ASN1_INTEGER *serial = NULL;
X509_EXTENSION *ext;
X509 *cert;
- AUTHORITY_KEYID *akeyid;
+ AUTHORITY_KEYID *akeyid = AUTHORITY_KEYID_new();
+
+ if (akeyid == NULL)
+ goto err;
for (i = 0; i < sk_CONF_VALUE_num(values); i++) {
cnf = sk_CONF_VALUE_value(values, i);
} else {
ERR_raise_data(ERR_LIB_X509V3, X509V3_R_UNKNOWN_OPTION,
"name=%s", cnf->name);
- return NULL;
+ goto err;
}
}
if (!ctx || !ctx->issuer_cert) {
if (ctx && (ctx->flags == CTX_TEST))
- return AUTHORITY_KEYID_new();
+ return akeyid;
ERR_raise(ERR_LIB_X509V3, X509V3_R_NO_ISSUER_CERTIFICATE);
- return NULL;
+ goto err;
}
cert = ctx->issuer_cert;
ikeyid = X509V3_EXT_d2i(ext);
if ((keyid == 2 || issuer == 0) && ikeyid == NULL) {
ERR_raise(ERR_LIB_X509V3, X509V3_R_UNABLE_TO_GET_ISSUER_KEYID);
- return NULL;
+ goto err;
}
}
}
}
- if ((akeyid = AUTHORITY_KEYID_new()) == NULL)
- goto err;
-
if (isname) {
if ((gens = sk_GENERAL_NAME_new_null()) == NULL
|| (gen = GENERAL_NAME_new()) == NULL
X509_NAME_free(isname);
ASN1_INTEGER_free(serial);
ASN1_OCTET_STRING_free(ikeyid);
+ AUTHORITY_KEYID_free(akeyid);
return NULL;
}