| line |
true |
false |
branch |
|
12
|
0 |
102 |
if (!RETVAL) croak("FATAL: Newz failed"); |
|
16
|
0 |
102 |
if (RETVAL->cipher_id == -1) { |
|
44
|
106 |
0 |
if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar"); |
|
|
0 |
106 |
if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar"); |
|
|
0 |
0 |
if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar"); |
|
|
0 |
0 |
if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar"); |
|
|
0 |
0 |
if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar"); |
|
47
|
106 |
0 |
if (!SvPOK_spec(iv)) croak("FATAL: iv must be string/buffer scalar"); |
|
|
0 |
106 |
if (!SvPOK_spec(iv)) croak("FATAL: iv must be string/buffer scalar"); |
|
|
0 |
0 |
if (!SvPOK_spec(iv)) croak("FATAL: iv must be string/buffer scalar"); |
|
|
0 |
0 |
if (!SvPOK_spec(iv)) croak("FATAL: iv must be string/buffer scalar"); |
|
|
0 |
0 |
if (!SvPOK_spec(iv)) croak("FATAL: iv must be string/buffer scalar"); |
|
49
|
0 |
106 |
if (i_len != (STRLEN)cipher_descriptor[self->cipher_id].block_length) { |
|
54
|
0 |
106 |
if (rv != CRYPT_OK) { |
|
58
|
53 |
53 |
self->direction = ix == 1 ? 1 : -1; |
|
59
|
0 |
106 |
XPUSHs(ST(0)); /* return self */ |
|
71
|
107 |
106 |
for (j = 1; j < items; j++) { |
|
73
|
105 |
2 |
if (in_data_len > 0) { |
|
74
|
105 |
0 |
out_data = (unsigned char*)SvGROW(RETVAL, out_len + in_data_len + 1) + out_len; |
|
|
102 |
3 |
out_data = (unsigned char*)SvGROW(RETVAL, out_len + in_data_len + 1) + out_len; |
|
76
|
52 |
53 |
if (self->direction == 1) { |
|
78
|
0 |
52 |
if (rv != CRYPT_OK) { |
|
83
|
52 |
1 |
else if (self->direction == -1) { |
|
85
|
0 |
52 |
if (rv != CRYPT_OK) { |
|
96
|
104 |
2 |
if (out_len > 0) SvCUR_set(RETVAL, out_len); |