line |
true |
false |
branch |
34
|
0 |
3 |
if ($blob) |
38
|
0 |
0 |
unless $ktype eq $key->ssh_name |
57
|
0 |
1 |
unless open FH, $key_file |
64
|
0 |
1 |
unless $blob =~ /^$str/ |
77
|
0 |
1 |
if not $passphrase and $ciphername ne 'none' |
80
|
0 |
1 |
if $kdfname ne 'none' and $kdfname ne 'bcrypt' |
83
|
0 |
1 |
if $kdfname ne 'none' and $ciphername eq 'none' |
86
|
0 |
1 |
if $nkeys != 1 |
90
|
0 |
1 |
if ($ciphername eq 'none') { } |
93
|
1 |
0 |
if ($kdfname eq 'bcrypt') |
96
|
0 |
1 |
unless $cipher |
97
|
0 |
1 |
if length $encrypted < $cipher->blocksize or length($encrypted) % $cipher->blocksize |
105
|
0 |
1 |
if length $tag != $authlen |
111
|
0 |
1 |
if length $salt != 16 |
127
|
0 |
1 |
if $check1 != $check2 or not defined $check1 |
131
|
0 |
1 |
unless $type eq $class->ssh_name |
135
|
0 |
1 |
if length $pub_key != 32 or length $priv_key != 64 |
143
|
0 |
15 |
if ord $b->get_char != ++$padnum |
159
|
0 |
0 |
if ($passphrase) { } |
163
|
0 |
0 |
unless $cipher |
212
|
0 |
0 |
if (my $r = length($kb->bytes) % $blocksize) |
215
|
0 |
0 |
$cipher ? : |
216
|
0 |
0 |
if $authlen |
218
|
0 |
0 |
if $tag |
221
|
0 |
0 |
unless open FH, ">$key_file" |
247
|
0 |
1 |
unless $ktype eq $key->ssh_name |
249
|
0 |
1 |
unless length $sigblob == 64 |
257
|
0 |
0 |
if $keyA->{'pub'} and $keyB->{'pub'} |
291
|
0 |
1 |
if $rounds < 1 |
292
|
0 |
1 |
unless $pass and $salt |
314
|
1 |
1 |
$amt < $keylen ? : |
318
|
0 |
48 |
if $dest >= $origkeylen |