]>
Commit | Line | Data |
---|---|---|
0f113f3e | 1 | /* |
d2e9e320 | 2 | * Copyright 2004-2016 The OpenSSL Project Authors. All Rights Reserved. |
4acc3e90 | 3 | * |
d2e9e320 RS |
4 | * Licensed under the OpenSSL license (the "License"). You may not use |
5 | * this file except in compliance with the License. You can obtain a copy | |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
4acc3e90 DSH |
8 | */ |
9 | ||
b39fc560 | 10 | #include "internal/cryptlib.h" |
4acc3e90 DSH |
11 | #include <openssl/x509.h> |
12 | #include <openssl/x509v3.h> | |
13 | ||
14 | #include "pcy_int.h" | |
15 | ||
16 | /* Policy Node routines */ | |
17 | ||
18 | void policy_data_free(X509_POLICY_DATA *data) | |
0f113f3e | 19 | { |
25aaa98a RS |
20 | if (!data) |
21 | return; | |
0f113f3e MC |
22 | ASN1_OBJECT_free(data->valid_policy); |
23 | /* Don't free qualifiers if shared */ | |
24 | if (!(data->flags & POLICY_DATA_FLAG_SHARED_QUALIFIERS)) | |
25 | sk_POLICYQUALINFO_pop_free(data->qualifier_set, POLICYQUALINFO_free); | |
26 | sk_ASN1_OBJECT_pop_free(data->expected_policy_set, ASN1_OBJECT_free); | |
27 | OPENSSL_free(data); | |
28 | } | |
4acc3e90 | 29 | |
0f113f3e MC |
30 | /* |
31 | * Create a data based on an existing policy. If 'id' is NULL use the oid in | |
32 | * the policy, otherwise use 'id'. This behaviour covers the two types of | |
33 | * data in RFC3280: data with from a CertificatePolcies extension and | |
34 | * additional data with just the qualifiers of anyPolicy and ID from another | |
35 | * source. | |
4acc3e90 DSH |
36 | */ |
37 | ||
002e66c0 | 38 | X509_POLICY_DATA *policy_data_new(POLICYINFO *policy, |
0f113f3e MC |
39 | const ASN1_OBJECT *cid, int crit) |
40 | { | |
41 | X509_POLICY_DATA *ret; | |
42 | ASN1_OBJECT *id; | |
43 | if (!policy && !cid) | |
44 | return NULL; | |
45 | if (cid) { | |
46 | id = OBJ_dup(cid); | |
47 | if (!id) | |
48 | return NULL; | |
49 | } else | |
50 | id = NULL; | |
64b25758 | 51 | ret = OPENSSL_zalloc(sizeof(*ret)); |
90945fa3 | 52 | if (ret == NULL) |
0f113f3e MC |
53 | return NULL; |
54 | ret->expected_policy_set = sk_ASN1_OBJECT_new_null(); | |
90945fa3 | 55 | if (ret->expected_policy_set == NULL) { |
0f113f3e | 56 | OPENSSL_free(ret); |
0dfb9398 | 57 | ASN1_OBJECT_free(id); |
0f113f3e MC |
58 | return NULL; |
59 | } | |
4acc3e90 | 60 | |
0f113f3e MC |
61 | if (crit) |
62 | ret->flags = POLICY_DATA_FLAG_CRITICAL; | |
4acc3e90 | 63 | |
0f113f3e MC |
64 | if (id) |
65 | ret->valid_policy = id; | |
66 | else { | |
67 | ret->valid_policy = policy->policyid; | |
68 | policy->policyid = NULL; | |
69 | } | |
4acc3e90 | 70 | |
0f113f3e MC |
71 | if (policy) { |
72 | ret->qualifier_set = policy->qualifiers; | |
73 | policy->qualifiers = NULL; | |
64b25758 | 74 | } |
4acc3e90 | 75 | |
0f113f3e MC |
76 | return ret; |
77 | } |