line |
true |
false |
branch |
23
|
7 |
0 |
if (SvROK(sv) && sv_derived_from(sv, "Crypt::OpenSSL::Bignum")) { |
|
7 |
0 |
if (SvROK(sv) && sv_derived_from(sv, "Crypt::OpenSSL::Bignum")) { |
24
|
7 |
0 |
return INT2PTR(Crypt__OpenSSL__Bignum, SvIV((SV*)SvRV(sv))); |
49
|
0 |
10 |
checkOpenSslCall( bn = BN_new() ); |
50
|
0 |
10 |
checkOpenSslCall( BN_set_word( bn, p_word ) ); |
62
|
0 |
5 |
checkOpenSslCall( BN_dec2bn( &bn, p_dec_string ) ); |
74
|
0 |
1 |
checkOpenSslCall( BN_hex2bn( &bn, p_hex_string ) ); |
87
|
2 |
0 |
bin = (unsigned char*) SvPV( p_bin_string_SV, bin_length ); |
88
|
0 |
2 |
checkOpenSslCall( bn = BN_bin2bn( bin, bin_length, NULL ) ); |
98
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
99
|
0 |
1 |
checkOpenSslCall( BN_set_word( bn, 0 ) ); |
109
|
0 |
2 |
checkOpenSslCall( bn = BN_new() ); |
110
|
0 |
2 |
checkOpenSslCall( BN_set_word( bn, 0 ) ); |
120
|
0 |
2 |
checkOpenSslCall( bn = BN_new() ); |
121
|
0 |
2 |
checkOpenSslCall( BN_one( bn ) ); |
131
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
132
|
0 |
1 |
checkOpenSslCall( BN_rand( bn, bits, top, bottom) ); |
142
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
143
|
0 |
1 |
checkOpenSslCall( BN_pseudo_rand( bn, bits, top, bottom) ); |
153
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
154
|
0 |
1 |
checkOpenSslCall( BN_rand_range( bn, r) ); |
168
|
0 |
9 |
checkOpenSslCall( RETVAL = BN_bn2dec( self ) ); |
177
|
0 |
1 |
checkOpenSslCall( RETVAL = BN_bn2hex( self ) ); |
190
|
3 |
0 |
if (length>0) { |
194
|
3 |
0 |
bin = (unsigned char *)SvPV_nolen(RETVAL); |
220
|
0 |
2 |
if( items > 3 ) |
222
|
1 |
1 |
bn = ( items < 3 ) ? BN_new() : sv2bn( ST(2) ); |
223
|
0 |
2 |
checkOpenSslCall( BN_add( bn, self, b ) ); |
224
|
1 |
1 |
ST(0) = ( (items < 3 ) ? new_obj( bn ) : ST(2) ); |
232
|
0 |
2 |
if( items > 3 ) |
234
|
1 |
1 |
bn = ( items < 3 ) ? BN_new() : sv2bn( ST(2) ); |
235
|
0 |
2 |
checkOpenSslCall( BN_sub( bn, self, b ) ); |
236
|
1 |
1 |
ST(0) = ( (items < 3 ) ? new_obj( bn ) : ST(2) ); |
247
|
0 |
2 |
if( items > 4 ) |
249
|
1 |
1 |
bn = ( items < 4 ) ? BN_new() : sv2bn( ST(3) ); |
250
|
0 |
2 |
checkOpenSslCall( BN_mul( bn, self, b, ctx ) ); |
251
|
1 |
1 |
ST(0) = ( (items < 4 ) ? new_obj( bn ) : ST(3) ); |
263
|
0 |
3 |
if( items > 5 ) |
265
|
1 |
2 |
quotient = ( items < 4 ) ? BN_new() : sv2bn( ST(3) ); |
266
|
2 |
1 |
remainder = ( items < 5 ) ? BN_new() : sv2bn( ST(4) ); |
267
|
0 |
3 |
checkOpenSslCall( BN_div( quotient, remainder, self, b, ctx ) ); |
268
|
1 |
2 |
ST(0) = ( (items < 4 ) ? new_obj( quotient ) : ST(3) ); |
269
|
2 |
1 |
ST(1) = ( (items < 5 ) ? new_obj( remainder ) : ST(4) ); |
277
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
278
|
0 |
1 |
checkOpenSslCall( BN_sqr( bn, self, ctx ) ); |
291
|
0 |
2 |
if( items > 4 ) |
293
|
1 |
1 |
bn = ( items < 4 ) ? BN_new() : sv2bn( ST(3) ); |
294
|
0 |
2 |
checkOpenSslCall( BN_mod( bn, self, b, ctx ) ); |
295
|
1 |
1 |
ST(0) = ( (items < 4 ) ? new_obj( bn ) : ST(3) ); |
307
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
308
|
0 |
1 |
checkOpenSslCall( BN_mod_mul( bn, self, b, m, ctx ) ); |
321
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
322
|
0 |
1 |
checkOpenSslCall( BN_exp( bn, self, exp, ctx ) ); |
336
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
337
|
0 |
1 |
checkOpenSslCall( BN_mod_exp( bn, self, exp, mod, ctx ) ); |
350
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
351
|
0 |
1 |
checkOpenSslCall( BN_mod_inverse( bn, self, n, ctx ) ); |
364
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
365
|
0 |
1 |
checkOpenSslCall( BN_gcd( bn, self, b, ctx ) ); |
391
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
392
|
0 |
1 |
checkOpenSslCall( BN_rshift( bn, self, n ) ); |
402
|
0 |
1 |
checkOpenSslCall( bn = BN_new() ); |
403
|
0 |
1 |
checkOpenSslCall( BN_lshift( bn, self, n ) ); |
417
|
0 |
1 |
checkOpenSslCall( RETVAL = BN_dup(self) ); |
424
|
0 |
1 |
checkOpenSslCall( RETVAL = PTR2IV(BN_dup(self)) ); |