| line |
true |
false |
branch |
|
23
|
15646 |
0 |
if (y < 0x80) { |
|
42
|
21973 |
1255 |
if (y < 0x80) { |
|
43
|
2933 |
19040 |
if (neg) { |
|
147
|
0 |
1 |
if (xcoor_len > sizeof rpms) { |
|
206
|
0 |
0 |
if (cpoint_len > sizeof cpoint) { |
|
225
|
0 |
1 |
if (hash_id == 0) { |
|
229
|
0 |
0 |
if (hf == NULL) { |
|
236
|
0 |
0 |
if (hf == NULL) { |
|
246
|
0 |
1 |
if (hf == NULL) { |
|
272
|
0 |
1 |
if (!((ctx->eng.iec->supported_curves >> curve) & 1)) { |
|
287
|
2 |
1 |
while (mask >= order[0]) { |
|
315
|
1 |
0 |
if (algo_id >= (unsigned)0xFF00) { |
|
318
|
0 |
1 |
if (hv_len == 0) { |
|
325
|
1 |
0 |
return sig_len ? (int)sig_len : -BR_ERR_INVALID_ALGORITHM; |
|
414
|
0 |
0 |
if (pk->key_type == BR_KEYTYPE_RSA) { |
|
418
|
0 |
0 |
if (id == 0) { |
|
423
|
0 |
0 |
if (ctx->eng.irsavrfy == 0) { |
|
426
|
0 |
0 |
if (!ctx->eng.irsavrfy(ctx->eng.pad, sig_len, |
|
428
|
0 |
0 |
|| memcmp(tmp, ctx->hash_CV, ctx->hash_CV_len) != 0) |
|
433
|
0 |
0 |
if (ctx->eng.iecdsa == 0) { |
|
436
|
0 |
0 |
if (!ctx->eng.iecdsa(ctx->eng.iec, |
|
1013
|
74885 |
11356 |
if (t0x < T0_INTERPRETED) { |
|
1021
|
0 |
11354 |
if (t0x == 0) { |
|
1042
|
2210 |
215 |
if (T0_POP()) { |
|
1048
|
3296 |
1026 |
if (!T0_POP()) { |
|
1168
|
1 |
1 |
if (ENG->chain_len == 0) { |
|
1184
|
0 |
0 |
if (CTX->cur_dn_index >= CTX->num_tas) { |
|
1187
|
0 |
0 |
if (CTX->ta_names == NULL) { |
|
1242
|
0 |
1 |
if (ENG->session.session_id_len == 32 |
|
1268
|
2 |
0 |
if (ENG->session.version >= BR_TLS12) { |
|
1275
|
1 |
1 |
prf(ENG->pad, 12, ENG->session.master_secret, |
|
1287
|
0 |
0 |
for (i = 1; i <= 6; i ++) { |
|
1300
|
1 |
2 |
if (clen > sizeof ENG->pad) { |
|
1316
|
0 |
0 |
if (clen > sizeof ENG->pad) { |
|
1332
|
0 |
0 |
if (id == 0) { |
|
1336
|
0 |
0 |
if (br_multihash_getimpl(&ENG->mhash, id) == 0) { |
|
1451
|
0 |
0 |
if (pk == NULL) { |
|
1523
|
2 |
0 |
T0_PUSHi(ENG->hlen_in != 0 || !br_ssl_engine_recvrec_finished(ENG)); |
|
|
0 |
2 |
T0_PUSHi(ENG->hlen_in != 0 || !br_ssl_engine_recvrec_finished(ENG)); |
|
1573
|
5 |
0 |
if (clen > 0) { |
|
1578
|
3 |
2 |
if ((size_t)len < clen) { |
|
1582
|
5 |
0 |
if (ENG->record_type_in == BR_SSL_HANDSHAKE) { |
|
1596
|
175 |
6 |
if (ENG->hlen_in > 0) { |
|
1600
|
172 |
3 |
if (ENG->record_type_in == BR_SSL_HANDSHAKE) { |
|
1614
|
0 |
1 |
if (CTX->cache_vtable != NULL) { |
|
1634
|
0 |
0 |
if (ENG->hlen_out > max_frag_len) { |
|
1667
|
1 |
0 |
uint32_t x = ENG->iec == NULL ? 0 : ENG->iec->supported_curves; |
|
1680
|
5 |
1 |
for (i = br_sha1_ID; i <= br_sha512_ID; i ++) { |
|
1681
|
5 |
0 |
if (br_multihash_getimpl(&ENG->mhash, i)) { |
|
1779
|
0 |
0 |
br_ssl_engine_switch_cbc_in(ENG, is_client, prf_id, mac_id, |
|
1795
|
0 |
0 |
br_ssl_engine_switch_cbc_out(ENG, is_client, prf_id, mac_id, |
|
1828
|
0 |
2 |
if (CTX->ta_names != NULL) { |
|
1829
|
0 |
0 |
for (u = 0; u < CTX->num_tas; u ++) { |
|
1832
|
0 |
2 |
} else if (CTX->tas != NULL) { |
|
1833
|
0 |
0 |
for (u = 0; u < CTX->num_tas; u ++) { |
|
1847
|
0 |
0 |
for (u = 0; u < ENG->protocol_names_num; u ++) { |
|
1851
|
0 |
0 |
if (len == strlen(name) && memcmp(ENG->pad, name, len) == 0) { |
|
|
0 |
0 |
if (len == strlen(name) && memcmp(ENG->pad, name, len) == 0) { |
|
1867
|
1 |
1 |
for (u = 0; u < ENG->chain_len; u ++) { |
|
1906
|
8 |
0 |
if (clen > 0) { |
|
1911
|
8 |
0 |
if ((size_t)len < clen) { |
|
1915
|
8 |
0 |
if (ENG->record_type_out == BR_SSL_HANDSHAKE) { |
|
1932
|
50 |
0 |
if (ENG->hlen_out > 0) { |
|
1933
|
47 |
3 |
if (ENG->record_type_out == BR_SSL_HANDSHAKE) { |
|
1995
|
0 |
0 |
xc->start_chain(ENG->x509ctx, bc ? ENG->server_name : NULL); |