| line | true | false | branch | 
 
| 79 | 0 | 0 | if (crl == NULL) | 
 
| 84 | 0 | 0 | if (g_CRL == NULL) | 
 
| 92 | 0 | 0 | if (g_CRL == crl) | 
 
| 96 | 0 | 0 | while (next->next) | 
 
| 99 | 0 | 0 | if (next == crl)   /* no pointer dups */ | 
 
| 134 | 0 | 0 | if (g_CRL == NULL || crl == NULL) | 
 
|  | 0 | 0 | if (g_CRL == NULL || crl == NULL) | 
 
| 141 | 0 | 0 | while (curr) | 
 
| 143 | 0 | 0 | if (curr == crl) | 
 
| 145 | 0 | 0 | if (delete) | 
 
| 153 | 0 | 0 | if (prev == NULL && next == NULL) | 
 
|  | 0 | 0 | if (prev == NULL && next == NULL) | 
 
| 158 | 0 | 0 | else if (prev == NULL && next != NULL) | 
 
|  | 0 | 0 | else if (prev == NULL && next != NULL) | 
 
| 163 | 0 | 0 | else if (prev != NULL) | 
 
| 172 | 0 | 0 | if (curr) | 
 
| 227 | 0 | 0 | while (next) | 
 
| 249 | 0 | 14 | while (curr) | 
 
| 255 | 0 | 14 | psAssert(g_CRL == NULL); | 
 
| 265 | 0 | 0 | if (memcmpct(existing->issuer.hash, new->issuer.hash, SHA1_HASH_SIZE) != 0) | 
 
| 298 | 0 | 0 | if (crl == NULL) | 
 
| 308 | 0 | 0 | while (curr) | 
 
| 311 | 0 | 0 | if (internalCRLmatch(curr, crl) == PS_TRUE) | 
 
| 315 | 0 | 0 | if (curr == crl) | 
 
| 339 | 0 | 0 | if (memcmpct(CRL->issuer.hash, cert->issuer.hash, SHA1_HASH_SIZE) != 0) | 
 
| 377 | 0 | 0 | if (err != PS_SUCCESS) | 
 
| 382 | 0 | 0 | err = psBrokenDownTimeImport( | 
 
| 386 | 0 | 0 | if (err != PS_SUCCESS) | 
 
| 393 | 0 | 0 | if (err != PS_SUCCESS) | 
 
| 398 | 0 | 0 | if (psBrokenDownTimeCmp(&timeNow, &nextTimeLinger) > 0) | 
 
| 410 | 0 | 1150 | if (cert == NULL) | 
 
| 415 | 0 | 1150 | while (curr) | 
 
| 417 | 0 | 0 | if (internalMatchSubject(cert, curr) == PS_TRUE) | 
 
| 422 | 0 | 0 | if (nextUpdateTest(curr->nextUpdate, curr->nextUpdateType) < 0) | 
 
| 467 | 0 | 0 | if (cert == NULL) | 
 
| 472 | 0 | 0 | if (CRL) | 
 
| 478 | 0 | 0 | if ((crl = internalGetCrlForCert(cert)) == NULL) | 
 
| 483 | 0 | 0 | if (crl->revoked == NULL) | 
 
| 488 | 0 | 0 | for (entry = crl->revoked; entry != NULL; entry = entry->next) | 
 
| 490 | 0 | 0 | if (cert->serialNumberLen == entry->serialLen) | 
 
| 492 | 0 | 0 | if (memcmpct(cert->serialNumber, entry->serial, entry->serialLen) | 
 
| 495 | 0 | 0 | if (bdt) | 
 
| 537 | 2 | 1148 | if (cert->extensions.crlDist) | 
 
| 558 | 0 | 1150 | if (cert == NULL) | 
 
| 568 | 0 | 1150 | if (crl) | 
 
| 571 | 0 | 0 | if (crl->expired) | 
 
| 586 | 0 | 0 | if (crl->authenticated == 0 && cert->next) | 
 
|  | 0 | 0 | if (crl->authenticated == 0 && cert->next) | 
 
| 593 | 0 | 0 | if (revoked == 0 && crl->authenticated == 1) | 
 
|  | 0 | 0 | if (revoked == 0 && crl->authenticated == 1) | 
 
| 598 | 0 | 0 | else if (revoked == 0 && crl->authenticated == 0) | 
 
|  | 0 | 0 | else if (revoked == 0 && crl->authenticated == 0) | 
 
| 603 | 0 | 0 | else if (revoked == 1 && crl->authenticated == 1) | 
 
|  | 0 | 0 | else if (revoked == 1 && crl->authenticated == 1) | 
 
| 608 | 0 | 0 | else if (revoked == 1 && crl->authenticated == 0) | 
 
|  | 0 | 0 | else if (revoked == 1 && crl->authenticated == 0) | 
 
| 621 | 2 | 1148 | if (expectCrl) | 
 
| 649 | 0 | 0 | while (curr) | 
 
| 663 | 0 | 0 | if (crl == NULL) | 
 
| 683 | 0 | 0 | if (crl == NULL) | 
 
| 688 | 0 | 0 | if (psCRL_Delete(crl)) | 
 
| 701 | 0 | 0 | if ( !(CA->extensions.keyUsageFlags & KEY_USAGE_CRL_SIGN)) | 
 
| 723 | 0 | 0 | if (memcmpct(CRL->issuer.hash, CA->subject.hash, SHA1_HASH_SIZE) != 0) | 
 
| 773 | 0 | 0 | if (CA == NULL || CRL == NULL) | 
 
|  | 0 | 0 | if (CA == NULL || CRL == NULL) | 
 
| 785 | 0 | 0 | if ((rc = internalMatchIssuer(CA, CRL)) < 0) | 
 
| 799 | 0 | 0 | if (rc != PS_SUCCESS) | 
 
| 801 | 0 | 0 | if (verifyResult == PS_FALSE) | 
 
| 813 | 0 | 0 | if (verifyResult == PS_TRUE) | 
 
| 827 | 0 | 0 | if (crlBin == NULL || crlBinLen <= 0) | 
 
|  | 0 | 0 | if (crlBin == NULL || crlBinLen <= 0) | 
 
| 832 | 0 | 0 | if (getAsnSequence32(&p, (uint32) (end - p), &glen, 0) < 0) | 
 
| 837 | 0 | 0 | if (getAsnSequence32(&p, (uint32) (end - p), &tbsCertLen, 0) < 0) | 
 
| 842 | 0 | 0 | if (end > p && *p == ASN_INTEGER) | 
 
|  | 0 | 0 | if (end > p && *p == ASN_INTEGER) | 
 
| 845 | 0 | 0 | if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) | 
 
|  | 0 | 0 | if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) | 
 
| 869 | 0 | 0 | if (crlBin == NULL || crlBinLen <= 0) | 
 
|  | 0 | 0 | if (crlBin == NULL || crlBinLen <= 0) | 
 
| 897 | 0 | 0 | if (getAsnSequence32(&p, (uint32) (end - p), &glen, 0) < 0) | 
 
| 906 | 0 | 0 | if (getAsnSequence32(&p, (uint32) (end - p), &tbsCertLen, 0) < 0) | 
 
| 912 | 0 | 0 | if (end > p && *p == ASN_INTEGER) | 
 
|  | 0 | 0 | if (end > p && *p == ASN_INTEGER) | 
 
| 915 | 0 | 0 | if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) | 
 
|  | 0 | 0 | if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) | 
 
| 920 | 0 | 0 | if (version != 1) | 
 
| 929 | 0 | 0 | if ((lcrl = psMalloc(pool, sizeof(psX509Crl_t))) == NULL) | 
 
| 937 | 0 | 0 | if (getAsnAlgorithmIdentifier(&p, (int32) (end - p), &lcrl->sigAlg, &plen) | 
 
| 956 | 0 | 0 | if ((rc = psX509GetDNAttributes(pool, &p, (uint32) (end - p), | 
 
| 965 | 0 | 0 | if ((end - p) < 1 || ((*p != ASN_UTCTIME) && (*p != ASN_GENERALIZEDTIME))) | 
 
|  | 0 | 0 | if ((end - p) < 1 || ((*p != ASN_UTCTIME) && (*p != ASN_GENERALIZEDTIME))) | 
 
|  | 0 | 0 | if ((end - p) < 1 || ((*p != ASN_UTCTIME) && (*p != ASN_GENERALIZEDTIME))) | 
 
| 973 | 0 | 0 | if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || | 
 
|  | 0 | 0 | if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || | 
 
| 980 | 0 | 0 | if (psBrokenDownTimeImport( | 
 
|  | 0 | 0 | if (psBrokenDownTimeImport( | 
 
| 993 | 0 | 0 | if ((end - p) < 1 || ((*p == ASN_UTCTIME) || (*p == ASN_GENERALIZEDTIME))) | 
 
|  | 0 | 0 | if ((end - p) < 1 || ((*p == ASN_UTCTIME) || (*p == ASN_GENERALIZEDTIME))) | 
 
|  | 0 | 0 | if ((end - p) < 1 || ((*p == ASN_UTCTIME) || (*p == ASN_GENERALIZEDTIME))) | 
 
| 997 | 0 | 0 | if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || | 
 
|  | 0 | 0 | if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || | 
 
| 1004 | 0 | 0 | if ((lcrl->nextUpdate = psMalloc(pool, timelen + 1)) == NULL) | 
 
| 1012 | 0 | 0 | if (psBrokenDownTimeImport( | 
 
|  | 0 | 0 | if (psBrokenDownTimeImport( | 
 
| 1032 | 0 | 0 | if ((p - start) != tbsCertLen) | 
 
| 1045 | 0 | 0 | if (*p != (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | 0)) | 
 
| 1048 | 0 | 0 | if (getAsnSequence32(&p, (uint32) (end - p), &glen, 0) < 0) | 
 
| 1056 | 0 | 0 | if (curr == NULL) | 
 
| 1062 | 0 | 0 | while (glen > 0) | 
 
| 1065 | 0 | 0 | if (getAsnSequence32(&p, (uint32) (end - p), &ilen, 0) < 0) | 
 
| 1072 | 0 | 0 | if ((rc = getSerialNum(pool, &p, ilen, &curr->serial, | 
 
| 1081 | 0 | 0 | if ((end - p) < 1 || ((*p != ASN_UTCTIME) && | 
 
|  | 0 | 0 | if ((end - p) < 1 || ((*p != ASN_UTCTIME) && | 
 
|  | 0 | 0 | if ((end - p) < 1 || ((*p != ASN_UTCTIME) && | 
 
| 1090 | 0 | 0 | if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || | 
 
|  | 0 | 0 | if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || | 
 
| 1097 | 0 | 0 | if (psBrokenDownTimeImport( | 
 
|  | 0 | 0 | if (psBrokenDownTimeImport( | 
 
| 1111 | 0 | 0 | if (glen < (uint32) (p - revStart)) | 
 
| 1120 | 0 | 0 | if (glen > 0) | 
 
| 1122 | 0 | 0 | if ((next = psMalloc(pool, sizeof(x509revoked_t))) == NULL) | 
 
| 1134 | 0 | 0 | if (getExplicitExtensions(pool, &p, (uint32) (end - p), 0, | 
 
| 1147 | 0 | 0 | if (getAsnAlgorithmIdentifier(&p, (int32) (end - p), &oi, &plen) < 0) | 
 
| 1154 | 0 | 0 | if (oi != lcrl->sigAlg) | 
 
| 1161 | 0 | 0 | if ((rc = psX509GetSignature(pool, &p, (uint32) (end - p), &lcrl->sig, | 
 
| 1173 | 0 | 0 | if (rc != PS_SUCCESS) | 
 
| 1193 | 0 | 0 | if (cert == NULL) | 
 
| 1200 | 0 | 0 | if (cert->extensions.crlDist != NULL) | 
 
| 1203 | 0 | 0 | while (gn) | 
 
| 1205 | 0 | 0 | if (gn->id == 6)   /* Only pass on URI types */ |