| line |
true |
false |
branch |
|
79
|
0 |
0 |
if (crl == NULL) |
|
84
|
0 |
0 |
if (g_CRL == NULL) |
|
92
|
0 |
0 |
if (g_CRL == crl) |
|
96
|
0 |
0 |
while (next->next) |
|
99
|
0 |
0 |
if (next == crl) /* no pointer dups */ |
|
134
|
0 |
0 |
if (g_CRL == NULL || crl == NULL) |
|
|
0 |
0 |
if (g_CRL == NULL || crl == NULL) |
|
141
|
0 |
0 |
while (curr) |
|
143
|
0 |
0 |
if (curr == crl) |
|
145
|
0 |
0 |
if (delete) |
|
153
|
0 |
0 |
if (prev == NULL && next == NULL) |
|
|
0 |
0 |
if (prev == NULL && next == NULL) |
|
158
|
0 |
0 |
else if (prev == NULL && next != NULL) |
|
|
0 |
0 |
else if (prev == NULL && next != NULL) |
|
163
|
0 |
0 |
else if (prev != NULL) |
|
172
|
0 |
0 |
if (curr) |
|
227
|
0 |
0 |
while (next) |
|
249
|
0 |
14 |
while (curr) |
|
255
|
0 |
14 |
psAssert(g_CRL == NULL); |
|
265
|
0 |
0 |
if (memcmpct(existing->issuer.hash, new->issuer.hash, SHA1_HASH_SIZE) != 0) |
|
298
|
0 |
0 |
if (crl == NULL) |
|
308
|
0 |
0 |
while (curr) |
|
311
|
0 |
0 |
if (internalCRLmatch(curr, crl) == PS_TRUE) |
|
315
|
0 |
0 |
if (curr == crl) |
|
339
|
0 |
0 |
if (memcmpct(CRL->issuer.hash, cert->issuer.hash, SHA1_HASH_SIZE) != 0) |
|
377
|
0 |
0 |
if (err != PS_SUCCESS) |
|
382
|
0 |
0 |
err = psBrokenDownTimeImport( |
|
386
|
0 |
0 |
if (err != PS_SUCCESS) |
|
393
|
0 |
0 |
if (err != PS_SUCCESS) |
|
398
|
0 |
0 |
if (psBrokenDownTimeCmp(&timeNow, &nextTimeLinger) > 0) |
|
410
|
0 |
1150 |
if (cert == NULL) |
|
415
|
0 |
1150 |
while (curr) |
|
417
|
0 |
0 |
if (internalMatchSubject(cert, curr) == PS_TRUE) |
|
422
|
0 |
0 |
if (nextUpdateTest(curr->nextUpdate, curr->nextUpdateType) < 0) |
|
467
|
0 |
0 |
if (cert == NULL) |
|
472
|
0 |
0 |
if (CRL) |
|
478
|
0 |
0 |
if ((crl = internalGetCrlForCert(cert)) == NULL) |
|
483
|
0 |
0 |
if (crl->revoked == NULL) |
|
488
|
0 |
0 |
for (entry = crl->revoked; entry != NULL; entry = entry->next) |
|
490
|
0 |
0 |
if (cert->serialNumberLen == entry->serialLen) |
|
492
|
0 |
0 |
if (memcmpct(cert->serialNumber, entry->serial, entry->serialLen) |
|
495
|
0 |
0 |
if (bdt) |
|
537
|
2 |
1148 |
if (cert->extensions.crlDist) |
|
558
|
0 |
1150 |
if (cert == NULL) |
|
568
|
0 |
1150 |
if (crl) |
|
571
|
0 |
0 |
if (crl->expired) |
|
586
|
0 |
0 |
if (crl->authenticated == 0 && cert->next) |
|
|
0 |
0 |
if (crl->authenticated == 0 && cert->next) |
|
593
|
0 |
0 |
if (revoked == 0 && crl->authenticated == 1) |
|
|
0 |
0 |
if (revoked == 0 && crl->authenticated == 1) |
|
598
|
0 |
0 |
else if (revoked == 0 && crl->authenticated == 0) |
|
|
0 |
0 |
else if (revoked == 0 && crl->authenticated == 0) |
|
603
|
0 |
0 |
else if (revoked == 1 && crl->authenticated == 1) |
|
|
0 |
0 |
else if (revoked == 1 && crl->authenticated == 1) |
|
608
|
0 |
0 |
else if (revoked == 1 && crl->authenticated == 0) |
|
|
0 |
0 |
else if (revoked == 1 && crl->authenticated == 0) |
|
621
|
2 |
1148 |
if (expectCrl) |
|
649
|
0 |
0 |
while (curr) |
|
663
|
0 |
0 |
if (crl == NULL) |
|
683
|
0 |
0 |
if (crl == NULL) |
|
688
|
0 |
0 |
if (psCRL_Delete(crl)) |
|
701
|
0 |
0 |
if ( !(CA->extensions.keyUsageFlags & KEY_USAGE_CRL_SIGN)) |
|
723
|
0 |
0 |
if (memcmpct(CRL->issuer.hash, CA->subject.hash, SHA1_HASH_SIZE) != 0) |
|
773
|
0 |
0 |
if (CA == NULL || CRL == NULL) |
|
|
0 |
0 |
if (CA == NULL || CRL == NULL) |
|
785
|
0 |
0 |
if ((rc = internalMatchIssuer(CA, CRL)) < 0) |
|
799
|
0 |
0 |
if (rc != PS_SUCCESS) |
|
801
|
0 |
0 |
if (verifyResult == PS_FALSE) |
|
813
|
0 |
0 |
if (verifyResult == PS_TRUE) |
|
827
|
0 |
0 |
if (crlBin == NULL || crlBinLen <= 0) |
|
|
0 |
0 |
if (crlBin == NULL || crlBinLen <= 0) |
|
832
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &glen, 0) < 0) |
|
837
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &tbsCertLen, 0) < 0) |
|
842
|
0 |
0 |
if (end > p && *p == ASN_INTEGER) |
|
|
0 |
0 |
if (end > p && *p == ASN_INTEGER) |
|
845
|
0 |
0 |
if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) |
|
|
0 |
0 |
if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) |
|
869
|
0 |
0 |
if (crlBin == NULL || crlBinLen <= 0) |
|
|
0 |
0 |
if (crlBin == NULL || crlBinLen <= 0) |
|
897
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &glen, 0) < 0) |
|
906
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &tbsCertLen, 0) < 0) |
|
912
|
0 |
0 |
if (end > p && *p == ASN_INTEGER) |
|
|
0 |
0 |
if (end > p && *p == ASN_INTEGER) |
|
915
|
0 |
0 |
if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) |
|
|
0 |
0 |
if (getAsnInteger(&p, (uint32) (end - p), &version) < 0 || version < 0) |
|
920
|
0 |
0 |
if (version != 1) |
|
929
|
0 |
0 |
if ((lcrl = psMalloc(pool, sizeof(psX509Crl_t))) == NULL) |
|
937
|
0 |
0 |
if (getAsnAlgorithmIdentifier(&p, (int32) (end - p), &lcrl->sigAlg, &plen) |
|
956
|
0 |
0 |
if ((rc = psX509GetDNAttributes(pool, &p, (uint32) (end - p), |
|
965
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && (*p != ASN_GENERALIZEDTIME))) |
|
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && (*p != ASN_GENERALIZEDTIME))) |
|
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && (*p != ASN_GENERALIZEDTIME))) |
|
973
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
|
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
|
980
|
0 |
0 |
if (psBrokenDownTimeImport( |
|
|
0 |
0 |
if (psBrokenDownTimeImport( |
|
993
|
0 |
0 |
if ((end - p) < 1 || ((*p == ASN_UTCTIME) || (*p == ASN_GENERALIZEDTIME))) |
|
|
0 |
0 |
if ((end - p) < 1 || ((*p == ASN_UTCTIME) || (*p == ASN_GENERALIZEDTIME))) |
|
|
0 |
0 |
if ((end - p) < 1 || ((*p == ASN_UTCTIME) || (*p == ASN_GENERALIZEDTIME))) |
|
997
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
|
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
|
1004
|
0 |
0 |
if ((lcrl->nextUpdate = psMalloc(pool, timelen + 1)) == NULL) |
|
1012
|
0 |
0 |
if (psBrokenDownTimeImport( |
|
|
0 |
0 |
if (psBrokenDownTimeImport( |
|
1032
|
0 |
0 |
if ((p - start) != tbsCertLen) |
|
1045
|
0 |
0 |
if (*p != (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | 0)) |
|
1048
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &glen, 0) < 0) |
|
1056
|
0 |
0 |
if (curr == NULL) |
|
1062
|
0 |
0 |
while (glen > 0) |
|
1065
|
0 |
0 |
if (getAsnSequence32(&p, (uint32) (end - p), &ilen, 0) < 0) |
|
1072
|
0 |
0 |
if ((rc = getSerialNum(pool, &p, ilen, &curr->serial, |
|
1081
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && |
|
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && |
|
|
0 |
0 |
if ((end - p) < 1 || ((*p != ASN_UTCTIME) && |
|
1090
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
|
|
0 |
0 |
if (getAsnLength(&p, (uint32) (end - p), &timelen) < 0 || |
|
1097
|
0 |
0 |
if (psBrokenDownTimeImport( |
|
|
0 |
0 |
if (psBrokenDownTimeImport( |
|
1111
|
0 |
0 |
if (glen < (uint32) (p - revStart)) |
|
1120
|
0 |
0 |
if (glen > 0) |
|
1122
|
0 |
0 |
if ((next = psMalloc(pool, sizeof(x509revoked_t))) == NULL) |
|
1134
|
0 |
0 |
if (getExplicitExtensions(pool, &p, (uint32) (end - p), 0, |
|
1147
|
0 |
0 |
if (getAsnAlgorithmIdentifier(&p, (int32) (end - p), &oi, &plen) < 0) |
|
1154
|
0 |
0 |
if (oi != lcrl->sigAlg) |
|
1161
|
0 |
0 |
if ((rc = psX509GetSignature(pool, &p, (uint32) (end - p), &lcrl->sig, |
|
1173
|
0 |
0 |
if (rc != PS_SUCCESS) |
|
1193
|
0 |
0 |
if (cert == NULL) |
|
1200
|
0 |
0 |
if (cert->extensions.crlDist != NULL) |
|
1203
|
0 |
0 |
while (gn) |
|
1205
|
0 |
0 |
if (gn->id == 6) /* Only pass on URI types */ |