Branch Coverage

inc/CryptX_PK_Ed25519.xs.inc
Criterion Covered Total %
branch 0 90 0.0


line true false branch
11 0 0 if (!RETVAL) croak("FATAL: Newz failed");
14 0 0 if (RETVAL->pindex == -1) {
19 0 0 if (rv != CRYPT_OK) {
34 0 0 if (rv != CRYPT_OK) croak("FATAL: ed25519_make_key failed: %s", error_to_string(rv));
36 0 0 XPUSHs(ST(0)); /* return self */
47 0 0 data = (unsigned char *)SvPVbyte(key_data, data_len);
50 0 0 if (rv != CRYPT_OK) croak("FATAL: ed25519_import failed: %s", error_to_string(rv));
52 0 0 XPUSHs(ST(0)); /* return self */
63 0 0 data = (unsigned char *)SvPVbyte(key_data, data_len);
64 0 0 if (SvOK(passwd)) {
0 0 if (SvOK(passwd)) {
0 0 if (SvOK(passwd)) {
65 0 0 pwd = (unsigned char *)SvPVbyte(passwd, pwd_len);
69 0 0 if (rv != CRYPT_OK) croak("FATAL: ed25519_import_pkcs8 failed: %s", error_to_string(rv));
71 0 0 XPUSHs(ST(0)); /* return self */
82 0 0 data = (unsigned char *)SvPVbyte(key_data, data_len);
85 0 0 if (rv != CRYPT_OK) croak("FATAL: ed25519_import_x509 failed: %s", error_to_string(rv));
87 0 0 XPUSHs(ST(0)); /* return self */
98 0 0 if (SvOK(key)) {
0 0 if (SvOK(key)) {
0 0 if (SvOK(key)) {
99 0 0 key_data = (unsigned char *)SvPVbyte(key, key_len);
102 0 0 if (which == 0) {
105 0 0 else if (which == 1) {
111 0 0 if (rv != CRYPT_OK) croak("FATAL: ed25519_import_raw failed: %s", error_to_string(rv));
113 0 0 XPUSHs(ST(0)); /* return self */
119 0 0 if (self->initialized == 0) XSRETURN_UNDEF;
133 0 0 if (self->initialized == 0) XSRETURN_UNDEF;
136 0 0 if (self->key.type == PK_PRIVATE) {
139 0 0 if (rv != CRYPT_OK) croak("FATAL: base16_encode failed: %s", error_to_string(rv));
148 0 0 if (rv != CRYPT_OK) croak("FATAL: base16_encode failed: %s", error_to_string(rv));
166 0 0 if (strnEQ(type, "private", 7)) {
168 0 0 if (rv != CRYPT_OK) croak("FATAL: ed25519_export(PK_PRIVATE|PK_STD) failed: %s", error_to_string(rv));
171 0 0 else if (strnEQ(type, "public", 6)) {
173 0 0 if (rv != CRYPT_OK) croak("FATAL: ed25519_export(PK_PUBLIC|PK_STD) failed: %s", error_to_string(rv));
192 0 0 if (strnEQ(type, "private", 7)) {
194 0 0 if (rv != CRYPT_OK) croak("FATAL: ed25519_export(PK_PRIVATE) failed: %s", error_to_string(rv));
197 0 0 else if (strnEQ(type, "public", 6)) {
199 0 0 if (rv != CRYPT_OK) croak("FATAL: ed25519_export(PK_PUBLIC) failed: %s", error_to_string(rv));
218 0 0 data_ptr = (unsigned char *)SvPVbyte(data, data_len);
220 0 0 if (rv != CRYPT_OK) croak("FATAL: ed25519_sign failed: %s", error_to_string(rv));
234 0 0 data_ptr = (unsigned char *)SvPVbyte(data, data_len);
235 0 0 sig_ptr = (unsigned char *)SvPVbyte(sig, sig_len);
239 0 0 if (rv == CRYPT_OK && stat == 1) RETVAL = 1;
0 0 if (rv == CRYPT_OK && stat == 1) RETVAL = 1;