Branch Coverage

Tweet.xs
Criterion Covered Total %
branch 51 140 36.4


line true false branch
38 0 0 for (i = 0; i < 32; ++i)
55 0 0 if (pk_len != crypto_box_PUBLICKEYBYTES)
59 0 0 if (sk_len != crypto_box_SECRETKEYBYTES)
63 0 0 if (nonce_len != crypto_box_NONCEBYTES)
70 0 0 xNEWX(full_buf, full_len, unsigned char);
74 0 0 xNEWX(ctext_buf, full_len, unsigned char);
92 0 1 if (key_len != crypto_box_BEFORENMBYTES)
96 0 1 if (nonce_len != crypto_box_NONCEBYTES)
103 0 1 xNEWX(full_buf, full_len, unsigned char);
107 0 1 xNEWX(ctext_buf, full_len, unsigned char);
125 0 4 if (pk_len != crypto_box_PUBLICKEYBYTES)
129 0 4 if (sk_len != crypto_box_SECRETKEYBYTES)
132 0 4 xNEWX(key_buf, crypto_box_BEFORENMBYTES, unsigned char);
157 0 0 if (pk_len != crypto_box_PUBLICKEYBYTES)
161 0 0 if (sk_len != crypto_box_SECRETKEYBYTES)
165 0 0 if (nonce_len != crypto_secretbox_NONCEBYTES)
171 0 0 if (full_buf == NULL)
174 0 0 if (crypto_box_open(full_buf, ctext_buf, ctext_len, nonce_buf, pk_buf, sk_buf) != 0) {
193 0 2 if (key_len != crypto_box_BEFORENMBYTES)
197 0 2 if (nonce_len != crypto_box_NONCEBYTES)
203 0 2 if (full_buf == NULL)
206 1 1 if (crypto_box_open_afternm(full_buf, ctext_buf, ctext_len, nonce_buf, key_buf) != 0) {
234 0 0 switch(ix) {
250 0 0 if (key_len != key_len_req)
254 0 0 if (in_len != in_len_req)
257 0 0 xNEWX(out_buf, out_len, unsigned char);
281 0 0 if (msg_len & 127)
284 0 0 xNEWX(out_buf, crypto_hashblocks_STATEBYTES, unsigned char);
302 0 6 if (n_len != crypto_scalarmult_SCALARBYTES)
306 0 6 if (p_len != crypto_scalarmult_BYTES)
309 0 6 xNEWX(q_buf, crypto_scalarmult_BYTES, unsigned char);
327 0 2 if (n_len != crypto_scalarmult_SCALARBYTES)
330 0 2 xNEWX(q_buf, crypto_scalarmult_BYTES, unsigned char);
349 0 1 xNEWX(mac_buf, crypto_hash_BYTES, unsigned char);
369 0 1 if (key_len != crypto_onetimeauth_KEYBYTES)
374 0 1 xNEWX(auth_buf, crypto_onetimeauth_BYTES, unsigned char);
392 0 2 if (auth_len != crypto_onetimeauth_BYTES)
396 0 2 if (key_len != crypto_onetimeauth_KEYBYTES)
401 1 1 if (crypto_onetimeauth_verify(auth_buf, msg_buf, msg_len, key_buf) == 0)
413 0 3 if (key_len != crypto_secretbox_KEYBYTES)
417 0 3 if (nonce_len != crypto_secretbox_NONCEBYTES)
424 0 3 xNEWX(full_buf, full_len, unsigned char);
428 0 3 xNEWX(ctext_buf, full_len, unsigned char);
446 0 4 if (key_len != crypto_secretbox_KEYBYTES)
450 0 4 if (nonce_len != crypto_secretbox_NONCEBYTES)
456 0 4 if (full_buf == NULL)
459 3 1 if (crypto_secretbox_open(full_buf, ctext_buf, ctext_len, nonce_buf, key_buf) != 0) {
479 0 2 if (sk_len != crypto_sign_SECRETKEYBYTES)
484 0 2 xNEWX(sm_buf, msg_len + crypto_sign_BYTES + 1, unsigned char);
507 0 0 PUSHMARK(SP);
508 0 0 XPUSHs(sv_2mortal(newSViv(crypto_sign_SECRETKEYBYTES)));
512 0 0 if (n != 1)
517 0 0 if (sk_len != crypto_sign_SECRETKEYBYTES)
520 0 0 xNEWX(pk_buf, crypto_box_PUBLICKEYBYTES, unsigned char);
529 0 0 FREETMPS;
531 0 0 mXPUSHs(pk);
532 0 0 mXPUSHs(sk);
544 0 3 if (pk_len != crypto_sign_PUBLICKEYBYTES)
549 0 3 xNEWX(msg_buf, sm_len + 1, unsigned char);
551 2 1 if (crypto_sign_open(msg_buf, &msg_len, sm_buf, sm_len, pk_buf) != 0) {
571 0 1 if (key_len != crypto_stream_KEYBYTES)
575 0 1 if (nonce_len != crypto_stream_NONCEBYTES)
578 0 1 xNEWX(stream_buf, stream_len, unsigned char);
596 0 4 if (key_len != crypto_stream_KEYBYTES)
600 0 4 if (nonce_len != crypto_stream_NONCEBYTES)
605 0 4 xNEWX(ctext_buf, msg_len, unsigned char);
627 2 2 switch(ix) {
640 4 0 if (x_len != req_len || y_len != req_len)
0 4 if (x_len != req_len || y_len != req_len)
643 2 2 if (func(x_buf, y_buf) == 0)