line |
true |
false |
branch |
50
|
0 |
1 |
if (!strncmp(keyString, "----", 4)) { |
52
|
0 |
0 |
CHECK_OPEN_SSL(stringBIO = BIO_new_mem_buf(keyString, strlen(keyString))); |
56
|
0 |
1 |
CHECK_OPEN_SSL(stringBIO = BIO_new_file(keyString, "r")); |
64
|
0 |
1 |
CHECK_OPEN_SSL(pkey); |
75
|
0 |
1 |
if (!strncmp(keyString, "----", 4)) { |
76
|
0 |
0 |
CHECK_OPEN_SSL(stringBIO = BIO_new_mem_buf(keyString, strlen(keyString))); |
78
|
0 |
1 |
CHECK_OPEN_SSL(stringBIO = BIO_new_file(keyString, "r")); |
82
|
1 |
1 |
for (i = 0; i < sk_X509_INFO_num(xis); i++) { |
84
|
1 |
0 |
if (xi->x509 != NULL && stack != NULL) { |
|
1 |
0 |
if (xi->x509 != NULL && stack != NULL) { |
85
|
0 |
1 |
CHECK_OPEN_SSL(xi->x509); |
86
|
0 |
1 |
if (!sk_X509_push(stack, xi->x509)) |
103
|
17 |
23 |
if (m == BIO_CB_WRITE) { |
108
|
0 |
40 |
if (m == BIO_CB_PUTS) { |
140
|
0 |
3 |
if (!sv) sv = &PL_sv_undef; |
148
|
0 |
0 |
if (sv) sv_free(sv); |
162
|
0 |
0 |
return SvPV(sv, l); |
177
|
0 |
0 |
if (options & NOKEYS) return 1; |
181
|
0 |
0 |
if (!(pkey = EVP_PKCS82PKEY (p8c))) return 0; |
191
|
1 |
1 |
if (options & NOKEYS) return 1; |
193
|
0 |
1 |
if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) |
196
|
0 |
1 |
if (!(pkey = EVP_PKCS82PKEY (p8))) { |
211
|
2 |
2 |
if (options & NOCERTS) return 1; |
213
|
1 |
1 |
if (PKCS12_SAFEBAG_get0_attr(bag, NID_localKeyID)) { |
215
|
0 |
1 |
if (options & CACERTS) return 1; |
217
|
1 |
0 |
} else if (options & CLCERTS) { |
222
|
0 |
1 |
if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return 1; |
224
|
0 |
1 |
if (!(x509 = PKCS12_certbag2x509(bag))) return 0; |
240
|
6 |
4 |
for (i = 0; i < sk_PKCS12_SAFEBAG_num(bags); i++) { |
242
|
0 |
6 |
if (!dump_certs_pkeys_bag (bio, sk_PKCS12_SAFEBAG_value (bags, i), pass, passlen, options, pempass)) { |
258
|
0 |
2 |
if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) { |
263
|
4 |
2 |
for (i = 0; i < sk_PKCS7_num(asafes); i++) { |
269
|
2 |
2 |
if (bagnid == NID_pkcs7_data) { |
273
|
2 |
0 |
} else if (bagnid == NID_pkcs7_encrypted) { |
281
|
0 |
4 |
if (!bags) return 0; |
283
|
0 |
4 |
if (!dump_certs_pkeys_bags(bio, bags, pass, passlen, options, pempass)) { |
320
|
10 |
2 |
for (i = 0; (name = Crypt__OpenSSL__PKCS12__const[i].n); i++) { |
331
|
0 |
0 |
if ((RETVAL = PKCS12_new()) == NULL) { |
351
|
0 |
2 |
if (!string) croak("PKCS12_new_from: No string or file was passed."); |
353
|
2 |
0 |
if (ix == 1) { |
359
|
0 |
2 |
if (!bio) croak("Failed to create BIO"); |
362
|
0 |
2 |
if ((RETVAL = d2i_PKCS12_bio(bio, 0)) == NULL) { |
378
|
2 |
0 |
if (pkcs12) { |
405
|
0 |
1 |
if (!(i2d_PKCS12_bio(bio, pkcs12))) { |
422
|
0 |
3 |
if (!(PKCS12_verify_mac(pkcs12, pwd, strlen(pwd)))) { |
426
|
3 |
0 |
RETVAL = (PKCS12_verify_mac(pkcs12, pwd, strlen(pwd))) ? &PL_sv_yes : &PL_sv_no; |
439
|
0 |
2 |
if (!(PKCS12_newpass(pkcs12, oldpwd, newpwd))) { |
469
|
0 |
1 |
if (!p12) { |
474
|
0 |
1 |
if (!(fp = fopen(file, "wb"))) { |