| line |
true |
false |
branch |
|
34
|
0 |
3 |
if ($blob) |
|
38
|
0 |
0 |
unless $ktype eq $key->ssh_name |
|
57
|
0 |
1 |
unless open FH, $key_file |
|
64
|
0 |
1 |
unless $blob =~ /^$str/ |
|
77
|
0 |
1 |
if not $passphrase and $ciphername ne 'none' |
|
80
|
0 |
1 |
if $kdfname ne 'none' and $kdfname ne 'bcrypt' |
|
83
|
0 |
1 |
if $kdfname ne 'none' and $ciphername eq 'none' |
|
86
|
0 |
1 |
if $nkeys != 1 |
|
90
|
0 |
1 |
if ($ciphername eq 'none') { } |
|
93
|
1 |
0 |
if ($kdfname eq 'bcrypt') |
|
96
|
0 |
1 |
unless $cipher |
|
97
|
0 |
1 |
if length $encrypted < $cipher->blocksize or length($encrypted) % $cipher->blocksize |
|
105
|
0 |
1 |
if length $tag != $authlen |
|
111
|
0 |
1 |
if length $salt != 16 |
|
127
|
0 |
1 |
if $check1 != $check2 or not defined $check1 |
|
131
|
0 |
1 |
unless $type eq $class->ssh_name |
|
135
|
0 |
1 |
if length $pub_key != 32 or length $priv_key != 64 |
|
143
|
0 |
15 |
if ord $b->get_char != ++$padnum |
|
159
|
0 |
0 |
if ($passphrase) { } |
|
163
|
0 |
0 |
unless $cipher |
|
212
|
0 |
0 |
if (my $r = length($kb->bytes) % $blocksize) |
|
215
|
0 |
0 |
$cipher ? : |
|
216
|
0 |
0 |
if $authlen |
|
218
|
0 |
0 |
if $tag |
|
221
|
0 |
0 |
unless open FH, ">$key_file" |
|
247
|
0 |
1 |
unless $ktype eq $key->ssh_name |
|
249
|
0 |
1 |
unless length $sigblob == 64 |
|
257
|
0 |
0 |
if $keyA->{'pub'} and $keyB->{'pub'} |
|
291
|
0 |
1 |
if $rounds < 1 |
|
292
|
0 |
1 |
unless $pass and $salt |
|
314
|
1 |
1 |
$amt < $keylen ? : |
|
318
|
0 |
48 |
if $dest >= $origkeylen |