 | 0 |     ret = OPENSSL_zalloc(sizeof(*ret)); | 
| 53 | 0 |     if (ret == NULL) { | 
| 54 | 0 |         X509V3err(X509V3_F_POLICY_DATA_NEW, ERR_R_MALLOC_FAILURE); | 
| 55 | 0 |         ASN1_OBJECT_free(id); | 
| 56 | 0 |         return NULL; | 
| 57 | 0 |     } | 
| 58 | 0 |     ret->expected_policy_set = sk_ASN1_OBJECT_new_null(); | 
| 59 | 0 |     if (ret->expected_policy_set == NULL) { | 
| 60 | 0 |         OPENSSL_free(ret); | 
| 61 | 0 |         ASN1_OBJECT_free(id); | 
| 62 | 0 |         X509V3err(X509V3_F_POLICY_DATA_NEW, ERR_R_MALLOC_FAILURE); | 
| 63 | 0 |         return NULL; | 
| 64 | 0 |     } | 
| 65 |  |  | 
| 66 | 0 |     if (crit) | 
| 67 | 0 |         ret->flags = POLICY_DATA_FLAG_CRITICAL; | 
| 68 |  | 
 | 
| 69 | 0 |     if (id) | 
| 70 | 0 |         ret->valid_policy = id; | 
| 71 | 0 |     else { | 
| 72 | 0 |         ret->valid_policy = policy->policyid; | 
| 73 | 0 |         policy->policyid = NULL; | 
| 74 | 0 |     } | 
| 75 |  | 
 | 
| 76 | 0 |     if (policy) { | 
| 77 | 0 |         ret->qualifier_set = policy->qualifiers; | 
| 78 | 0 |         policy->qualifiers = NULL; | 
| 79 | 0 |     } | 
| 80 |  | 
 | 
| 81 | 0 |     return ret; | 
| 82 | 0 | } |