| Line | Source | Count |
| 1 | | - |
| 2 | | - |
| 3 | | - |
| 4 | | - |
| 5 | void | - |
| 6 | PKCS12_PBE_add(void) | - |
| 7 | { | - |
| 8 | } | - |
| 9 | | - |
| 10 | int | - |
| 11 | PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | - |
| 12 | ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) | - |
| 13 | { | - |
| 14 | PBEPARAM *pbe; | - |
| 15 | int saltlen, iter, ret; | - |
| 16 | unsigned char *salt; | - |
| 17 | const unsigned char *pbuf; | - |
| 18 | unsigned char key[64], iv[16]; | - |
| 19 | | - |
| 20 | | - |
| 21 | if (param == | TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 22 | ((void *)0)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 23 | || param->type != 16| TRUE | never evaluated | | FALSE | never evaluated |
|| | 0 |
| 24 | param->value.sequence == | TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 25 | ((void *)0)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 26 | ) { | - |
| 27 | ERR_put_error(35,(0xfff),(101),__FILE__,85); | - |
| 28 | return never executed: return 0; 0;never executed: return 0; | 0 |
| 29 | } | - |
| 30 | | - |
| 31 | pbuf = param->value.sequence->data; | - |
| 32 | if (!(pbe = d2i_PBEPARAM(| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 33 | ((void *)0)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 34 | , &pbuf, param->value.sequence->length))| TRUE | never evaluated | | FALSE | never evaluated |
) { | 0 |
| 35 | ERR_put_error(35,(0xfff),(101),__FILE__,91); | - |
| 36 | return never executed: return 0; 0;never executed: return 0; | 0 |
| 37 | } | - |
| 38 | | - |
| 39 | if (!pbe->iter| TRUE | never evaluated | | FALSE | never evaluated |
) | 0 |
| 40 | iter = 1; never executed: iter = 1; | 0 |
| 41 | else if ((| TRUE | never evaluated | | FALSE | never evaluated |
iter = ASN1_INTEGER_get(pbe->iter)) <= 0| TRUE | never evaluated | | FALSE | never evaluated |
) { | 0 |
| 42 | ERR_put_error(35,(0xfff),(101),__FILE__,98); | - |
| 43 | PBEPARAM_free(pbe); | - |
| 44 | return never executed: return 0; 0;never executed: return 0; | 0 |
| 45 | } | - |
| 46 | salt = pbe->salt->data; | - |
| 47 | saltlen = pbe->salt->length; | - |
| 48 | if (!PKCS12_key_gen_asc (pass, passlen, salt, saltlen, 1,| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 49 | iter, EVP_CIPHER_key_length(cipher), key, md)| TRUE | never evaluated | | FALSE | never evaluated |
) { | 0 |
| 50 | ERR_put_error(35,(0xfff),(107),__FILE__,106); | - |
| 51 | PBEPARAM_free(pbe); | - |
| 52 | return never executed: return 0; 0;never executed: return 0; | 0 |
| 53 | } | - |
| 54 | if (!PKCS12_key_gen_asc (pass, passlen, salt, saltlen, 2,| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 55 | iter, EVP_CIPHER_iv_length(cipher), iv, md)| TRUE | never evaluated | | FALSE | never evaluated |
) { | 0 |
| 56 | ERR_put_error(35,(0xfff),(106),__FILE__,112); | - |
| 57 | PBEPARAM_free(pbe); | - |
| 58 | return never executed: return 0; 0;never executed: return 0; | 0 |
| 59 | } | - |
| 60 | PBEPARAM_free(pbe); | - |
| 61 | ret = EVP_CipherInit_ex(ctx, cipher, | - |
| 62 | ((void *)0) | - |
| 63 | , key, iv, en_de); | - |
| 64 | explicit_bzero(key, 64); | - |
| 65 | explicit_bzero(iv, 16); | - |
| 66 | return never executed: return ret; ret;never executed: return ret; | 0 |
| 67 | } | - |
| | |