| line |
true |
false |
branch |
|
11
|
0 |
107 |
if (!RETVAL) croak("FATAL: Newz failed"); |
|
14
|
0 |
107 |
if (RETVAL->pindex == -1) { |
|
19
|
0 |
107 |
if (rv != CRYPT_OK) { |
|
35
|
0 |
1 |
if (rv != CRYPT_OK) croak("FATAL: rsa_make_key failed: %s", error_to_string(rv)); |
|
36
|
0 |
1 |
XPUSHs(ST(0)); /* return self */ |
|
48
|
2 |
87 |
if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; } |
|
50
|
3 |
86 |
if (rv != CRYPT_OK) croak("FATAL: rsa_import failed: %s", error_to_string(rv)); |
|
51
|
0 |
86 |
XPUSHs(ST(0)); /* return self */ |
|
64
|
0 |
3 |
if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; } |
|
65
|
1 |
2 |
if (SvOK(passwd)) { |
|
71
|
1 |
2 |
if (rv != CRYPT_OK) croak("FATAL: rsa_import_pkcs8 failed: %s", error_to_string(rv)); |
|
72
|
0 |
2 |
XPUSHs(ST(0)); /* return self */ |
|
86
|
36 |
18 |
if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; } |
|
87
|
22 |
32 |
if (SvOK(passwd)) { |
|
93
|
0 |
54 |
if (rv != CRYPT_OK) croak("FATAL: pem_decode_pkcs failed: %s", error_to_string(rv)); |
|
94
|
0 |
54 |
if (key_from_pem.id != LTC_PKA_RSA) croak("FATAL: pem_decode_pkcs decoded non-RSA key"); |
|
96
|
0 |
54 |
XPUSHs(ST(0)); /* return self */ |
|
111
|
18 |
0 |
if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; } |
|
112
|
6 |
12 |
if (SvOK(passwd)) { |
|
118
|
0 |
18 |
if (rv != CRYPT_OK) croak("FATAL: pem_decode_openssh failed: %s", error_to_string(rv)); |
|
119
|
0 |
18 |
if (key_from_pem.id != LTC_PKA_RSA) croak("FATAL: pem_decode_openssh decoded non-RSA key"); |
|
121
|
0 |
18 |
XPUSHs(ST(0)); /* return self */ |
|
133
|
0 |
1 |
if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; } |
|
135
|
0 |
1 |
if (rv != CRYPT_OK) croak("FATAL: rsa_import_x509 failed: %s", error_to_string(rv)); |
|
136
|
0 |
1 |
XPUSHs(ST(0)); /* return self */ |
|
149
|
0 |
7 |
if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(N) failed: %s", error_to_string(rv)); |
|
151
|
0 |
7 |
if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(e) failed: %s", error_to_string(rv)); |
|
153
|
0 |
7 |
if (d && strlen(d) > 0) { |
|
|
0 |
0 |
if (d && strlen(d) > 0) { |
|
156
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(d) failed: %s", error_to_string(rv)); |
|
158
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: rsa_set_key failed: %s", error_to_string(rv)); |
|
163
|
0 |
7 |
if (rv != CRYPT_OK) croak("FATAL: rsa_set_key failed: %s", error_to_string(rv)); |
|
166
|
0 |
7 |
if (p && strlen(p) > 0 && q && strlen(q) > 0) { |
|
|
0 |
0 |
if (p && strlen(p) > 0 && q && strlen(q) > 0) { |
|
|
0 |
0 |
if (p && strlen(p) > 0 && q && strlen(q) > 0) { |
|
|
0 |
0 |
if (p && strlen(p) > 0 && q && strlen(q) > 0) { |
|
169
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(p) failed: %s", error_to_string(rv)); |
|
171
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(q) failed: %s", error_to_string(rv)); |
|
173
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: rsa_set_factors failed: %s", error_to_string(rv)); |
|
176
|
0 |
7 |
if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) { |
|
|
0 |
0 |
if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) { |
|
|
0 |
0 |
if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) { |
|
|
0 |
0 |
if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) { |
|
|
0 |
0 |
if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) { |
|
|
0 |
0 |
if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) { |
|
179
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(dP) failed: %s", error_to_string(rv)); |
|
181
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(dQ) failed: %s", error_to_string(rv)); |
|
183
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(qP) failed: %s", error_to_string(rv)); |
|
185
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: rsa_set_crt_params failed: %s", error_to_string(rv)); |
|
188
|
0 |
7 |
XPUSHs(ST(0)); /* return self */ |
|
194
|
88 |
0 |
if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF; |
|
|
0 |
88 |
if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF; |
|
195
|
68 |
20 |
RETVAL = (self->key.type == PK_PRIVATE) ? 1 : 0; |
|
202
|
1 |
0 |
if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF; |
|
|
0 |
1 |
if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF; |
|
215
|
133 |
0 |
if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF; |
|
|
0 |
133 |
if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF; |
|
219
|
133 |
0 |
siz = (self->key.e) ? mp_ubin_size(self->key.e) : 0; |
|
220
|
0 |
133 |
if (siz>10000) { |
|
223
|
133 |
0 |
if (siz>0) { |
|
231
|
133 |
0 |
siz = (self->key.d) ? mp_ubin_size(self->key.d) : 0; |
|
232
|
0 |
133 |
if (siz>10000) { |
|
235
|
73 |
60 |
if (siz>0) { |
|
243
|
133 |
0 |
siz = (self->key.N) ? nsize : 0; |
|
244
|
0 |
133 |
if (siz>10000) { |
|
247
|
133 |
0 |
if (siz>0) { |
|
255
|
133 |
0 |
siz = (self->key.q) ? mp_ubin_size(self->key.q) : 0; |
|
256
|
0 |
133 |
if (siz>10000) { |
|
259
|
73 |
60 |
if (siz>0) { |
|
267
|
133 |
0 |
siz = (self->key.p) ? mp_ubin_size(self->key.p) : 0; |
|
268
|
0 |
133 |
if (siz>10000) { |
|
271
|
73 |
60 |
if (siz>0) { |
|
279
|
133 |
0 |
siz = (self->key.qP) ? mp_ubin_size(self->key.qP) : 0; |
|
280
|
0 |
133 |
if (siz>10000) { |
|
283
|
73 |
60 |
if (siz>0) { |
|
291
|
133 |
0 |
siz = (self->key.dP) ? mp_ubin_size(self->key.dP) : 0; |
|
292
|
0 |
133 |
if (siz>10000) { |
|
295
|
73 |
60 |
if (siz>0) { |
|
303
|
133 |
0 |
siz = (self->key.dQ) ? mp_ubin_size(self->key.dQ) : 0; |
|
304
|
0 |
133 |
if (siz>10000) { |
|
307
|
73 |
60 |
if (siz>0) { |
|
332
|
2 |
3 |
if (strnEQ(type, "private", 7)) { |
|
334
|
0 |
2 |
if (rv != CRYPT_OK) croak("FATAL: rsa_export(PK_PRIVATE) failed: %s", error_to_string(rv)); |
|
337
|
3 |
0 |
else if (strnEQ(type, "public", 6)) { |
|
339
|
0 |
3 |
if (rv != CRYPT_OK) croak("FATAL: rsa_export(PK_PUBLIC|PK_STD) failed: %s", error_to_string(rv)); |
|
364
|
1 |
1 |
if (strnEQ(padding, "oaep", 4)) { |
|
366
|
0 |
1 |
if (mgf_hash_id == -1) croak("FATAL: find_hash failed for '%s'", mgf_hash); |
|
367
|
0 |
1 |
if (lparam_hash) { |
|
369
|
0 |
0 |
if (lparam_hash_id == -1) croak("FATAL: find_hash failed for '%s'", lparam_hash); |
|
374
|
0 |
1 |
if (oaep_lparam) lparam_ptr = (unsigned char *)SvPVbyte(oaep_lparam, lparam_len); |
|
378
|
0 |
1 |
if (rv != CRYPT_OK) croak("FATAL: rsa_encrypt_key_ex failed: %s", error_to_string(rv)); |
|
381
|
0 |
1 |
else if (strnEQ(padding, "v1.5", 4)) { |
|
385
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: rsa_encrypt_key_ex failed: %s", error_to_string(rv)); |
|
388
|
1 |
0 |
else if (strnEQ(padding, "none", 4)) { |
|
391
|
0 |
1 |
if (rv != CRYPT_OK) croak("FATAL: rsa_me failed: %s", error_to_string(rv)); |
|
416
|
1 |
37 |
if (strnEQ(padding, "oaep", 4)) { |
|
418
|
0 |
1 |
if (mgf_hash_id == -1) croak("FATAL: find_hash failed for '%s'", mgf_hash); |
|
419
|
0 |
1 |
if (lparam_hash) { |
|
421
|
0 |
0 |
if (lparam_hash_id == -1) croak("FATAL: find_hash failed for '%s'", lparam_hash); |
|
426
|
0 |
1 |
if (oaep_lparam) lparam_ptr = (unsigned char *)SvPVbyte(oaep_lparam, lparam_len); |
|
429
|
0 |
1 |
if (rv != CRYPT_OK) croak("FATAL: rsa_decrypt_key_ex failed: %s", error_to_string(rv)); |
|
430
|
0 |
1 |
if (stat != 1) croak("FATAL: rsa_decrypt - not valid OAEP packet"); |
|
433
|
36 |
1 |
else if (strnEQ(padding, "v1.5", 4)) { |
|
436
|
0 |
36 |
if (rv != CRYPT_OK) croak("FATAL: rsa_decrypt_key_ex failed: %s", error_to_string(rv)); |
|
437
|
0 |
36 |
if (stat != 1) croak("FATAL: rsa_decrypt - invalid"); |
|
440
|
1 |
0 |
else if (strnEQ(padding, "none", 4)) { |
|
443
|
0 |
1 |
if (rv != CRYPT_OK) croak("FATAL: rsa_me failed: %s", error_to_string(rv)); |
|
465
|
2 |
2 |
if (ix == 1) { |
|
467
|
0 |
2 |
if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name); |
|
469
|
0 |
2 |
if (rv != CRYPT_OK) croak("FATAL: hash_memory failed: %s", error_to_string(rv)); |
|
473
|
4 |
0 |
if (strnEQ(padding, "pss", 3)) { |
|
475
|
0 |
4 |
if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name); |
|
479
|
0 |
4 |
if (rv != CRYPT_OK) croak("FATAL: rsa_sign_hash_ex failed: %s", error_to_string(rv)); |
|
482
|
0 |
0 |
else if (strnEQ(padding, "v1.5", 4)) { |
|
484
|
0 |
0 |
if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name); |
|
488
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: rsa_sign_hash_ex failed: %s", error_to_string(rv)); |
|
491
|
0 |
0 |
else if (strnEQ(padding, "none", 4)) { |
|
494
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: rsa_me failed: %s", error_to_string(rv)); |
|
517
|
107 |
2 |
if (ix == 1) { |
|
519
|
0 |
107 |
if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name); |
|
521
|
0 |
107 |
if (rv != CRYPT_OK) croak("FATAL: hash_memory failed: %s", error_to_string(rv)); |
|
527
|
4 |
105 |
if (strnEQ(padding, "pss", 3)) { |
|
529
|
0 |
4 |
if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name); |
|
532
|
4 |
0 |
if (rv != CRYPT_OK || stat != 1) RETVAL = 0; |
|
|
0 |
4 |
if (rv != CRYPT_OK || stat != 1) RETVAL = 0; |
|
534
|
105 |
0 |
else if (strnEQ(padding, "v1.5", 4)) { |
|
536
|
0 |
105 |
if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name); |
|
539
|
103 |
2 |
if (rv != CRYPT_OK || stat != 1) RETVAL = 0; |
|
|
0 |
103 |
if (rv != CRYPT_OK || stat != 1) RETVAL = 0; |
|
541
|
0 |
0 |
else if (strnEQ(padding, "none", 4)) { |
|
545
|
0 |
0 |
if (rv != CRYPT_OK) croak("FATAL: rsa_me failed: %s", error_to_string(rv)); |
|
546
|
0 |
0 |
if (data_len <= buffer_len && buffer_len > 0 && data_len > 0) { |
|
|
0 |
0 |
if (data_len <= buffer_len && buffer_len > 0 && data_len > 0) { |
|
|
0 |
0 |
if (data_len <= buffer_len && buffer_len > 0 && data_len > 0) { |
|
547
|
0 |
0 |
for (i = 0; i < buffer_len - data_len; i++) if (buffer[i] != 0) RETVAL = 0; |
|
|
0 |
0 |
for (i = 0; i < buffer_len - data_len; i++) if (buffer[i] != 0) RETVAL = 0; |
|
548
|
0 |
0 |
if (memNE(data_ptr, buffer + buffer_len - data_len, data_len)) RETVAL = 0; |
|
564
|
107 |
0 |
if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; } |