| line |
true |
false |
branch |
|
11
|
0 |
0 |
if (!RETVAL) croak("FATAL: Newz failed"); |
|
14
|
0 |
0 |
if (RETVAL->pindex == -1) { |
|
19
|
0 |
0 |
if (rv != CRYPT_OK) { |
|
34
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: ed25519_make_key failed: %s", error_to_string(rv)); |
|
36
|
0 |
0 |
XPUSHs(ST(0)); /* return self */ |
|
47
|
0 |
0 |
data = (unsigned char *)SvPVbyte(key_data, data_len); |
|
50
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: ed25519_import failed: %s", error_to_string(rv)); |
|
52
|
0 |
0 |
XPUSHs(ST(0)); /* return self */ |
|
63
|
0 |
0 |
data = (unsigned char *)SvPVbyte(key_data, data_len); |
|
64
|
0 |
0 |
if (SvOK(passwd)) { |
|
|
0 |
0 |
if (SvOK(passwd)) { |
|
|
0 |
0 |
if (SvOK(passwd)) { |
|
65
|
0 |
0 |
pwd = (unsigned char *)SvPVbyte(passwd, pwd_len); |
|
69
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: ed25519_import_pkcs8 failed: %s", error_to_string(rv)); |
|
71
|
0 |
0 |
XPUSHs(ST(0)); /* return self */ |
|
82
|
0 |
0 |
data = (unsigned char *)SvPVbyte(key_data, data_len); |
|
85
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: ed25519_import_x509 failed: %s", error_to_string(rv)); |
|
87
|
0 |
0 |
XPUSHs(ST(0)); /* return self */ |
|
98
|
0 |
0 |
if (SvOK(key)) { |
|
|
0 |
0 |
if (SvOK(key)) { |
|
|
0 |
0 |
if (SvOK(key)) { |
|
99
|
0 |
0 |
key_data = (unsigned char *)SvPVbyte(key, key_len); |
|
102
|
0 |
0 |
if (which == 0) { |
|
105
|
0 |
0 |
else if (which == 1) { |
|
111
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: ed25519_import_raw failed: %s", error_to_string(rv)); |
|
113
|
0 |
0 |
XPUSHs(ST(0)); /* return self */ |
|
119
|
0 |
0 |
if (self->initialized == 0) XSRETURN_UNDEF; |
|
133
|
0 |
0 |
if (self->initialized == 0) XSRETURN_UNDEF; |
|
136
|
0 |
0 |
if (self->key.type == PK_PRIVATE) { |
|
139
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: base16_encode failed: %s", error_to_string(rv)); |
|
148
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: base16_encode failed: %s", error_to_string(rv)); |
|
166
|
0 |
0 |
if (strnEQ(type, "private", 7)) { |
|
168
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: ed25519_export(PK_PRIVATE|PK_STD) failed: %s", error_to_string(rv)); |
|
171
|
0 |
0 |
else if (strnEQ(type, "public", 6)) { |
|
173
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: ed25519_export(PK_PUBLIC|PK_STD) failed: %s", error_to_string(rv)); |
|
192
|
0 |
0 |
if (strnEQ(type, "private", 7)) { |
|
194
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: ed25519_export(PK_PRIVATE) failed: %s", error_to_string(rv)); |
|
197
|
0 |
0 |
else if (strnEQ(type, "public", 6)) { |
|
199
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: ed25519_export(PK_PUBLIC) failed: %s", error_to_string(rv)); |
|
218
|
0 |
0 |
data_ptr = (unsigned char *)SvPVbyte(data, data_len); |
|
220
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: ed25519_sign failed: %s", error_to_string(rv)); |
|
234
|
0 |
0 |
data_ptr = (unsigned char *)SvPVbyte(data, data_len); |
|
235
|
0 |
0 |
sig_ptr = (unsigned char *)SvPVbyte(sig, sig_len); |
|
239
|
0 |
0 |
if (rv == CRYPT_OK && stat == 1) RETVAL = 1; |
|
|
0 |
0 |
if (rv == CRYPT_OK && stat == 1) RETVAL = 1; |