Branch Coverage

inc/CryptX_Cipher.xs.inc
Criterion Covered Total %
branch 69 144 47.9


line true false branch
22 0 3708 if (idx + 1 > items) croak("FATAL: missing argument");
24 3708 0 if (!SvPOK_spec(name_sv)) croak("FATAL: invalid cipher name");
3 3705 if (!SvPOK_spec(name_sv)) croak("FATAL: invalid cipher name");
3 0 if (!SvPOK_spec(name_sv)) croak("FATAL: invalid cipher name");
1 2 if (!SvPOK_spec(name_sv)) croak("FATAL: invalid cipher name");
0 1 if (!SvPOK_spec(name_sv)) croak("FATAL: invalid cipher name");
26 0 3706 if (idx + 2 > items) croak("FATAL: missing key argument");
28 1134 2572 if (idx + 3 <= items) rounds = (int)SvIV(ST(idx + 2));
30 3706 0 if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
1 3705 if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
1 0 if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
1 0 if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
0 1 if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
34 1 3705 if (id == -1) croak("FATAL: find_cipher failed for '%s'", cipher_name);
37 0 3705 if (!RETVAL) croak("FATAL: Newz failed");
41 0 3705 if (rv != CRYPT_OK) {
65 122717 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 122717 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
68 1 122716 if (len == 0) {
71 122716 0 else if (len == (STRLEN)self->desc->block_length) {
76 0 122716 if (rv!=CRYPT_OK) {
96 693 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 693 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
99 1 692 if (len == 0) {
102 692 0 else if (len == (STRLEN)self->desc->block_length) {
107 0 692 if (rv!=CRYPT_OK) {
123 28 205 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
28 0 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
130 205 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 205 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
138 67 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
132 0 205 if (id == -1) croak("FATAL: find_cipher failed for '%s'", name);
134 0 205 if (!rv) croak("FATAL: invalid block_length for '%s'", name);
145 54 281 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
54 0 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
152 281 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 281 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
227 54 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
154 0 281 if (id == -1) croak("FATAL: find_cipher failed for '%s'", name);
156 0 281 if (!rv) croak("FATAL: invalid max_key_length for '%s'", name);
167 27 138 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
27 0 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
174 138 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 138 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
111 27 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
176 0 138 if (id == -1) croak("FATAL: find_cipher failed for '%s'", name);
178 0 138 if (!rv) croak("FATAL: invalid min_key_length for '%s'", name);
189 27 135 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
27 0 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
196 135 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 135 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
108 27 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
198 0 135 if (id == -1) croak("FATAL: find_cipher failed for '%s'", name);
200 0 135 if (!rv) XSRETURN_UNDEF;