Branch Coverage

inc/CryptX_PK_RSA.xs.inc
Criterion Covered Total %
branch 126 276 45.6


line true false branch
11 0 107 if (!RETVAL) croak("FATAL: Newz failed");
14 0 107 if (RETVAL->pindex == -1) {
19 0 107 if (rv != CRYPT_OK) {
35 0 1 if (rv != CRYPT_OK) croak("FATAL: rsa_make_key failed: %s", error_to_string(rv));
36 0 1 XPUSHs(ST(0)); /* return self */
48 2 87 if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; }
50 3 86 if (rv != CRYPT_OK) croak("FATAL: rsa_import failed: %s", error_to_string(rv));
51 0 86 XPUSHs(ST(0)); /* return self */
64 0 3 if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; }
65 1 2 if (SvOK(passwd)) {
71 1 2 if (rv != CRYPT_OK) croak("FATAL: rsa_import_pkcs8 failed: %s", error_to_string(rv));
72 0 2 XPUSHs(ST(0)); /* return self */
86 36 18 if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; }
87 22 32 if (SvOK(passwd)) {
93 0 54 if (rv != CRYPT_OK) croak("FATAL: pem_decode_pkcs failed: %s", error_to_string(rv));
94 0 54 if (key_from_pem.id != LTC_PKA_RSA) croak("FATAL: pem_decode_pkcs decoded non-RSA key");
96 0 54 XPUSHs(ST(0)); /* return self */
111 18 0 if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; }
112 6 12 if (SvOK(passwd)) {
118 0 18 if (rv != CRYPT_OK) croak("FATAL: pem_decode_openssh failed: %s", error_to_string(rv));
119 0 18 if (key_from_pem.id != LTC_PKA_RSA) croak("FATAL: pem_decode_openssh decoded non-RSA key");
121 0 18 XPUSHs(ST(0)); /* return self */
133 0 1 if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; }
135 0 1 if (rv != CRYPT_OK) croak("FATAL: rsa_import_x509 failed: %s", error_to_string(rv));
136 0 1 XPUSHs(ST(0)); /* return self */
149 0 7 if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(N) failed: %s", error_to_string(rv));
151 0 7 if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(e) failed: %s", error_to_string(rv));
153 0 7 if (d && strlen(d) > 0) {
0 0 if (d && strlen(d) > 0) {
156 0 0 if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(d) failed: %s", error_to_string(rv));
158 0 0 if (rv != CRYPT_OK) croak("FATAL: rsa_set_key failed: %s", error_to_string(rv));
163 0 7 if (rv != CRYPT_OK) croak("FATAL: rsa_set_key failed: %s", error_to_string(rv));
166 0 7 if (p && strlen(p) > 0 && q && strlen(q) > 0) {
0 0 if (p && strlen(p) > 0 && q && strlen(q) > 0) {
0 0 if (p && strlen(p) > 0 && q && strlen(q) > 0) {
0 0 if (p && strlen(p) > 0 && q && strlen(q) > 0) {
169 0 0 if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(p) failed: %s", error_to_string(rv));
171 0 0 if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(q) failed: %s", error_to_string(rv));
173 0 0 if (rv != CRYPT_OK) croak("FATAL: rsa_set_factors failed: %s", error_to_string(rv));
176 0 7 if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) {
0 0 if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) {
0 0 if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) {
0 0 if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) {
0 0 if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) {
0 0 if (dP && strlen(dP) > 0 && dQ && strlen(dQ) > 0 && qP && strlen(qP) > 0) {
179 0 0 if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(dP) failed: %s", error_to_string(rv));
181 0 0 if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(dQ) failed: %s", error_to_string(rv));
183 0 0 if (rv != CRYPT_OK) croak("FATAL: radix_to_bin(qP) failed: %s", error_to_string(rv));
185 0 0 if (rv != CRYPT_OK) croak("FATAL: rsa_set_crt_params failed: %s", error_to_string(rv));
188 0 7 XPUSHs(ST(0)); /* return self */
194 88 0 if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF;
0 88 if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF;
195 68 20 RETVAL = (self->key.type == PK_PRIVATE) ? 1 : 0;
202 1 0 if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF;
0 1 if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF;
215 133 0 if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF;
0 133 if (self->key.type == -1 || self->key.N == NULL) XSRETURN_UNDEF;
219 133 0 siz = (self->key.e) ? mp_ubin_size(self->key.e) : 0;
220 0 133 if (siz>10000) {
223 133 0 if (siz>0) {
231 133 0 siz = (self->key.d) ? mp_ubin_size(self->key.d) : 0;
232 0 133 if (siz>10000) {
235 73 60 if (siz>0) {
243 133 0 siz = (self->key.N) ? nsize : 0;
244 0 133 if (siz>10000) {
247 133 0 if (siz>0) {
255 133 0 siz = (self->key.q) ? mp_ubin_size(self->key.q) : 0;
256 0 133 if (siz>10000) {
259 73 60 if (siz>0) {
267 133 0 siz = (self->key.p) ? mp_ubin_size(self->key.p) : 0;
268 0 133 if (siz>10000) {
271 73 60 if (siz>0) {
279 133 0 siz = (self->key.qP) ? mp_ubin_size(self->key.qP) : 0;
280 0 133 if (siz>10000) {
283 73 60 if (siz>0) {
291 133 0 siz = (self->key.dP) ? mp_ubin_size(self->key.dP) : 0;
292 0 133 if (siz>10000) {
295 73 60 if (siz>0) {
303 133 0 siz = (self->key.dQ) ? mp_ubin_size(self->key.dQ) : 0;
304 0 133 if (siz>10000) {
307 73 60 if (siz>0) {
332 2 3 if (strnEQ(type, "private", 7)) {
334 0 2 if (rv != CRYPT_OK) croak("FATAL: rsa_export(PK_PRIVATE) failed: %s", error_to_string(rv));
337 3 0 else if (strnEQ(type, "public", 6)) {
339 0 3 if (rv != CRYPT_OK) croak("FATAL: rsa_export(PK_PUBLIC|PK_STD) failed: %s", error_to_string(rv));
364 1 1 if (strnEQ(padding, "oaep", 4)) {
366 0 1 if (mgf_hash_id == -1) croak("FATAL: find_hash failed for '%s'", mgf_hash);
367 0 1 if (lparam_hash) {
369 0 0 if (lparam_hash_id == -1) croak("FATAL: find_hash failed for '%s'", lparam_hash);
374 0 1 if (oaep_lparam) lparam_ptr = (unsigned char *)SvPVbyte(oaep_lparam, lparam_len);
378 0 1 if (rv != CRYPT_OK) croak("FATAL: rsa_encrypt_key_ex failed: %s", error_to_string(rv));
381 0 1 else if (strnEQ(padding, "v1.5", 4)) {
385 0 0 if (rv != CRYPT_OK) croak("FATAL: rsa_encrypt_key_ex failed: %s", error_to_string(rv));
388 1 0 else if (strnEQ(padding, "none", 4)) {
391 0 1 if (rv != CRYPT_OK) croak("FATAL: rsa_me failed: %s", error_to_string(rv));
416 1 37 if (strnEQ(padding, "oaep", 4)) {
418 0 1 if (mgf_hash_id == -1) croak("FATAL: find_hash failed for '%s'", mgf_hash);
419 0 1 if (lparam_hash) {
421 0 0 if (lparam_hash_id == -1) croak("FATAL: find_hash failed for '%s'", lparam_hash);
426 0 1 if (oaep_lparam) lparam_ptr = (unsigned char *)SvPVbyte(oaep_lparam, lparam_len);
429 0 1 if (rv != CRYPT_OK) croak("FATAL: rsa_decrypt_key_ex failed: %s", error_to_string(rv));
430 0 1 if (stat != 1) croak("FATAL: rsa_decrypt - not valid OAEP packet");
433 36 1 else if (strnEQ(padding, "v1.5", 4)) {
436 0 36 if (rv != CRYPT_OK) croak("FATAL: rsa_decrypt_key_ex failed: %s", error_to_string(rv));
437 0 36 if (stat != 1) croak("FATAL: rsa_decrypt - invalid");
440 1 0 else if (strnEQ(padding, "none", 4)) {
443 0 1 if (rv != CRYPT_OK) croak("FATAL: rsa_me failed: %s", error_to_string(rv));
465 2 2 if (ix == 1) {
467 0 2 if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name);
469 0 2 if (rv != CRYPT_OK) croak("FATAL: hash_memory failed: %s", error_to_string(rv));
473 4 0 if (strnEQ(padding, "pss", 3)) {
475 0 4 if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name);
479 0 4 if (rv != CRYPT_OK) croak("FATAL: rsa_sign_hash_ex failed: %s", error_to_string(rv));
482 0 0 else if (strnEQ(padding, "v1.5", 4)) {
484 0 0 if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name);
488 0 0 if (rv != CRYPT_OK) croak("FATAL: rsa_sign_hash_ex failed: %s", error_to_string(rv));
491 0 0 else if (strnEQ(padding, "none", 4)) {
494 0 0 if (rv != CRYPT_OK) croak("FATAL: rsa_me failed: %s", error_to_string(rv));
517 107 2 if (ix == 1) {
519 0 107 if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name);
521 0 107 if (rv != CRYPT_OK) croak("FATAL: hash_memory failed: %s", error_to_string(rv));
527 4 105 if (strnEQ(padding, "pss", 3)) {
529 0 4 if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name);
532 4 0 if (rv != CRYPT_OK || stat != 1) RETVAL = 0;
0 4 if (rv != CRYPT_OK || stat != 1) RETVAL = 0;
534 105 0 else if (strnEQ(padding, "v1.5", 4)) {
536 0 105 if (hash_id == -1) croak("FATAL: find_hash failed for '%s'", hash_name);
539 103 2 if (rv != CRYPT_OK || stat != 1) RETVAL = 0;
0 103 if (rv != CRYPT_OK || stat != 1) RETVAL = 0;
541 0 0 else if (strnEQ(padding, "none", 4)) {
545 0 0 if (rv != CRYPT_OK) croak("FATAL: rsa_me failed: %s", error_to_string(rv));
546 0 0 if (data_len <= buffer_len && buffer_len > 0 && data_len > 0) {
0 0 if (data_len <= buffer_len && buffer_len > 0 && data_len > 0) {
0 0 if (data_len <= buffer_len && buffer_len > 0 && data_len > 0) {
547 0 0 for (i = 0; i < buffer_len - data_len; i++) if (buffer[i] != 0) RETVAL = 0;
0 0 for (i = 0; i < buffer_len - data_len; i++) if (buffer[i] != 0) RETVAL = 0;
548 0 0 if (memNE(data_ptr, buffer + buffer_len - data_len, data_len)) RETVAL = 0;
564 107 0 if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; }