Branch Coverage

inc/CryptX_PK_Ed448.xs.inc
Criterion Covered Total %
branch 12 110 10.9


line true false branch
11 0 1 if (!RETVAL) croak("FATAL: Newz failed");
15 0 1 if (RETVAL->pindex == -1) {
21 0 1 if (rv != CRYPT_OK) {
38 0 1 if (rv != CRYPT_OK) croak("FATAL: ed448_make_key failed: %s", error_to_string(rv));
40 0 1 XPUSHs(ST(0)); /* return self */
54 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448_import failed: %s", error_to_string(rv));
56 0 0 XPUSHs(ST(0)); /* return self */
70 0 0 if (SvOK(passwd)) {
76 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448_import_pkcs8 failed: %s", error_to_string(rv));
78 0 0 XPUSHs(ST(0)); /* return self */
93 0 0 if (SvOK(passwd)) {
99 0 0 if (rv != CRYPT_OK) croak("FATAL: pem_decode_pkcs failed: %s", error_to_string(rv));
100 0 0 if (key_from_pem.id != LTC_PKA_ED448) croak("FATAL: pem_decode_pkcs decoded non-Ed448 key");
103 0 0 XPUSHs(ST(0)); /* return self */
117 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448_import_x509 failed: %s", error_to_string(rv));
119 0 0 XPUSHs(ST(0)); /* return self */
130 0 0 if (SvOK(key)) {
134 0 0 if (which == 0) {
137 0 0 else if (which == 1) {
143 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448_import_raw failed: %s", error_to_string(rv));
145 0 0 XPUSHs(ST(0)); /* return self */
151 0 0 if (self->initialized == 0) XSRETURN_UNDEF;
152 0 0 RETVAL = (self->key.type == PK_PRIVATE) ? 1 : 0;
165 0 1 if (self->initialized == 0) XSRETURN_UNDEF;
168 1 0 if (self->key.type == PK_PRIVATE) {
171 0 1 if (rv != CRYPT_OK) croak("FATAL: base16_encode failed: %s", error_to_string(rv));
180 0 1 if (rv != CRYPT_OK) croak("FATAL: base16_encode failed: %s", error_to_string(rv));
198 0 0 if (strEQ(type, "private")) {
200 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448_export(PK_PRIVATE|PK_STD) failed: %s", error_to_string(rv));
203 0 0 else if (strEQ(type, "public")) {
205 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448_export(PK_PUBLIC|PK_STD) failed: %s", error_to_string(rv));
225 0 0 if (strEQ(type, "private")) {
227 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448_export(PK_PRIVATE) failed: %s", error_to_string(rv));
230 0 0 else if (strEQ(type, "public")) {
232 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448_export(PK_PUBLIC) failed: %s", error_to_string(rv));
254 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448_sign failed: %s", error_to_string(rv));
274 0 0 if (rv == CRYPT_OK && stat == 1) RETVAL = 1;
0 0 if (rv == CRYPT_OK && stat == 1) RETVAL = 1;
290 0 0 if (ctx_len > 255) croak("FATAL: context must be at most 255 bytes");
293 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448ctx_sign failed: %s", error_to_string(rv));
311 0 0 if (ctx_len > 255) croak("FATAL: context must be at most 255 bytes");
316 0 0 if (rv == CRYPT_OK && stat == 1) RETVAL = 1;
0 0 if (rv == CRYPT_OK && stat == 1) RETVAL = 1;
331 0 0 if (items > 2 && SvOK(ST(2))) {
0 0 if (items > 2 && SvOK(ST(2))) {
333 0 0 if (ctx_len > 255) croak("FATAL: context must be at most 255 bytes");
337 0 0 if (rv != CRYPT_OK) croak("FATAL: ed448ph_sign failed: %s", error_to_string(rv));
354 0 0 if (items > 3 && SvOK(ST(3))) {
0 0 if (items > 3 && SvOK(ST(3))) {
356 0 0 if (ctx_len > 255) croak("FATAL: context must be at most 255 bytes");
362 0 0 if (rv == CRYPT_OK && stat == 1) RETVAL = 1;
0 0 if (rv == CRYPT_OK && stat == 1) RETVAL = 1;
370 1 0 if (self->pindex >= 0 && prng_is_valid(self->pindex) == CRYPT_OK && prng_descriptor[self->pindex].done) {
1 0 if (self->pindex >= 0 && prng_is_valid(self->pindex) == CRYPT_OK && prng_descriptor[self->pindex].done) {
1 0 if (self->pindex >= 0 && prng_is_valid(self->pindex) == CRYPT_OK && prng_descriptor[self->pindex].done) {