line |
true |
false |
branch |
79
|
0 |
0 |
if (crl == NULL) |
84
|
0 |
0 |
if (g_CRL == NULL) |
92
|
0 |
0 |
if (g_CRL == crl) |
96
|
0 |
0 |
while (next->next) |
99
|
0 |
0 |
if (next == crl) /* no pointer dups */ |
134
|
0 |
0 |
if (g_CRL == NULL || crl == NULL) |
|
0 |
0 |
if (g_CRL == NULL || crl == NULL) |
141
|
0 |
0 |
while (curr) |
143
|
0 |
0 |
if (curr == crl) |
145
|
0 |
0 |
if (delete) |
153
|
0 |
0 |
if (prev == NULL && next == NULL) |
|
0 |
0 |
if (prev == NULL && next == NULL) |
158
|
0 |
0 |
else if (prev == NULL && next != NULL) |
|
0 |
0 |
else if (prev == NULL && next != NULL) |
163
|
0 |
0 |
else if (prev != NULL) |
172
|
0 |
0 |
if (curr) |
227
|
0 |
0 |
while (next) |
249
|
0 |
14 |
while (curr) |
255
|
0 |
14 |
psAssert(g_CRL == NULL); |
265
|
0 |
0 |
if (memcmpct(existing->issuer.hash, new->issuer.hash, SHA1_HASH_SIZE) != 0) |
298
|
0 |
0 |
if (crl == NULL) |
308
|
0 |
0 |
while (curr) |
311
|
0 |
0 |
if (internalCRLmatch(curr, crl) == PS_TRUE) |
315
|
0 |
0 |
if (curr == crl) |
339
|
0 |
0 |
if (memcmpct(CRL->issuer.hash, cert->issuer.hash, SHA1_HASH_SIZE) != 0) |
377
|
0 |
0 |
if (err != PS_SUCCESS) |
382
|
0 |
0 |
err = psBrokenDownTimeImport( |
386
|
0 |
0 |
if (err != PS_SUCCESS) |
393
|
0 |
0 |
if (err != PS_SUCCESS) |
398
|
0 |
0 |
if (psBrokenDownTimeCmp(&timeNow, &nextTimeLinger) > 0) |
410
|
0 |
1150 |
if (cert == NULL) |
415
|
0 |
1150 |
while (curr) |
417
|
0 |
0 |
if (internalMatchSubject(cert, curr) == PS_TRUE) |
422
|
0 |
0 |
if (nextUpdateTest(curr->nextUpdate, curr->nextUpdateType) < 0) |
467
|
0 |
0 |
if (cert == NULL) |
472
|
0 |
0 |
if (CRL) |
478
|
0 |
0 |
if ((crl = internalGetCrlForCert(cert)) == NULL) |
483
|
0 |
0 |
if (crl->revoked == NULL) |
488
|
0 |
0 |
for (entry = crl->revoked; entry != NULL; entry = entry->next) |
490
|
0 |
0 |
if (cert->serialNumberLen == entry->serialLen) |
492
|
0 |
0 |
if (memcmpct(cert->serialNumber, entry->serial, entry->serialLen) |
495
|
0 |
0 |
if (bdt) |
537
|
2 |
1148 |
if (cert->extensions.crlDist) |
558
|
0 |
1150 |
if (cert == NULL) |
568
|
0 |
1150 |
if (crl) |
571
|
0 |
0 |
if (crl->expired) |
586
|
0 |
0 |
if (crl->authenticated == 0 && cert->next) |
|
0 |
0 |
if (crl->authenticated == 0 && cert->next) |
593
|
0 |
0 |
if (revoked == 0 && crl->authenticated == 1) |
|
0 |
0 |
if (revoked == 0 && crl->authenticated == 1) |
598
|
0 |
0 |
else if (revoked == 0 && crl->authenticated == 0) |
|
0 |
0 |
else if (revoked == 0 && crl->authenticated == 0) |
603
|
0 |
0 |
else if (revoked == 1 && crl->authenticated == 1) |
|
0 |
0 |
else if (revoked == 1 && crl->authenticated == 1) |
608
|
0 |
0 |
else if (revoked == 1 && crl->authenticated == 0) |
|
0 |
0 |
else if (revoked == 1 && crl->authenticated == 0) |
621
|
2 |
1148 |
if (expectCrl) |
649
|
0 |
0 |
while (curr) |
663
|
0 |
0 |
if (crl == NULL) |
683
|
0 |
0 |
if (crl == NULL) |
688
|
0 |
0 |
if (psCRL_Delete(crl)) |
701
|
0 |
0 |
if ( !(CA->extensions.keyUsageFlags & KEY_USAGE_CRL_SIGN)) |
723
|
0 |
0 |
if (memcmpct(CRL->issuer.hash, CA->subject.hash, SHA1_HASH_SIZE) != 0) |
773
|
0 |
0 |
if (CA == NULL || CRL == NULL) |
|
0 |
0 |
if (CA == NULL || CRL == NULL) |
785
|
0 |
0 |
if ((rc = internalMatchIssuer(CA, CRL)) < 0) |
799
|
0 |
0 |
if (rc != PS_SUCCESS) |
801
|
0 |
0 |
if (verifyResult == PS_FALSE) |
813
|
0 |
0 |
if (verifyResult == PS_TRUE) |
827
|
0 |
0 |
if (crlBin == NULL || crlBinLen <= 0) |
|
0 |
0 |
if (crlBin == NULL || crlBinLen <= 0) |
832
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &glen, 0) < 0) |
837
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &tbsCertLen, 0) < 0) |
842
|
0 |
0 |
if (end > p && *p == ASN_INTEGER) |
|
0 |
0 |
if (end > p && *p == ASN_INTEGER) |
845
|
0 |
0 |
if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) |
|
0 |
0 |
if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) |
869
|
0 |
0 |
if (crlBin == NULL || crlBinLen <= 0) |
|
0 |
0 |
if (crlBin == NULL || crlBinLen <= 0) |
897
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &glen, 0) < 0) |
906
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &tbsCertLen, 0) < 0) |
912
|
0 |
0 |
if (end > p && *p == ASN_INTEGER) |
|
0 |
0 |
if (end > p && *p == ASN_INTEGER) |
915
|
0 |
0 |
if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) |
|
0 |
0 |
if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) |
920
|
0 |
0 |
if (version != 1) |
929
|
0 |
0 |
if ((lcrl = psMalloc(pool, sizeof(psX509Crl_t))) == NULL) |
937
|
0 |
0 |
if (getAsnAlgorithmIdentifier(&p, (int32) (end - p), &lcrl->sigAlg, &plen) |
956
|
0 |
0 |
if ((rc = psX509GetDNAttributes(pool, &p, (uint32) (end - p), |
965
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && (*p != ASN_GENERALIZEDTIME))) |
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && (*p != ASN_GENERALIZEDTIME))) |
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && (*p != ASN_GENERALIZEDTIME))) |
973
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
980
|
0 |
0 |
if (psBrokenDownTimeImport( |
|
0 |
0 |
if (psBrokenDownTimeImport( |
993
|
0 |
0 |
if ((end - p) < 1 || ((*p == ASN_UTCTIME) || (*p == ASN_GENERALIZEDTIME))) |
|
0 |
0 |
if ((end - p) < 1 || ((*p == ASN_UTCTIME) || (*p == ASN_GENERALIZEDTIME))) |
|
0 |
0 |
if ((end - p) < 1 || ((*p == ASN_UTCTIME) || (*p == ASN_GENERALIZEDTIME))) |
997
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
1004
|
0 |
0 |
if ((lcrl->nextUpdate = psMalloc(pool, timelen + 1)) == NULL) |
1012
|
0 |
0 |
if (psBrokenDownTimeImport( |
|
0 |
0 |
if (psBrokenDownTimeImport( |
1032
|
0 |
0 |
if ((p - start) != tbsCertLen) |
1045
|
0 |
0 |
if (*p != (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | 0)) |
1048
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &glen, 0) < 0) |
1056
|
0 |
0 |
if (curr == NULL) |
1062
|
0 |
0 |
while (glen > 0) |
1065
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &ilen, 0) < 0) |
1072
|
0 |
0 |
if ((rc = getSerialNum(pool, &p, ilen, &curr->serial, |
1081
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && |
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && |
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && |
1090
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
1097
|
0 |
0 |
if (psBrokenDownTimeImport( |
|
0 |
0 |
if (psBrokenDownTimeImport( |
1111
|
0 |
0 |
if (glen < (uint32) (p - revStart)) |
1120
|
0 |
0 |
if (glen > 0) |
1122
|
0 |
0 |
if ((next = psMalloc(pool, sizeof(x509revoked_t))) == NULL) |
1134
|
0 |
0 |
if (getExplicitExtensions(pool, &p, (uint32) (end - p), 0, |
1147
|
0 |
0 |
if (getAsnAlgorithmIdentifier(&p, (int32) (end - p), &oi, &plen) < 0) |
1154
|
0 |
0 |
if (oi != lcrl->sigAlg) |
1161
|
0 |
0 |
if ((rc = psX509GetSignature(pool, &p, (uint32) (end - p), &lcrl->sig, |
1173
|
0 |
0 |
if (rc != PS_SUCCESS) |
1193
|
0 |
0 |
if (cert == NULL) |
1200
|
0 |
0 |
if (cert->extensions.crlDist != NULL) |
1203
|
0 |
0 |
while (gn) |
1205
|
0 |
0 |
if (gn->id == 6) /* Only pass on URI types */ |