line |
true |
false |
branch |
106
|
0 |
17 |
if (*g_config == 'Y') |
113
|
0 |
17 |
if (strncmp(g_config, config, clen) != 0) |
120
|
0 |
17 |
if (psCryptoOpen(config + clen) < 0) |
181
|
448 |
14 |
for (i = 0; i < SSL_SESSION_TABLE_SIZE; i++) |
223
|
0 |
100808 |
if (lkeys == NULL) |
233
|
0 |
100808 |
if (rc < 0) |
248
|
1148 |
4592 |
if (id == 19) |
250
|
0 |
1148 |
if (!(ecFlags & IS_SECP192R1)) |
255
|
1148 |
3444 |
else if (id == 21) |
257
|
0 |
1148 |
if (!(ecFlags & IS_SECP224R1)) |
262
|
1148 |
2296 |
else if (id == 23) |
264
|
0 |
1148 |
if (!(ecFlags & IS_SECP256R1)) |
269
|
1148 |
1148 |
else if (id == 24) |
271
|
0 |
1148 |
if (!(ecFlags & IS_SECP384R1)) |
276
|
1148 |
0 |
else if (id == 25) |
278
|
0 |
1148 |
if (!(ecFlags & IS_SECP521R1)) |
283
|
0 |
0 |
else if (id == 255) |
285
|
0 |
0 |
if (!(ecFlags & IS_BRAIN224R1)) |
290
|
0 |
0 |
else if (id == 26) |
292
|
0 |
0 |
if (!(ecFlags & IS_BRAIN256R1)) |
297
|
0 |
0 |
else if (id == 27) |
299
|
0 |
0 |
if (!(ecFlags & IS_BRAIN384R1)) |
304
|
0 |
0 |
else if (id == 28) |
306
|
0 |
0 |
if (!(ecFlags & IS_BRAIN512R1)) |
320
|
1148 |
4592 |
if (id == 19) |
324
|
1148 |
3444 |
else if (id == 21) |
328
|
1148 |
2296 |
else if (id == 23) |
332
|
1148 |
1148 |
else if (id == 24) |
336
|
1148 |
0 |
else if (id == 25) |
340
|
0 |
0 |
else if (id == 255) |
344
|
0 |
0 |
else if (id == 26) |
348
|
0 |
0 |
else if (id == 27) |
352
|
0 |
0 |
else if (id == 28) |
368
|
0 |
0 |
if (keys->privKey.type == PS_ECC) |
371
|
0 |
0 |
if (psTestUserEcID(eccKey->curve->curveId, ecFlags) < 0) |
379
|
0 |
0 |
while (cert) |
381
|
0 |
0 |
if (cert->publicKey.type == PS_ECC) |
384
|
0 |
0 |
if (psTestUserEcID(eccKey->curve->curveId, ecFlags) < 0) |
396
|
0 |
0 |
while (cert) |
398
|
0 |
0 |
if (cert->publicKey.type == PS_ECC) |
401
|
0 |
0 |
if (psTestUserEcID(eccKey->curve->curveId, ecFlags) < 0) |
426
|
11 |
10 |
while (currCert) |
429
|
1 |
10 |
while (nextCert && memcmp(currCert->issuer.hash, nextCert->subject.hash, |
|
0 |
1 |
while (nextCert && memcmp(currCert->issuer.hash, nextCert->subject.hash, |
435
|
0 |
0 |
if (nextCert && memcmp(currCert->issuer.hash, |
|
0 |
0 |
if (nextCert && memcmp(currCert->issuer.hash, |
461
|
0 |
15 |
if (keys == NULL) |
468
|
11 |
4 |
if (macPass == NULL) |
478
|
5 |
10 |
if ((rc = psPkcs12Parse(pool, &keys->cert, &keys->privKey, certFile, flags, |
481
|
0 |
5 |
if (keys->cert) |
493
|
1 |
9 |
if (verifyReadKeys(pool, keys, keys->poolUserPtr) < PS_SUCCESS) |
543
|
0 |
0 |
if (opts) |
546
|
0 |
0 |
if (privBuf == NULL) |
549
|
0 |
0 |
if (privBuf != NULL && keytype == 0) |
|
0 |
0 |
if (privBuf != NULL && keytype == 0) |
558
|
0 |
0 |
if (keytype < 0) |
588
|
0 |
0 |
if (opts) |
591
|
0 |
0 |
if (privFile == NULL) |
594
|
0 |
0 |
if (keytype == 0) |
602
|
0 |
0 |
if (keytype < 0) |
632
|
0 |
667 |
if (keys == NULL) |
651
|
136 |
531 |
if (certFile) |
654
|
0 |
136 |
if (keys->cert != NULL) |
658
|
1 |
135 |
if ((err = psX509ParseCertFile(pool, (char *) certFile, |
664
|
0 |
135 |
if (keys->cert->authFailFlags) |
666
|
0 |
0 |
psAssert(keys->cert->authFailFlags == PS_CERT_AUTH_FAIL_DATE_FLAG); |
682
|
134 |
532 |
if (privFile) |
686
|
0 |
134 |
if (keys->privKey.keysize > 0) |
688
|
0 |
0 |
if (keys->cert) |
696
|
134 |
0 |
if (privKeyType == PS_RSA) |
699
|
5 |
129 |
if ((err = psPkcs1ParsePrivFile(pool, (char *) privFile, |
702
|
5 |
0 |
if (keys->cert) |
713
|
0 |
129 |
if (privKeyType == PS_ECC) |
716
|
0 |
0 |
if ((err = psEccParsePrivFile(pool, (char *) privFile, |
719
|
0 |
0 |
if (keys->cert) |
736
|
1 |
660 |
if (verifyReadKeys(pool, keys, keys->poolUserPtr) < PS_SUCCESS) |
749
|
641 |
19 |
if (CAfile) |
752
|
0 |
641 |
if (keys->CAcerts != NULL) |
760
|
640 |
1 |
if (err >= 0) |
774
|
0 |
640 |
if (keys->CAcerts->authFailFlags) |
777
|
0 |
0 |
psAssert(keys->CAcerts->authFailFlags == |
791
|
1 |
640 |
if (err < 0) |
794
|
0 |
1 |
if (keys->cert) |
856
|
2203 |
0 |
psAssert(keys && curve); |
|
2203 |
0 |
psAssert(keys && curve); |
860
|
27 |
2176 |
if (keys->cache.eccPrivKey.curve != curve) |
866
|
2 |
2174 |
if (keys->cache.eccPrivKeyUse > ECC_EPHEMERAL_CACHE_USAGE) |
872
|
0 |
2174 |
if (psDiffMsecs(keys->cache.eccPrivKeyTime, t, keys->poolUserPtr) > |
881
|
2174 |
0 |
if (ecc) |
888
|
2 |
27 |
if (keys->cache.eccPrivKeyUse) |
895
|
0 |
29 |
if (rc < 0) |
903
|
29 |
0 |
if (ecc) |
933
|
1 |
113 |
if (certBuf == NULL && privBuf == NULL && CAbuf == NULL) |
|
1 |
0 |
if (certBuf == NULL && privBuf == NULL && CAbuf == NULL) |
|
0 |
1 |
if (certBuf == NULL && privBuf == NULL && CAbuf == NULL) |
938
|
0 |
114 |
if (keys == NULL) |
956
|
113 |
1 |
if (certBuf) |
959
|
0 |
113 |
if (keys->cert != NULL) |
964
|
1 |
112 |
if ((err = psX509ParseCert(pool, (unsigned char *) certBuf, |
976
|
112 |
1 |
if (privBuf) |
980
|
112 |
0 |
if (privKeyType == PS_RSA) |
983
|
0 |
112 |
if ((err = psRsaParsePkcs1PrivKey(pool, privBuf, |
988
|
0 |
0 |
if ((err = psPkcs8ParsePrivBin(pool, (unsigned char *) privBuf, |
1003
|
0 |
112 |
if (privKeyType == PS_ECC) |
1006
|
0 |
0 |
if ((err = psEccParsePrivKey(pool, (unsigned char *) privBuf, |
1011
|
0 |
0 |
if ((err = psPkcs8ParsePrivBin(pool, (unsigned char *) privBuf, |
1031
|
0 |
113 |
if (verifyReadKeys(pool, keys, keys->poolUserPtr) < PS_SUCCESS) |
1045
|
112 |
1 |
if (CAbuf) |
1048
|
0 |
112 |
if (keys->CAcerts != NULL) |
1082
|
0 |
113 |
if (err < 0) |
1103
|
3 |
0 |
if (keys == NULL || OCSPResponseBuf == NULL || OCSPResponseBufLen == 0) |
|
3 |
0 |
if (keys == NULL || OCSPResponseBuf == NULL || OCSPResponseBufLen == 0) |
|
0 |
3 |
if (keys == NULL || OCSPResponseBuf == NULL || OCSPResponseBufLen == 0) |
1111
|
1 |
2 |
if (keys->OCSPResponseBuf != NULL) |
1118
|
0 |
3 |
if ((keys->OCSPResponseBuf = psMalloc(pool, OCSPResponseBufLen)) == NULL) |
1135
|
5 |
0 |
if (keys == NULL || SCTResponseBuf == NULL || SCTResponseBufLen == 0) { |
|
5 |
0 |
if (keys == NULL || SCTResponseBuf == NULL || SCTResponseBufLen == 0) { |
|
0 |
5 |
if (keys == NULL || SCTResponseBuf == NULL || SCTResponseBufLen == 0) { |
1141
|
3 |
2 |
if (keys->SCTResponseBuf != NULL) { |
1147
|
0 |
5 |
if ((keys->SCTResponseBuf = psMalloc(pool, SCTResponseBufLen)) == NULL) { |
1175
|
0 |
100808 |
if (keys == NULL) |
1181
|
250 |
100558 |
if (keys->cert) |
1190
|
752 |
100056 |
if (keys->CAcerts) |
1202
|
0 |
100808 |
if (keys->pskKeys) |
1205
|
0 |
0 |
while (psk) |
1217
|
1 |
100807 |
if (keys->sessTickets) |
1220
|
1 |
1 |
while (tick) |
1232
|
27 |
100781 |
if (keys->cache.eccPrivKeyUse > 0) |
1242
|
2 |
100806 |
if (keys->OCSPResponseBuf != NULL) |
1270
|
532 |
252 |
if (keys->cert == NULL && keys->privKey.type == 0) |
|
532 |
0 |
if (keys->cert == NULL && keys->privKey.type == 0) |
1280
|
252 |
0 |
if (keys->cert != NULL && keys->privKey.type == 0) |
|
1 |
251 |
if (keys->cert != NULL && keys->privKey.type == 0) |
1285
|
251 |
0 |
if (keys->privKey.type != 0 && keys->cert == NULL) |
|
0 |
251 |
if (keys->privKey.type != 0 && keys->cert == NULL) |
1301
|
251 |
0 |
if (keys->cert != NULL && keys->cert->next != NULL) |
|
1 |
250 |
if (keys->cert != NULL && keys->cert->next != NULL) |
1307
|
1 |
0 |
while (tmp->next != NULL) |
1309
|
1 |
0 |
if (tmp->authStatus != PS_TRUE) |
1320
|
250 |
0 |
if (keys->privKey.type == PS_RSA) |
1322
|
0 |
250 |
if (psRsaCmpPubKey(&keys->privKey.key.rsa, |
1346
|
0 |
0 |
if (keys == NULL) |
1358
|
0 |
0 |
if (keys == NULL) |
1435
|
0 |
22314 |
if (flags & SSL_FLAGS_INTERCEPTOR) |
1442
|
0 |
22314 |
if (lssl == NULL) |
1451
|
0 |
22314 |
if (options->keep_peer_cert_der) |
1455
|
0 |
22314 |
if (options->keep_peer_certs) |
1461
|
22314 |
0 |
if (options->validateCertsOpts.max_verify_depth >= 0) |
1467
|
0 |
22314 |
if (options->userDataPtr != NULL) |
1475
|
0 |
22314 |
if (options->ecFlags) |
1477
|
0 |
0 |
if (testUserEc(options->ecFlags, keys) < 0) |
1508
|
0 |
22314 |
if (lssl->outbuf == NULL) |
1522
|
0 |
22314 |
if (lssl->inbuf == NULL) |
1532
|
0 |
22314 |
if ((lssl->cipher = sslGetCipherSpec(lssl, SSL_NULL_WITH_NULL_NULL)) == NULL) |
1573
|
11158 |
11156 |
if (flags & SSL_FLAGS_SERVER) |
1579
|
0 |
11158 |
if (flags & SSL_FLAGS_CLIENT_AUTH) |
1588
|
0 |
11158 |
if (flags & SSL_FLAGS_SSLV3) |
1598
|
0 |
11158 |
if (flags & SSL_FLAGS_TLS_1_0) |
1612
|
0 |
11158 |
if (flags & SSL_FLAGS_TLS_1_1) |
1626
|
0 |
11158 |
if (flags & SSL_FLAGS_TLS_1_2) |
1636
|
0 |
11158 |
if (specificVersion) |
1687
|
0 |
11156 |
if (flags & SSL_FLAGS_SSLV3) |
1698
|
0 |
11156 |
if (flags & SSL_FLAGS_TLS_1_0) |
1714
|
0 |
11156 |
if (flags & SSL_FLAGS_TLS_1_1) |
1730
|
0 |
11156 |
if (flags & SSL_FLAGS_TLS_1_2) |
1742
|
0 |
11156 |
if (specificVersion == 2) |
1749
|
11156 |
0 |
if (specificVersion == 0) |
1767
|
0 |
11156 |
if (lssl->majVer == 0) |
1820
|
10521 |
635 |
if (session != NULL && session->cipherId != SSL_NULL_WITH_NULL_NULL) |
|
0 |
10521 |
if (session != NULL && session->cipherId != SSL_NULL_WITH_NULL_NULL) |
1823
|
0 |
0 |
if (lssl->cipher == NULL) |
1837
|
0 |
0 |
for (i = 0; i < SSL_MAX_SESSION_ID_SIZE; i++) |
1839
|
0 |
0 |
if (session->id[i] != 0x0) |
1870
|
0 |
22314 |
if (ssl == NULL) |
1895
|
2284 |
20030 |
if (ssl->sessionIdLen > 0 && (ssl->flags & SSL_FLAGS_SERVER)) |
|
1142 |
1142 |
if (ssl->sessionIdLen > 0 && (ssl->flags & SSL_FLAGS_SERVER)) |
1900
|
11158 |
11156 |
if ((ssl->flags & SSL_FLAGS_SERVER) && ssl->sid) |
|
0 |
11158 |
if ((ssl->flags & SSL_FLAGS_SERVER) && ssl->sid) |
1910
|
0 |
22314 |
if (ssl->expectedName) |
1916
|
90 |
22224 |
if (ssl->sec.cert) |
1926
|
0 |
22314 |
if (ssl->sec.dhP) |
1930
|
0 |
22314 |
if (ssl->sec.dhG) |
1934
|
0 |
22314 |
if (ssl->sec.dhKeyPub) |
1940
|
0 |
22314 |
if (ssl->sec.dhKeyPriv) |
1949
|
0 |
22314 |
if (ssl->sec.eccKeyPub) |
1953
|
90 |
22224 |
if (ssl->sec.eccKeyPriv) |
1963
|
0 |
22314 |
if (ssl->sec.premaster) |
1967
|
0 |
22314 |
if (ssl->fragMessage) |
2012
|
0 |
22314 |
if (ssl->alpn) |
2033
|
9 |
0 |
if (option == SSL_OPTION_FULL_HANDSHAKE) |
2036
|
0 |
9 |
if (ssl->flags & SSL_FLAGS_SERVER) |
2046
|
0 |
9 |
if (option == SSL_OPTION_DISABLE_REHANDSHAKES) |
2051
|
0 |
9 |
if (option == SSL_OPTION_REENABLE_REHANDSHAKES) |
2058
|
0 |
9 |
if (ssl->flags & SSL_FLAGS_SERVER) |
2060
|
0 |
0 |
if (option == SSL_OPTION_DISABLE_CLIENT_AUTH) |
2064
|
0 |
0 |
else if (option == SSL_OPTION_ENABLE_CLIENT_AUTH) |
2312
|
10129 |
0 |
if ((ssl != NULL) && (certValidator != NULL)) |
|
10129 |
0 |
if ((ssl != NULL) && (certValidator != NULL)) |
2332
|
544 |
17 |
for (i = 0; i < SSL_SESSION_TABLE_SIZE; i++) |
2334
|
0 |
544 |
DLListInsertTail(&g_sessionChronList, &g_sessionTable[i].chronList); |
2355
|
0 |
1147 |
if (!(ssl->flags & SSL_FLAGS_SERVER)) |
2362
|
0 |
1147 |
if (ssl->sid && |
|
0 |
0 |
if (ssl->sid && |
2388
|
0 |
1147 |
if (DLListIsEmpty(&g_sessionChronList)) |
2400
|
0 |
1147 |
if (i >= SSL_SESSION_TABLE_SIZE) |
2454
|
0 |
7 |
if (ssl->sessionIdLen <= 0) |
2461
|
0 |
7 |
if (i >= SSL_SESSION_TABLE_SIZE) |
2467
|
7 |
0 |
if (g_sessionTable[i].inUse == 0) |
2469
|
0 |
7 |
DLListInsertTail(&g_sessionChronList, &g_sessionTable[i].chronList); |
2477
|
0 |
7 |
if (remove) |
2503
|
0 |
2 |
if (!(ssl->flags & SSL_FLAGS_SERVER)) |
2507
|
0 |
2 |
if (ssl->sessionIdLen <= 0) |
2515
|
2 |
0 |
if (i >= SSL_SESSION_TABLE_SIZE || g_sessionTable[i].cipher == NULL) |
|
0 |
2 |
if (i >= SSL_SESSION_TABLE_SIZE || g_sessionTable[i].cipher == NULL) |
2525
|
0 |
2 |
if ((memcmp(g_sessionTable[i].id, id, |
|
2 |
0 |
if ((memcmp(g_sessionTable[i].id, id, |
2526
|
2 |
0 |
(uint32) min(ssl->sessionIdLen, SSL_MAX_SESSION_ID_SIZE)) != 0) || |
2528
|
2 |
0 |
SSL_SESSION_ENTRY_LIFE) || (g_sessionTable[i].majVer != ssl->majVer) |
2529
|
0 |
2 |
|| (g_sessionTable[i].minVer != ssl->minVer)) |
2538
|
0 |
2 |
if (g_sessionTable[i].extendedMasterSecret == 0 && |
|
0 |
0 |
if (g_sessionTable[i].extendedMasterSecret == 0 && |
2544
|
2 |
0 |
if (g_sessionTable[i].extendedMasterSecret == 1 && |
|
0 |
2 |
if (g_sessionTable[i].extendedMasterSecret == 1 && |
2556
|
2 |
0 |
if (g_sessionTable[i].inUse == 1) |
2576
|
0 |
2199 |
if (!(ssl->flags & SSL_FLAGS_SERVER)) |
2580
|
0 |
2199 |
if (ssl->sessionIdLen == 0) |
2587
|
0 |
2199 |
if (i >= SSL_SESSION_TABLE_SIZE) |
2595
|
1142 |
1057 |
g_sessionTable[i].inUse += ssl->flags & SSL_FLAGS_CLOSED ? -1 : 0; |
2596
|
1142 |
1057 |
if (g_sessionTable[i].inUse == 0) |
2599
|
0 |
1142 |
DLListInsertTail(&g_sessionChronList, &g_sessionTable[i].chronList); |
2601
|
90 |
2109 |
if (ssl->flags & SSL_FLAGS_ERROR) |
2633
|
0 |
0 |
while (lkey) |
2635
|
0 |
0 |
if (lkey->inUse == 0 && (memcmp(lkey->name, name, 16) == 0)) |
|
0 |
0 |
if (lkey->inUse == 0 && (memcmp(lkey->name, name, 16) == 0)) |
2637
|
0 |
0 |
if (prev == NULL) |
2640
|
0 |
0 |
if (lkey->next == NULL) |
2691
|
1 |
0 |
if (symkeyLen != 16 && symkeyLen != 32) |
|
0 |
1 |
if (symkeyLen != 16 && symkeyLen != 32) |
2696
|
0 |
1 |
if (hashkeyLen != 32) |
2702
|
1 |
0 |
if (keys->sessTickets == NULL) |
2706
|
0 |
1 |
if (keys->sessTickets == NULL) |
2717
|
0 |
0 |
while (keylist) |
2723
|
0 |
0 |
if (i > SSL_SESSION_TICKET_LIST_LEN) |
2730
|
0 |
0 |
if (keylist == NULL) |
2797
|
0 |
0 |
if ((ticketLen + 6) > *outLen) |
2851
|
0 |
0 |
if ((rc = psAesInitCBC(&ctx, out + 6 + 16, keys->symkey, keys->symkeyLen, PS_AES_ENCRYPT)) < 0) |
2860
|
0 |
0 |
if ((rc = psHmacSha256Init(&dgst, keys->hashkey, keys->hashkeyLen)) < 0) |
2901
|
0 |
0 |
while (lkey) |
2903
|
0 |
0 |
if (memcmp(lkey->name, name, 16) == 0) |
2908
|
0 |
0 |
if (ssl->keys->ticket_cb) |
2921
|
0 |
0 |
if (ssl->keys->ticket_cb) |
2927
|
0 |
0 |
if (rc < 0) |
2929
|
0 |
0 |
if (lkey) |
2938
|
0 |
0 |
if (cachedTicket == 0) |
2942
|
0 |
0 |
if (lkey == NULL) |
2946
|
0 |
0 |
while (lkey->next) |
2950
|
0 |
0 |
if (memcmp(lkey->name, c, 16) != 0) |
2984
|
0 |
0 |
if (inLen != matrixSessionTicketLen()) |
2991
|
0 |
0 |
if (getTicketKeys(ssl, c, &keys) < 0) |
3024
|
0 |
0 |
if (memcmp(hash, c, L_HASHLEN) != 0) |
3035
|
0 |
0 |
if (majVer != ssl->majVer || minVer != ssl->minVer) |
|
0 |
0 |
if (majVer != ssl->majVer || minVer != ssl->minVer) |
3045
|
0 |
0 |
if ((ssl->cipher = sslGetCipherSpec(ssl, cipherSuite)) == NULL) |
3055
|
0 |
0 |
if (*enc == 0x0 && ssl->extFlags.require_extended_master_secret == 1) |
|
0 |
0 |
if (*enc == 0x0 && ssl->extFlags.require_extended_master_secret == 1) |
3074
|
0 |
0 |
if ((now - time) > (SSL_SESSION_ENTRY_LIFE / 1000)) |
3103
|
2119 |
0 |
if (ssl == NULL || ssl->flags & SSL_FLAGS_SERVER || session == NULL) |
|
1060 |
1059 |
if (ssl == NULL || ssl->flags & SSL_FLAGS_SERVER || session == NULL) |
|
550 |
510 |
if (ssl == NULL || ssl->flags & SSL_FLAGS_SERVER || session == NULL) |
3108
|
510 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
|
510 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
|
510 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
3118
|
0 |
510 |
if (session->sessionTicket != NULL && session->sessionTicketLen > 0) |
|
0 |
0 |
if (session->sessionTicket != NULL && session->sessionTicketLen > 0) |
3130
|
0 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
|
0 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
|
0 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
3131
|
0 |
0 |
session->sessionTicket != NULL && session->sessionTicketLen > 0) |
3153
|
0 |
0 |
if (protoCount > MAX_PROTO_EXT) |
3159
|
0 |
0 |
for (i = 0; i < protoCount; i++) |
3161
|
0 |
0 |
if (protoLen[i] <= 0 || protoLen[i] > 255) |
|
0 |
0 |
if (protoLen[i] <= 0 || protoLen[i] > 255) |
3167
|
0 |
0 |
if ((c = psMalloc(pool, len)) == NULL) |
3177
|
0 |
0 |
for (i = 0; i < protoCount; i++) |
3195
|
0 |
0 |
if ((c = psMalloc(pool, *extLen)) == NULL) |
3222
|
0 |
0 |
if (ssl->sni_cb) |
3227
|
0 |
0 |
if (keys) |
3246
|
7 |
7 |
if (!(ssl->flags & SSL_FLAGS_SERVER)) |
3255
|
7 |
7 |
if (ssl->flags & SSL_FLAGS_SERVER) |
3299
|
0 |
0 |
if (*c == '*') |
3303
|
0 |
0 |
if (*c != '.') |
3307
|
0 |
0 |
if (strchr(s, '@')) |
3311
|
0 |
0 |
if ((e = strchr(s, '.')) == NULL) |
3315
|
0 |
0 |
if (strcasecmp(c, e) == 0) |
3320
|
0 |
0 |
else if (*c == '.') |
3325
|
0 |
0 |
else if (strcasecmp(c, s) == 0) |
3338
|
0 |
0 |
if (strlen(expectedEmail) != emailLen) |
3343
|
0 |
0 |
if (caseSensitiveLocalPart) |
3347
|
0 |
0 |
for (at_i = 0; at_i < emailLen; at_i++) |
3349
|
0 |
0 |
if (email[at_i] == '@') |
3356
|
0 |
0 |
if (((strncmp(email, |
3357
|
0 |
0 |
expectedEmail, at_i)) == 0) && |
3367
|
0 |
0 |
if (strcasecmp(email, expectedEmail) == 0) |
3433
|
0 |
1148 |
if (opts->mFlags & VCERTS_MFLAG_ALWAYS_CHECK_SUBJECT_CN) |
3435
|
0 |
0 |
if (opts->nameType != NAME_TYPE_ANY && |
|
0 |
0 |
if (opts->nameType != NAME_TYPE_ANY && |
3436
|
0 |
0 |
opts->nameType != NAME_TYPE_HOSTNAME && |
3443
|
0 |
1148 |
if (opts->flags & VCERTS_FLAG_VALIDATE_EXPECTED_GENERAL_NAME) |
3448
|
0 |
0 |
if (expectedName) |
3450
|
0 |
0 |
if (psX509ValidateGeneralName(expectedName) < 0) |
3463
|
0 |
1148 |
if (issuerCerts == NULL) |
3472
|
1 |
1147 |
if ((ic = sc->next) != NULL) |
3478
|
0 |
1 |
while (ic->next != NULL) |
3480
|
0 |
0 |
if ((rc = psX509AuthenticateCert(pool, sc, ic, foundIssuer, hwCtx, |
3485
|
0 |
0 |
if (ic->extensions.bc.pathLenConstraint >= 0) |
3488
|
0 |
0 |
if (ic->extensions.bc.pathLenConstraint < pathLen) |
3502
|
0 |
1 |
if ((rc = psX509AuthenticateCert(pool, sc, ic, foundIssuer, hwCtx, |
3507
|
1 |
0 |
if (ic->extensions.bc.pathLenConstraint >= 0) |
3510
|
0 |
1 |
if (ic->extensions.bc.pathLenConstraint < pathLen) |
3531
|
1293 |
1 |
while (ic != NULL) |
3534
|
1147 |
146 |
if ((rc = psX509AuthenticateCert(pool, sc, ic, foundIssuer, hwCtx, |
3537
|
0 |
1147 |
if (ic->extensions.bc.pathLenConstraint >= 0) |
3545
|
0 |
0 |
if (ic->signatureLen == sc->signatureLen && |
|
0 |
0 |
if (ic->signatureLen == sc->signatureLen && |
3549
|
0 |
0 |
if (pathLen > 0) |
3554
|
0 |
0 |
if (ic->extensions.bc.pathLenConstraint < pathLen) |
3566
|
0 |
1147 |
if (ext->critFlags & EXT_CRIT_FLAG(OID_ENUM(id_ce_extKeyUsage))) |
3568
|
0 |
0 |
if (!(ext->ekuFlags & (EXT_KEY_USAGE_TLS_SERVER_AUTH | |
3578
|
0 |
1147 |
if (expectedName == NULL || |
|
0 |
0 |
if (expectedName == NULL || |
3584
|
0 |
0 |
for (n = ext->san; n != NULL; n = n->next) |
3590
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
3591
|
0 |
0 |
opts->nameType == NAME_TYPE_HOSTNAME || |
3594
|
0 |
0 |
if (wildcardMatch((char *) n->data, expectedName) == 0) |
3602
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
3605
|
0 |
0 |
if (opts->mFlags & |
3608
|
0 |
0 |
if (matchEmail((char *) n->data, n->dataLen, |
3616
|
0 |
0 |
if (matchEmail((char *) n->data, n->dataLen, |
3626
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
3635
|
0 |
0 |
if (strcmp(ip, expectedName) == 0) |
3669
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
3670
|
0 |
0 |
opts->nameType == NAME_TYPE_CN || |
3673
|
0 |
0 |
if (!foundSupportedSAN || |
|
0 |
0 |
if (!foundSupportedSAN || |
3676
|
0 |
0 |
if (wildcardMatch(subjectCerts->subject.commonName, |
3690
|
0 |
146 |
else if (rc == PS_MEM_FAIL) |
3725
|
1029 |
119 |
if (certValidator == NULL) |
3739
|
1 |
118 |
if (alert == SSL_ALERT_NONE) |