Branch Coverage

PKCS12.xs
Criterion Covered Total %
branch 70 120 58.3


line true false branch
50 0 3 if (!strncmp(keyString, "----", 4)) {
52 0 0 CHECK_OPEN_SSL(stringBIO = BIO_new_mem_buf(keyString, strlen(keyString)));
56 0 3 CHECK_OPEN_SSL(stringBIO = BIO_new_file(keyString, "r"));
64 0 3 CHECK_OPEN_SSL(pkey);
75 0 3 if (!strncmp(keyString, "----", 4)) {
76 0 0 CHECK_OPEN_SSL(stringBIO = BIO_new_mem_buf(keyString, strlen(keyString)));
78 0 3 CHECK_OPEN_SSL(stringBIO = BIO_new_file(keyString, "r"));
82 3 3 for (i = 0; i < sk_X509_INFO_num(xis); i++) {
84 3 0 if (xi->x509 != NULL && stack != NULL) {
3 0 if (xi->x509 != NULL && stack != NULL) {
85 0 3 CHECK_OPEN_SSL(xi->x509);
86 0 3 if (!sk_X509_push(stack, xi->x509))
103 38 58 if (m == BIO_CB_WRITE) {
108 0 96 if (m == BIO_CB_PUTS) {
140 0 10 if (!sv) sv = &PL_sv_undef;
148 0 0 if (sv) sv_free(sv);
162 3 0 return SvPV(sv, l);
177 0 0 if (options & NOKEYS) return 1;
181 0 0 if (!(pkey = EVP_PKCS82PKEY (p8c))) return 0;
191 2 2 if (options & NOKEYS) return 1;
193 0 2 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
196 0 2 if (!(pkey = EVP_PKCS82PKEY (p8))) {
211 4 4 if (options & NOCERTS) return 1;
213 2 2 if (PKCS12_SAFEBAG_get0_attr(bag, NID_localKeyID)) {
215 0 2 if (options & CACERTS) return 1;
217 2 0 } else if (options & CLCERTS) {
222 0 2 if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return 1;
224 0 2 if (!(x509 = PKCS12_certbag2x509(bag))) return 0;
240 12 8 for (i = 0; i < sk_PKCS12_SAFEBAG_num(bags); i++) {
242 0 12 if (!dump_certs_pkeys_bag (bio, sk_PKCS12_SAFEBAG_value (bags, i), pass, passlen, options, pempass)) {
258 0 4 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) {
263 8 4 for (i = 0; i < sk_PKCS7_num(asafes); i++) {
269 4 4 if (bagnid == NID_pkcs7_data) {
273 4 0 } else if (bagnid == NID_pkcs7_encrypted) {
281 0 8 if (!bags) return 0;
283 0 8 if (!dump_certs_pkeys_bags(bio, bags, pass, passlen, options, pempass)) {
320 15 3 for (i = 0; (name = Crypt__OpenSSL__PKCS12__const[i].n); i++) {
331 0 0 if ((RETVAL = PKCS12_new()) == NULL) {
353 0 14 SvGETMAGIC(string);
0 0 SvGETMAGIC(string);
355 6 8 if (SvPOKp(string) || SvNOKp(string) || SvIOKp(string)) {
5 1 if (SvPOKp(string) || SvNOKp(string) || SvIOKp(string)) {
1 4 if (SvPOKp(string) || SvNOKp(string) || SvIOKp(string)) {
356 3 7 if (ix == 1) {
361 3 0 str_ptr = SvPV(string, str_len);
365 2 5 if (SvUTF8(string)) {
368 3 2 str_ptr = SvPV(string, str_len);
374 8 0 if (!str_ptr || !str_len) croak("PKCS12_new_from: No string or file was passed.");
0 8 if (!str_ptr || !str_len) croak("PKCS12_new_from: No string or file was passed.");
376 3 5 if (ix == 1) {
382 0 8 if (!bio) croak("Failed to create BIO");
385 3 5 if ((RETVAL = d2i_PKCS12_bio(bio, 0)) == NULL) {
401 5 0 if (pkcs12) {
428 0 2 if (!(i2d_PKCS12_bio(bio, pkcs12))) {
445 0 7 if (!(PKCS12_verify_mac(pkcs12, pwd, strlen(pwd)))) {
449 7 0 RETVAL = (PKCS12_verify_mac(pkcs12, pwd, strlen(pwd))) ? &PL_sv_yes : &PL_sv_no;
462 0 4 if (!(PKCS12_newpass(pkcs12, oldpwd, newpwd))) {
492 0 2 if (!p12) {
497 0 2 if (!(fp = fopen(file, "wb"))) {
531 0 1 if (!p12) {