File Coverage

inc/CryptX_Mode_CTR.xs.inc
Criterion Covered Total %
statement 44 52 84.6
branch 35 62 56.4
condition n/a
subroutine n/a
pod n/a
total 79 114 69.3


line stmt bran cond sub pod time code
1             MODULE = CryptX PACKAGE = Crypt::Mode::CTR
2              
3             PROTOTYPES: DISABLE
4              
5             ### BEWARE - GENERATED FILE, DO NOT EDIT MANUALLY!
6              
7             Crypt::Mode::CTR
8             new(Class, char * cipher_name, int ctr_mode=0, int ctr_width=0, int rounds=0)
9             CODE:
10             {
11 45           Newz(0, RETVAL, 1, struct ctr_struct);
12 45 50         if (!RETVAL) croak("FATAL: Newz failed");
13 45           RETVAL->direction = 0;
14 45           RETVAL->cipher_rounds = rounds;
15 45           RETVAL->cipher_id = cryptx_internal_find_cipher(cipher_name);
16 45 50         if (RETVAL->cipher_id == -1) {
17 0           Safefree(RETVAL);
18 0           croak("FATAL: find_cipher failed for '%s'", cipher_name);
19             }
20 45 100         if (ctr_mode == 0) RETVAL->ctr_mode_param = CTR_COUNTER_LITTLE_ENDIAN;
21 45 100         if (ctr_mode == 1) RETVAL->ctr_mode_param = CTR_COUNTER_BIG_ENDIAN;
22 45 100         if (ctr_mode == 2) RETVAL->ctr_mode_param = CTR_COUNTER_LITTLE_ENDIAN|LTC_CTR_RFC3686;
23 45 100         if (ctr_mode == 3) RETVAL->ctr_mode_param = CTR_COUNTER_BIG_ENDIAN|LTC_CTR_RFC3686;
24 45 50         if (ctr_width > 0 && ctr_width <= cipher_descriptor[RETVAL->cipher_id].block_length) RETVAL->ctr_mode_param |= ctr_width;
    0          
25             }
26             OUTPUT:
27             RETVAL
28              
29             void
30             DESTROY(Crypt::Mode::CTR self)
31             CODE:
32             {
33 45           zeromem(&self->state, sizeof(symmetric_CTR));
34 45           Safefree(self);
35             }
36              
37             void
38             start_decrypt(Crypt::Mode::CTR self, SV * key, SV * iv)
39             ALIAS:
40             start_encrypt = 1
41             PPCODE:
42             {
43 44           STRLEN k_len=0;
44 44           unsigned char *k=NULL;
45 44           STRLEN i_len=0;
46 44           unsigned char *i=NULL;
47             int rv;
48              
49 44 50         if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
    50          
    0          
    0          
    0          
50 44           k = (unsigned char *) SvPVbyte(key, k_len);
51              
52 44 50         if (!SvPOK_spec(iv)) croak("FATAL: iv must be string/buffer scalar");
    50          
    0          
    0          
    0          
53 44           i = (unsigned char *) SvPVbyte(iv, i_len);
54 44 50         if (i_len != (STRLEN)cipher_descriptor[self->cipher_id].block_length) {
55 0           croak ("FATAL: sizeof(iv) should be equal to blocksize (%d)", cipher_descriptor[self->cipher_id].block_length);
56             }
57              
58 44           rv = ctr_start(self->cipher_id, i, k, (int)k_len, self->cipher_rounds, self->ctr_mode_param, &self->state);
59 44 50         if (rv != CRYPT_OK) {
60 0           croak("FATAL: ctr_start failed: %s", error_to_string(rv));
61             }
62              
63 44 100         self->direction = ix == 1 ? 1 : -1;
64 44 50         XPUSHs(ST(0)); /* return self */
65             }
66              
67             SV *
68             add(Crypt::Mode::CTR self, ...)
69             CODE:
70             {
71             int rv, j;
72 549           STRLEN in_data_len, out_len = 0;
73             unsigned char *in_data, *out_data;
74              
75 549           RETVAL = newSVpvn("", 0);
76 1601 100         for (j = 1; j < items; j++) {
77 1053           in_data = (unsigned char *)SvPVbyte(ST(j), in_data_len);
78 1053 100         if (in_data_len > 0) {
79 1051 50         out_data = (unsigned char*)SvGROW(RETVAL, out_len + in_data_len + 1) + out_len;
    100          
80 1051           out_len += in_data_len;
81 1051 100         if (self->direction == 1) {
82 525           rv = ctr_encrypt(in_data, out_data, (unsigned long)in_data_len, &self->state);
83 525 50         if (rv != CRYPT_OK) {
84 0           SvREFCNT_dec(RETVAL);
85 0           croak("FATAL: ctr_encrypt failed: %s", error_to_string(rv));
86             }
87             }
88 526 100         else if (self->direction == -1) {
89 525           rv = ctr_decrypt(in_data, out_data, (unsigned long)in_data_len, &self->state);
90 525 50         if (rv != CRYPT_OK) {
91 0           SvREFCNT_dec(RETVAL);
92 0           croak("FATAL: ctr_decrypt failed: %s", error_to_string(rv));
93             }
94             }
95             else {
96 1           SvREFCNT_dec(RETVAL);
97 1           croak("FATAL: ctr_crypt failed: call start_encrypt or start_decrypt first");
98             }
99             }
100             }
101 548 100         if (out_len > 0) SvCUR_set(RETVAL, out_len);
102             }
103             OUTPUT:
104             RETVAL
105              
106             SV *
107             finish(Crypt::Mode::CTR self)
108             CODE:
109 16           self->direction = 0;
110 16           RETVAL = newSVpvn("", 0);
111             OUTPUT:
112             RETVAL