Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | int policy_cache_set_mapping(X509 *x, POLICY_MAPPINGS *maps) | - |
9 | { | - |
10 | POLICY_MAPPING *map; | - |
11 | X509_POLICY_DATA *data; | - |
12 | X509_POLICY_CACHE *cache = x->policy_cache; | - |
13 | int i; | - |
14 | int ret = 0; | - |
15 | if (sk_POLICY_MAPPING_num(maps) == 0TRUE | never evaluated | FALSE | never evaluated |
) { | 0 |
16 | ret = -1; | - |
17 | goto never executed: goto bad_mapping; bad_mapping;never executed: goto bad_mapping; | 0 |
18 | } | - |
19 | for (i = 0; i < sk_POLICY_MAPPING_num(maps)TRUE | never evaluated | FALSE | never evaluated |
; i++) { | 0 |
20 | map = sk_POLICY_MAPPING_value(maps, i); | - |
21 | | - |
22 | if ((TRUE | never evaluated | FALSE | never evaluated |
OBJ_obj2nid(map->subjectDomainPolicy) == 746)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
23 | || (TRUE | never evaluated | FALSE | never evaluated |
OBJ_obj2nid(map->issuerDomainPolicy) == 746)TRUE | never evaluated | FALSE | never evaluated |
) { | 0 |
24 | ret = -1; | - |
25 | goto never executed: goto bad_mapping; bad_mapping;never executed: goto bad_mapping; | 0 |
26 | } | - |
27 | | - |
28 | | - |
29 | data = policy_cache_find_data(cache, map->issuerDomainPolicy); | - |
30 | | - |
31 | if (data == TRUE | never evaluated | FALSE | never evaluated |
| 0 |
32 | ((void *)0)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
33 | && !cache->anyPolicyTRUE | never evaluated | FALSE | never evaluated |
) | 0 |
34 | continue; never executed: continue; | 0 |
35 | | - |
36 | | - |
37 | if (data == TRUE | never evaluated | FALSE | never evaluated |
| 0 |
38 | ((void *)0)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
39 | ) { | - |
40 | data = policy_data_new( | - |
41 | ((void *)0) | - |
42 | , map->issuerDomainPolicy, | - |
43 | cache->anyPolicy->flags | - |
44 | & 0x10); | - |
45 | if (data == TRUE | never evaluated | FALSE | never evaluated |
| 0 |
46 | ((void *)0)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
47 | ) | - |
48 | goto never executed: goto bad_mapping; bad_mapping;never executed: goto bad_mapping; | 0 |
49 | data->qualifier_set = cache->anyPolicy->qualifier_set; | - |
50 | | - |
51 | | - |
52 | | - |
53 | data->flags |= 0x2; | - |
54 | data->flags |= 0x4; | - |
55 | if (!sk_X509_POLICY_DATA_push(cache->data, data)TRUE | never evaluated | FALSE | never evaluated |
) { | 0 |
56 | policy_data_free(data); | - |
57 | goto never executed: goto bad_mapping; bad_mapping;never executed: goto bad_mapping; | 0 |
58 | } | - |
59 | } never executed: end of block else | 0 |
60 | data->flags |= 0x1; never executed: data->flags |= 0x1; | 0 |
61 | if (!sk_ASN1_OBJECT_push(data->expected_policy_set,TRUE | never evaluated | FALSE | never evaluated |
| 0 |
62 | map->subjectDomainPolicy)TRUE | never evaluated | FALSE | never evaluated |
) | 0 |
63 | goto never executed: goto bad_mapping; bad_mapping;never executed: goto bad_mapping; | 0 |
64 | map->subjectDomainPolicy = | - |
65 | ((void *)0) | - |
66 | ; | - |
67 | | - |
68 | } never executed: end of block | 0 |
69 | | - |
70 | ret = 1; | - |
71 | bad_mapping: code before this statement never executed: bad_mapping: | 0 |
72 | if (ret == -1TRUE | never evaluated | FALSE | never evaluated |
) | 0 |
73 | x->ex_flags |= 0x800; never executed: x->ex_flags |= 0x800; | 0 |
74 | sk_POLICY_MAPPING_pop_free(maps, POLICY_MAPPING_free); | - |
75 | return never executed: return ret; ret;never executed: return ret; | 0 |
76 | | - |
77 | } | - |
| | |