| Line | Source | Count |
| 1 | | - |
| 2 | | - |
| 3 | | - |
| 4 | | - |
| 5 | | - |
| 6 | | - |
| 7 | | - |
| 8 | int policy_cache_set_mapping(X509 *x, POLICY_MAPPINGS *maps) | - |
| 9 | { | - |
| 10 | POLICY_MAPPING *map; | - |
| 11 | X509_POLICY_DATA *data; | - |
| 12 | X509_POLICY_CACHE *cache = x->policy_cache; | - |
| 13 | int i; | - |
| 14 | int ret = 0; | - |
| 15 | if (sk_POLICY_MAPPING_num(maps) == 0| TRUE | never evaluated | | FALSE | never evaluated |
) { | 0 |
| 16 | ret = -1; | - |
| 17 | goto never executed: goto bad_mapping; bad_mapping;never executed: goto bad_mapping; | 0 |
| 18 | } | - |
| 19 | for (i = 0; i < sk_POLICY_MAPPING_num(maps)| TRUE | never evaluated | | FALSE | never evaluated |
; i++) { | 0 |
| 20 | map = sk_POLICY_MAPPING_value(maps, i); | - |
| 21 | | - |
| 22 | if ((| TRUE | never evaluated | | FALSE | never evaluated |
OBJ_obj2nid(map->subjectDomainPolicy) == 746)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 23 | || (| TRUE | never evaluated | | FALSE | never evaluated |
OBJ_obj2nid(map->issuerDomainPolicy) == 746)| TRUE | never evaluated | | FALSE | never evaluated |
) { | 0 |
| 24 | ret = -1; | - |
| 25 | goto never executed: goto bad_mapping; bad_mapping;never executed: goto bad_mapping; | 0 |
| 26 | } | - |
| 27 | | - |
| 28 | | - |
| 29 | data = policy_cache_find_data(cache, map->issuerDomainPolicy); | - |
| 30 | | - |
| 31 | if (data == | TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 32 | ((void *)0)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 33 | && !cache->anyPolicy| TRUE | never evaluated | | FALSE | never evaluated |
) | 0 |
| 34 | continue; never executed: continue; | 0 |
| 35 | | - |
| 36 | | - |
| 37 | if (data == | TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 38 | ((void *)0)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 39 | ) { | - |
| 40 | data = policy_data_new( | - |
| 41 | ((void *)0) | - |
| 42 | , map->issuerDomainPolicy, | - |
| 43 | cache->anyPolicy->flags | - |
| 44 | & 0x10); | - |
| 45 | if (data == | TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 46 | ((void *)0)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 47 | ) | - |
| 48 | goto never executed: goto bad_mapping; bad_mapping;never executed: goto bad_mapping; | 0 |
| 49 | data->qualifier_set = cache->anyPolicy->qualifier_set; | - |
| 50 | | - |
| 51 | | - |
| 52 | | - |
| 53 | data->flags |= 0x2; | - |
| 54 | data->flags |= 0x4; | - |
| 55 | if (!sk_X509_POLICY_DATA_push(cache->data, data)| TRUE | never evaluated | | FALSE | never evaluated |
) { | 0 |
| 56 | policy_data_free(data); | - |
| 57 | goto never executed: goto bad_mapping; bad_mapping;never executed: goto bad_mapping; | 0 |
| 58 | } | - |
| 59 | } never executed: end of block else | 0 |
| 60 | data->flags |= 0x1; never executed: data->flags |= 0x1; | 0 |
| 61 | if (!sk_ASN1_OBJECT_push(data->expected_policy_set,| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 62 | map->subjectDomainPolicy)| TRUE | never evaluated | | FALSE | never evaluated |
) | 0 |
| 63 | goto never executed: goto bad_mapping; bad_mapping;never executed: goto bad_mapping; | 0 |
| 64 | map->subjectDomainPolicy = | - |
| 65 | ((void *)0) | - |
| 66 | ; | - |
| 67 | | - |
| 68 | } never executed: end of block | 0 |
| 69 | | - |
| 70 | ret = 1; | - |
| 71 | bad_mapping: code before this statement never executed: bad_mapping: | 0 |
| 72 | if (ret == -1| TRUE | never evaluated | | FALSE | never evaluated |
) | 0 |
| 73 | x->ex_flags |= 0x800; never executed: x->ex_flags |= 0x800; | 0 |
| 74 | sk_POLICY_MAPPING_pop_free(maps, POLICY_MAPPING_free); | - |
| 75 | return never executed: return ret; ret;never executed: return ret; | 0 |
| 76 | | - |
| 77 | } | - |
| | |