| line |
true |
false |
branch |
|
106
|
0 |
17 |
if (*g_config == 'Y') |
|
113
|
0 |
17 |
if (strncmp(g_config, config, clen) != 0) |
|
120
|
0 |
17 |
if (psCryptoOpen(config + clen) < 0) |
|
181
|
448 |
14 |
for (i = 0; i < SSL_SESSION_TABLE_SIZE; i++) |
|
223
|
0 |
100808 |
if (lkeys == NULL) |
|
233
|
0 |
100808 |
if (rc < 0) |
|
248
|
1148 |
4592 |
if (id == 19) |
|
250
|
0 |
1148 |
if (!(ecFlags & IS_SECP192R1)) |
|
255
|
1148 |
3444 |
else if (id == 21) |
|
257
|
0 |
1148 |
if (!(ecFlags & IS_SECP224R1)) |
|
262
|
1148 |
2296 |
else if (id == 23) |
|
264
|
0 |
1148 |
if (!(ecFlags & IS_SECP256R1)) |
|
269
|
1148 |
1148 |
else if (id == 24) |
|
271
|
0 |
1148 |
if (!(ecFlags & IS_SECP384R1)) |
|
276
|
1148 |
0 |
else if (id == 25) |
|
278
|
0 |
1148 |
if (!(ecFlags & IS_SECP521R1)) |
|
283
|
0 |
0 |
else if (id == 255) |
|
285
|
0 |
0 |
if (!(ecFlags & IS_BRAIN224R1)) |
|
290
|
0 |
0 |
else if (id == 26) |
|
292
|
0 |
0 |
if (!(ecFlags & IS_BRAIN256R1)) |
|
297
|
0 |
0 |
else if (id == 27) |
|
299
|
0 |
0 |
if (!(ecFlags & IS_BRAIN384R1)) |
|
304
|
0 |
0 |
else if (id == 28) |
|
306
|
0 |
0 |
if (!(ecFlags & IS_BRAIN512R1)) |
|
320
|
1148 |
4592 |
if (id == 19) |
|
324
|
1148 |
3444 |
else if (id == 21) |
|
328
|
1148 |
2296 |
else if (id == 23) |
|
332
|
1148 |
1148 |
else if (id == 24) |
|
336
|
1148 |
0 |
else if (id == 25) |
|
340
|
0 |
0 |
else if (id == 255) |
|
344
|
0 |
0 |
else if (id == 26) |
|
348
|
0 |
0 |
else if (id == 27) |
|
352
|
0 |
0 |
else if (id == 28) |
|
368
|
0 |
0 |
if (keys->privKey.type == PS_ECC) |
|
371
|
0 |
0 |
if (psTestUserEcID(eccKey->curve->curveId, ecFlags) < 0) |
|
379
|
0 |
0 |
while (cert) |
|
381
|
0 |
0 |
if (cert->publicKey.type == PS_ECC) |
|
384
|
0 |
0 |
if (psTestUserEcID(eccKey->curve->curveId, ecFlags) < 0) |
|
396
|
0 |
0 |
while (cert) |
|
398
|
0 |
0 |
if (cert->publicKey.type == PS_ECC) |
|
401
|
0 |
0 |
if (psTestUserEcID(eccKey->curve->curveId, ecFlags) < 0) |
|
426
|
11 |
10 |
while (currCert) |
|
429
|
1 |
10 |
while (nextCert && memcmp(currCert->issuer.hash, nextCert->subject.hash, |
|
|
0 |
1 |
while (nextCert && memcmp(currCert->issuer.hash, nextCert->subject.hash, |
|
435
|
0 |
0 |
if (nextCert && memcmp(currCert->issuer.hash, |
|
|
0 |
0 |
if (nextCert && memcmp(currCert->issuer.hash, |
|
461
|
0 |
15 |
if (keys == NULL) |
|
468
|
11 |
4 |
if (macPass == NULL) |
|
478
|
5 |
10 |
if ((rc = psPkcs12Parse(pool, &keys->cert, &keys->privKey, certFile, flags, |
|
481
|
0 |
5 |
if (keys->cert) |
|
493
|
1 |
9 |
if (verifyReadKeys(pool, keys, keys->poolUserPtr) < PS_SUCCESS) |
|
543
|
0 |
0 |
if (opts) |
|
546
|
0 |
0 |
if (privBuf == NULL) |
|
549
|
0 |
0 |
if (privBuf != NULL && keytype == 0) |
|
|
0 |
0 |
if (privBuf != NULL && keytype == 0) |
|
558
|
0 |
0 |
if (keytype < 0) |
|
588
|
0 |
0 |
if (opts) |
|
591
|
0 |
0 |
if (privFile == NULL) |
|
594
|
0 |
0 |
if (keytype == 0) |
|
602
|
0 |
0 |
if (keytype < 0) |
|
632
|
0 |
667 |
if (keys == NULL) |
|
651
|
136 |
531 |
if (certFile) |
|
654
|
0 |
136 |
if (keys->cert != NULL) |
|
658
|
1 |
135 |
if ((err = psX509ParseCertFile(pool, (char *) certFile, |
|
664
|
0 |
135 |
if (keys->cert->authFailFlags) |
|
666
|
0 |
0 |
psAssert(keys->cert->authFailFlags == PS_CERT_AUTH_FAIL_DATE_FLAG); |
|
682
|
134 |
532 |
if (privFile) |
|
686
|
0 |
134 |
if (keys->privKey.keysize > 0) |
|
688
|
0 |
0 |
if (keys->cert) |
|
696
|
134 |
0 |
if (privKeyType == PS_RSA) |
|
699
|
5 |
129 |
if ((err = psPkcs1ParsePrivFile(pool, (char *) privFile, |
|
702
|
5 |
0 |
if (keys->cert) |
|
713
|
0 |
129 |
if (privKeyType == PS_ECC) |
|
716
|
0 |
0 |
if ((err = psEccParsePrivFile(pool, (char *) privFile, |
|
719
|
0 |
0 |
if (keys->cert) |
|
736
|
1 |
660 |
if (verifyReadKeys(pool, keys, keys->poolUserPtr) < PS_SUCCESS) |
|
749
|
641 |
19 |
if (CAfile) |
|
752
|
0 |
641 |
if (keys->CAcerts != NULL) |
|
760
|
640 |
1 |
if (err >= 0) |
|
774
|
0 |
640 |
if (keys->CAcerts->authFailFlags) |
|
777
|
0 |
0 |
psAssert(keys->CAcerts->authFailFlags == |
|
791
|
1 |
640 |
if (err < 0) |
|
794
|
0 |
1 |
if (keys->cert) |
|
856
|
2203 |
0 |
psAssert(keys && curve); |
|
|
2203 |
0 |
psAssert(keys && curve); |
|
860
|
27 |
2176 |
if (keys->cache.eccPrivKey.curve != curve) |
|
866
|
2 |
2174 |
if (keys->cache.eccPrivKeyUse > ECC_EPHEMERAL_CACHE_USAGE) |
|
872
|
0 |
2174 |
if (psDiffMsecs(keys->cache.eccPrivKeyTime, t, keys->poolUserPtr) > |
|
881
|
2174 |
0 |
if (ecc) |
|
888
|
2 |
27 |
if (keys->cache.eccPrivKeyUse) |
|
895
|
0 |
29 |
if (rc < 0) |
|
903
|
29 |
0 |
if (ecc) |
|
933
|
1 |
113 |
if (certBuf == NULL && privBuf == NULL && CAbuf == NULL) |
|
|
1 |
0 |
if (certBuf == NULL && privBuf == NULL && CAbuf == NULL) |
|
|
0 |
1 |
if (certBuf == NULL && privBuf == NULL && CAbuf == NULL) |
|
938
|
0 |
114 |
if (keys == NULL) |
|
956
|
113 |
1 |
if (certBuf) |
|
959
|
0 |
113 |
if (keys->cert != NULL) |
|
964
|
1 |
112 |
if ((err = psX509ParseCert(pool, (unsigned char *) certBuf, |
|
976
|
112 |
1 |
if (privBuf) |
|
980
|
112 |
0 |
if (privKeyType == PS_RSA) |
|
983
|
0 |
112 |
if ((err = psRsaParsePkcs1PrivKey(pool, privBuf, |
|
988
|
0 |
0 |
if ((err = psPkcs8ParsePrivBin(pool, (unsigned char *) privBuf, |
|
1003
|
0 |
112 |
if (privKeyType == PS_ECC) |
|
1006
|
0 |
0 |
if ((err = psEccParsePrivKey(pool, (unsigned char *) privBuf, |
|
1011
|
0 |
0 |
if ((err = psPkcs8ParsePrivBin(pool, (unsigned char *) privBuf, |
|
1031
|
0 |
113 |
if (verifyReadKeys(pool, keys, keys->poolUserPtr) < PS_SUCCESS) |
|
1045
|
112 |
1 |
if (CAbuf) |
|
1048
|
0 |
112 |
if (keys->CAcerts != NULL) |
|
1082
|
0 |
113 |
if (err < 0) |
|
1103
|
3 |
0 |
if (keys == NULL || OCSPResponseBuf == NULL || OCSPResponseBufLen == 0) |
|
|
3 |
0 |
if (keys == NULL || OCSPResponseBuf == NULL || OCSPResponseBufLen == 0) |
|
|
0 |
3 |
if (keys == NULL || OCSPResponseBuf == NULL || OCSPResponseBufLen == 0) |
|
1111
|
1 |
2 |
if (keys->OCSPResponseBuf != NULL) |
|
1118
|
0 |
3 |
if ((keys->OCSPResponseBuf = psMalloc(pool, OCSPResponseBufLen)) == NULL) |
|
1135
|
5 |
0 |
if (keys == NULL || SCTResponseBuf == NULL || SCTResponseBufLen == 0) { |
|
|
5 |
0 |
if (keys == NULL || SCTResponseBuf == NULL || SCTResponseBufLen == 0) { |
|
|
0 |
5 |
if (keys == NULL || SCTResponseBuf == NULL || SCTResponseBufLen == 0) { |
|
1141
|
3 |
2 |
if (keys->SCTResponseBuf != NULL) { |
|
1147
|
0 |
5 |
if ((keys->SCTResponseBuf = psMalloc(pool, SCTResponseBufLen)) == NULL) { |
|
1175
|
0 |
100808 |
if (keys == NULL) |
|
1181
|
250 |
100558 |
if (keys->cert) |
|
1190
|
752 |
100056 |
if (keys->CAcerts) |
|
1202
|
0 |
100808 |
if (keys->pskKeys) |
|
1205
|
0 |
0 |
while (psk) |
|
1217
|
1 |
100807 |
if (keys->sessTickets) |
|
1220
|
1 |
1 |
while (tick) |
|
1232
|
27 |
100781 |
if (keys->cache.eccPrivKeyUse > 0) |
|
1242
|
2 |
100806 |
if (keys->OCSPResponseBuf != NULL) |
|
1270
|
532 |
252 |
if (keys->cert == NULL && keys->privKey.type == 0) |
|
|
532 |
0 |
if (keys->cert == NULL && keys->privKey.type == 0) |
|
1280
|
252 |
0 |
if (keys->cert != NULL && keys->privKey.type == 0) |
|
|
1 |
251 |
if (keys->cert != NULL && keys->privKey.type == 0) |
|
1285
|
251 |
0 |
if (keys->privKey.type != 0 && keys->cert == NULL) |
|
|
0 |
251 |
if (keys->privKey.type != 0 && keys->cert == NULL) |
|
1301
|
251 |
0 |
if (keys->cert != NULL && keys->cert->next != NULL) |
|
|
1 |
250 |
if (keys->cert != NULL && keys->cert->next != NULL) |
|
1307
|
1 |
0 |
while (tmp->next != NULL) |
|
1309
|
1 |
0 |
if (tmp->authStatus != PS_TRUE) |
|
1320
|
250 |
0 |
if (keys->privKey.type == PS_RSA) |
|
1322
|
0 |
250 |
if (psRsaCmpPubKey(&keys->privKey.key.rsa, |
|
1346
|
0 |
0 |
if (keys == NULL) |
|
1358
|
0 |
0 |
if (keys == NULL) |
|
1435
|
0 |
22314 |
if (flags & SSL_FLAGS_INTERCEPTOR) |
|
1442
|
0 |
22314 |
if (lssl == NULL) |
|
1451
|
0 |
22314 |
if (options->keep_peer_cert_der) |
|
1455
|
0 |
22314 |
if (options->keep_peer_certs) |
|
1461
|
22314 |
0 |
if (options->validateCertsOpts.max_verify_depth >= 0) |
|
1467
|
0 |
22314 |
if (options->userDataPtr != NULL) |
|
1475
|
0 |
22314 |
if (options->ecFlags) |
|
1477
|
0 |
0 |
if (testUserEc(options->ecFlags, keys) < 0) |
|
1508
|
0 |
22314 |
if (lssl->outbuf == NULL) |
|
1522
|
0 |
22314 |
if (lssl->inbuf == NULL) |
|
1532
|
0 |
22314 |
if ((lssl->cipher = sslGetCipherSpec(lssl, SSL_NULL_WITH_NULL_NULL)) == NULL) |
|
1573
|
11158 |
11156 |
if (flags & SSL_FLAGS_SERVER) |
|
1579
|
0 |
11158 |
if (flags & SSL_FLAGS_CLIENT_AUTH) |
|
1588
|
0 |
11158 |
if (flags & SSL_FLAGS_SSLV3) |
|
1598
|
0 |
11158 |
if (flags & SSL_FLAGS_TLS_1_0) |
|
1612
|
0 |
11158 |
if (flags & SSL_FLAGS_TLS_1_1) |
|
1626
|
0 |
11158 |
if (flags & SSL_FLAGS_TLS_1_2) |
|
1636
|
0 |
11158 |
if (specificVersion) |
|
1687
|
0 |
11156 |
if (flags & SSL_FLAGS_SSLV3) |
|
1698
|
0 |
11156 |
if (flags & SSL_FLAGS_TLS_1_0) |
|
1714
|
0 |
11156 |
if (flags & SSL_FLAGS_TLS_1_1) |
|
1730
|
0 |
11156 |
if (flags & SSL_FLAGS_TLS_1_2) |
|
1742
|
0 |
11156 |
if (specificVersion == 2) |
|
1749
|
11156 |
0 |
if (specificVersion == 0) |
|
1767
|
0 |
11156 |
if (lssl->majVer == 0) |
|
1820
|
10521 |
635 |
if (session != NULL && session->cipherId != SSL_NULL_WITH_NULL_NULL) |
|
|
0 |
10521 |
if (session != NULL && session->cipherId != SSL_NULL_WITH_NULL_NULL) |
|
1823
|
0 |
0 |
if (lssl->cipher == NULL) |
|
1837
|
0 |
0 |
for (i = 0; i < SSL_MAX_SESSION_ID_SIZE; i++) |
|
1839
|
0 |
0 |
if (session->id[i] != 0x0) |
|
1870
|
0 |
22314 |
if (ssl == NULL) |
|
1895
|
2284 |
20030 |
if (ssl->sessionIdLen > 0 && (ssl->flags & SSL_FLAGS_SERVER)) |
|
|
1142 |
1142 |
if (ssl->sessionIdLen > 0 && (ssl->flags & SSL_FLAGS_SERVER)) |
|
1900
|
11158 |
11156 |
if ((ssl->flags & SSL_FLAGS_SERVER) && ssl->sid) |
|
|
0 |
11158 |
if ((ssl->flags & SSL_FLAGS_SERVER) && ssl->sid) |
|
1910
|
0 |
22314 |
if (ssl->expectedName) |
|
1916
|
90 |
22224 |
if (ssl->sec.cert) |
|
1926
|
0 |
22314 |
if (ssl->sec.dhP) |
|
1930
|
0 |
22314 |
if (ssl->sec.dhG) |
|
1934
|
0 |
22314 |
if (ssl->sec.dhKeyPub) |
|
1940
|
0 |
22314 |
if (ssl->sec.dhKeyPriv) |
|
1949
|
0 |
22314 |
if (ssl->sec.eccKeyPub) |
|
1953
|
90 |
22224 |
if (ssl->sec.eccKeyPriv) |
|
1963
|
0 |
22314 |
if (ssl->sec.premaster) |
|
1967
|
0 |
22314 |
if (ssl->fragMessage) |
|
2012
|
0 |
22314 |
if (ssl->alpn) |
|
2033
|
9 |
0 |
if (option == SSL_OPTION_FULL_HANDSHAKE) |
|
2036
|
0 |
9 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
2046
|
0 |
9 |
if (option == SSL_OPTION_DISABLE_REHANDSHAKES) |
|
2051
|
0 |
9 |
if (option == SSL_OPTION_REENABLE_REHANDSHAKES) |
|
2058
|
0 |
9 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
2060
|
0 |
0 |
if (option == SSL_OPTION_DISABLE_CLIENT_AUTH) |
|
2064
|
0 |
0 |
else if (option == SSL_OPTION_ENABLE_CLIENT_AUTH) |
|
2312
|
10129 |
0 |
if ((ssl != NULL) && (certValidator != NULL)) |
|
|
10129 |
0 |
if ((ssl != NULL) && (certValidator != NULL)) |
|
2332
|
544 |
17 |
for (i = 0; i < SSL_SESSION_TABLE_SIZE; i++) |
|
2334
|
0 |
544 |
DLListInsertTail(&g_sessionChronList, &g_sessionTable[i].chronList); |
|
2355
|
0 |
1147 |
if (!(ssl->flags & SSL_FLAGS_SERVER)) |
|
2362
|
0 |
1147 |
if (ssl->sid && |
|
|
0 |
0 |
if (ssl->sid && |
|
2388
|
0 |
1147 |
if (DLListIsEmpty(&g_sessionChronList)) |
|
2400
|
0 |
1147 |
if (i >= SSL_SESSION_TABLE_SIZE) |
|
2454
|
0 |
7 |
if (ssl->sessionIdLen <= 0) |
|
2461
|
0 |
7 |
if (i >= SSL_SESSION_TABLE_SIZE) |
|
2467
|
7 |
0 |
if (g_sessionTable[i].inUse == 0) |
|
2469
|
0 |
7 |
DLListInsertTail(&g_sessionChronList, &g_sessionTable[i].chronList); |
|
2477
|
0 |
7 |
if (remove) |
|
2503
|
0 |
2 |
if (!(ssl->flags & SSL_FLAGS_SERVER)) |
|
2507
|
0 |
2 |
if (ssl->sessionIdLen <= 0) |
|
2515
|
2 |
0 |
if (i >= SSL_SESSION_TABLE_SIZE || g_sessionTable[i].cipher == NULL) |
|
|
0 |
2 |
if (i >= SSL_SESSION_TABLE_SIZE || g_sessionTable[i].cipher == NULL) |
|
2525
|
0 |
2 |
if ((memcmp(g_sessionTable[i].id, id, |
|
|
2 |
0 |
if ((memcmp(g_sessionTable[i].id, id, |
|
2526
|
2 |
0 |
(uint32) min(ssl->sessionIdLen, SSL_MAX_SESSION_ID_SIZE)) != 0) || |
|
2528
|
2 |
0 |
SSL_SESSION_ENTRY_LIFE) || (g_sessionTable[i].majVer != ssl->majVer) |
|
2529
|
0 |
2 |
|| (g_sessionTable[i].minVer != ssl->minVer)) |
|
2538
|
0 |
2 |
if (g_sessionTable[i].extendedMasterSecret == 0 && |
|
|
0 |
0 |
if (g_sessionTable[i].extendedMasterSecret == 0 && |
|
2544
|
2 |
0 |
if (g_sessionTable[i].extendedMasterSecret == 1 && |
|
|
0 |
2 |
if (g_sessionTable[i].extendedMasterSecret == 1 && |
|
2556
|
2 |
0 |
if (g_sessionTable[i].inUse == 1) |
|
2576
|
0 |
2199 |
if (!(ssl->flags & SSL_FLAGS_SERVER)) |
|
2580
|
0 |
2199 |
if (ssl->sessionIdLen == 0) |
|
2587
|
0 |
2199 |
if (i >= SSL_SESSION_TABLE_SIZE) |
|
2595
|
1142 |
1057 |
g_sessionTable[i].inUse += ssl->flags & SSL_FLAGS_CLOSED ? -1 : 0; |
|
2596
|
1142 |
1057 |
if (g_sessionTable[i].inUse == 0) |
|
2599
|
0 |
1142 |
DLListInsertTail(&g_sessionChronList, &g_sessionTable[i].chronList); |
|
2601
|
90 |
2109 |
if (ssl->flags & SSL_FLAGS_ERROR) |
|
2633
|
0 |
0 |
while (lkey) |
|
2635
|
0 |
0 |
if (lkey->inUse == 0 && (memcmp(lkey->name, name, 16) == 0)) |
|
|
0 |
0 |
if (lkey->inUse == 0 && (memcmp(lkey->name, name, 16) == 0)) |
|
2637
|
0 |
0 |
if (prev == NULL) |
|
2640
|
0 |
0 |
if (lkey->next == NULL) |
|
2691
|
1 |
0 |
if (symkeyLen != 16 && symkeyLen != 32) |
|
|
0 |
1 |
if (symkeyLen != 16 && symkeyLen != 32) |
|
2696
|
0 |
1 |
if (hashkeyLen != 32) |
|
2702
|
1 |
0 |
if (keys->sessTickets == NULL) |
|
2706
|
0 |
1 |
if (keys->sessTickets == NULL) |
|
2717
|
0 |
0 |
while (keylist) |
|
2723
|
0 |
0 |
if (i > SSL_SESSION_TICKET_LIST_LEN) |
|
2730
|
0 |
0 |
if (keylist == NULL) |
|
2797
|
0 |
0 |
if ((ticketLen + 6) > *outLen) |
|
2851
|
0 |
0 |
if ((rc = psAesInitCBC(&ctx, out + 6 + 16, keys->symkey, keys->symkeyLen, PS_AES_ENCRYPT)) < 0) |
|
2860
|
0 |
0 |
if ((rc = psHmacSha256Init(&dgst, keys->hashkey, keys->hashkeyLen)) < 0) |
|
2901
|
0 |
0 |
while (lkey) |
|
2903
|
0 |
0 |
if (memcmp(lkey->name, name, 16) == 0) |
|
2908
|
0 |
0 |
if (ssl->keys->ticket_cb) |
|
2921
|
0 |
0 |
if (ssl->keys->ticket_cb) |
|
2927
|
0 |
0 |
if (rc < 0) |
|
2929
|
0 |
0 |
if (lkey) |
|
2938
|
0 |
0 |
if (cachedTicket == 0) |
|
2942
|
0 |
0 |
if (lkey == NULL) |
|
2946
|
0 |
0 |
while (lkey->next) |
|
2950
|
0 |
0 |
if (memcmp(lkey->name, c, 16) != 0) |
|
2984
|
0 |
0 |
if (inLen != matrixSessionTicketLen()) |
|
2991
|
0 |
0 |
if (getTicketKeys(ssl, c, &keys) < 0) |
|
3024
|
0 |
0 |
if (memcmp(hash, c, L_HASHLEN) != 0) |
|
3035
|
0 |
0 |
if (majVer != ssl->majVer || minVer != ssl->minVer) |
|
|
0 |
0 |
if (majVer != ssl->majVer || minVer != ssl->minVer) |
|
3045
|
0 |
0 |
if ((ssl->cipher = sslGetCipherSpec(ssl, cipherSuite)) == NULL) |
|
3055
|
0 |
0 |
if (*enc == 0x0 && ssl->extFlags.require_extended_master_secret == 1) |
|
|
0 |
0 |
if (*enc == 0x0 && ssl->extFlags.require_extended_master_secret == 1) |
|
3074
|
0 |
0 |
if ((now - time) > (SSL_SESSION_ENTRY_LIFE / 1000)) |
|
3103
|
2119 |
0 |
if (ssl == NULL || ssl->flags & SSL_FLAGS_SERVER || session == NULL) |
|
|
1060 |
1059 |
if (ssl == NULL || ssl->flags & SSL_FLAGS_SERVER || session == NULL) |
|
|
550 |
510 |
if (ssl == NULL || ssl->flags & SSL_FLAGS_SERVER || session == NULL) |
|
3108
|
510 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
|
|
510 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
|
|
510 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
|
3118
|
0 |
510 |
if (session->sessionTicket != NULL && session->sessionTicketLen > 0) |
|
|
0 |
0 |
if (session->sessionTicket != NULL && session->sessionTicketLen > 0) |
|
3130
|
0 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
|
|
0 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
|
|
0 |
0 |
if (ssl->cipher != NULL && ssl->cipher->ident != SSL_NULL_WITH_NULL_NULL && |
|
3131
|
0 |
0 |
session->sessionTicket != NULL && session->sessionTicketLen > 0) |
|
3153
|
0 |
0 |
if (protoCount > MAX_PROTO_EXT) |
|
3159
|
0 |
0 |
for (i = 0; i < protoCount; i++) |
|
3161
|
0 |
0 |
if (protoLen[i] <= 0 || protoLen[i] > 255) |
|
|
0 |
0 |
if (protoLen[i] <= 0 || protoLen[i] > 255) |
|
3167
|
0 |
0 |
if ((c = psMalloc(pool, len)) == NULL) |
|
3177
|
0 |
0 |
for (i = 0; i < protoCount; i++) |
|
3195
|
0 |
0 |
if ((c = psMalloc(pool, *extLen)) == NULL) |
|
3222
|
0 |
0 |
if (ssl->sni_cb) |
|
3227
|
0 |
0 |
if (keys) |
|
3246
|
7 |
7 |
if (!(ssl->flags & SSL_FLAGS_SERVER)) |
|
3255
|
7 |
7 |
if (ssl->flags & SSL_FLAGS_SERVER) |
|
3299
|
0 |
0 |
if (*c == '*') |
|
3303
|
0 |
0 |
if (*c != '.') |
|
3307
|
0 |
0 |
if (strchr(s, '@')) |
|
3311
|
0 |
0 |
if ((e = strchr(s, '.')) == NULL) |
|
3315
|
0 |
0 |
if (strcasecmp(c, e) == 0) |
|
3320
|
0 |
0 |
else if (*c == '.') |
|
3325
|
0 |
0 |
else if (strcasecmp(c, s) == 0) |
|
3338
|
0 |
0 |
if (strlen(expectedEmail) != emailLen) |
|
3343
|
0 |
0 |
if (caseSensitiveLocalPart) |
|
3347
|
0 |
0 |
for (at_i = 0; at_i < emailLen; at_i++) |
|
3349
|
0 |
0 |
if (email[at_i] == '@') |
|
3356
|
0 |
0 |
if (((strncmp(email, |
|
3357
|
0 |
0 |
expectedEmail, at_i)) == 0) && |
|
3367
|
0 |
0 |
if (strcasecmp(email, expectedEmail) == 0) |
|
3433
|
0 |
1148 |
if (opts->mFlags & VCERTS_MFLAG_ALWAYS_CHECK_SUBJECT_CN) |
|
3435
|
0 |
0 |
if (opts->nameType != NAME_TYPE_ANY && |
|
|
0 |
0 |
if (opts->nameType != NAME_TYPE_ANY && |
|
3436
|
0 |
0 |
opts->nameType != NAME_TYPE_HOSTNAME && |
|
3443
|
0 |
1148 |
if (opts->flags & VCERTS_FLAG_VALIDATE_EXPECTED_GENERAL_NAME) |
|
3448
|
0 |
0 |
if (expectedName) |
|
3450
|
0 |
0 |
if (psX509ValidateGeneralName(expectedName) < 0) |
|
3463
|
0 |
1148 |
if (issuerCerts == NULL) |
|
3472
|
1 |
1147 |
if ((ic = sc->next) != NULL) |
|
3478
|
0 |
1 |
while (ic->next != NULL) |
|
3480
|
0 |
0 |
if ((rc = psX509AuthenticateCert(pool, sc, ic, foundIssuer, hwCtx, |
|
3485
|
0 |
0 |
if (ic->extensions.bc.pathLenConstraint >= 0) |
|
3488
|
0 |
0 |
if (ic->extensions.bc.pathLenConstraint < pathLen) |
|
3502
|
0 |
1 |
if ((rc = psX509AuthenticateCert(pool, sc, ic, foundIssuer, hwCtx, |
|
3507
|
1 |
0 |
if (ic->extensions.bc.pathLenConstraint >= 0) |
|
3510
|
0 |
1 |
if (ic->extensions.bc.pathLenConstraint < pathLen) |
|
3531
|
1293 |
1 |
while (ic != NULL) |
|
3534
|
1147 |
146 |
if ((rc = psX509AuthenticateCert(pool, sc, ic, foundIssuer, hwCtx, |
|
3537
|
0 |
1147 |
if (ic->extensions.bc.pathLenConstraint >= 0) |
|
3545
|
0 |
0 |
if (ic->signatureLen == sc->signatureLen && |
|
|
0 |
0 |
if (ic->signatureLen == sc->signatureLen && |
|
3549
|
0 |
0 |
if (pathLen > 0) |
|
3554
|
0 |
0 |
if (ic->extensions.bc.pathLenConstraint < pathLen) |
|
3566
|
0 |
1147 |
if (ext->critFlags & EXT_CRIT_FLAG(OID_ENUM(id_ce_extKeyUsage))) |
|
3568
|
0 |
0 |
if (!(ext->ekuFlags & (EXT_KEY_USAGE_TLS_SERVER_AUTH | |
|
3578
|
0 |
1147 |
if (expectedName == NULL || |
|
|
0 |
0 |
if (expectedName == NULL || |
|
3584
|
0 |
0 |
for (n = ext->san; n != NULL; n = n->next) |
|
3590
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
3591
|
0 |
0 |
opts->nameType == NAME_TYPE_HOSTNAME || |
|
3594
|
0 |
0 |
if (wildcardMatch((char *) n->data, expectedName) == 0) |
|
3602
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
3605
|
0 |
0 |
if (opts->mFlags & |
|
3608
|
0 |
0 |
if (matchEmail((char *) n->data, n->dataLen, |
|
3616
|
0 |
0 |
if (matchEmail((char *) n->data, n->dataLen, |
|
3626
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
3635
|
0 |
0 |
if (strcmp(ip, expectedName) == 0) |
|
3669
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
|
0 |
0 |
if (opts->nameType == NAME_TYPE_ANY || |
|
3670
|
0 |
0 |
opts->nameType == NAME_TYPE_CN || |
|
3673
|
0 |
0 |
if (!foundSupportedSAN || |
|
|
0 |
0 |
if (!foundSupportedSAN || |
|
3676
|
0 |
0 |
if (wildcardMatch(subjectCerts->subject.commonName, |
|
3690
|
0 |
146 |
else if (rc == PS_MEM_FAIL) |
|
3725
|
1029 |
119 |
if (certValidator == NULL) |
|
3739
|
1 |
118 |
if (alert == SSL_ALERT_NONE) |