| Line | Source | Count |
| 1 | | - |
| 2 | | - |
| 3 | | - |
| 4 | | - |
| 5 | | - |
| 6 | | - |
| 7 | | - |
| 8 | | - |
| 9 | | - |
| 10 | | - |
| 11 | | - |
| 12 | | - |
| 13 | | - |
| 14 | | - |
| 15 | | - |
| 16 | | - |
| 17 | | - |
| 18 | #include <errno.h> | - |
| 19 | #include <stdlib.h> | - |
| 20 | #include <stdint.h> | - |
| 21 | #include <string.h> | - |
| 22 | #include <unistd.h> | - |
| 23 | | - |
| 24 | | - |
| 25 | | - |
| 26 | | - |
| 27 | | - |
| 28 | #define MUL_NO_OVERFLOW ((size_t)1 << (sizeof(size_t) * 4)) | - |
| 29 | | - |
| 30 | void * | - |
| 31 | recallocarray(void *ptr, size_t oldnmemb, size_t newnmemb, size_t size) | - |
| 32 | { | - |
| 33 | size_t oldsize, newsize; | - |
| 34 | void *newptr; | - |
| 35 | | - |
| 36 | if (ptr == NULL)| TRUE | evaluated 1958 times by 10 testsEvaluated by:- asn1test
- base64test
- clienttest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlstest
- verifytest
| | FALSE | evaluated 1446 times by 9 testsEvaluated by:- asn1test
- bytestringtest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlsexttest
- tlstest
|
| 1446-1958 |
| 37 | return calloc(newnmemb, size);executed 1958 times by 10 tests: return calloc(newnmemb, size);Executed by:- asn1test
- base64test
- clienttest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlstest
- verifytest
| 1958 |
| 38 | | - |
| 39 | if ((newnmemb >= MUL_NO_OVERFLOW || size >= MUL_NO_OVERFLOW) &&| TRUE | never evaluated | | FALSE | evaluated 1446 times by 9 testsEvaluated by:- asn1test
- bytestringtest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlsexttest
- tlstest
|
| TRUE | never evaluated | | FALSE | evaluated 1446 times by 9 testsEvaluated by:- asn1test
- bytestringtest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlsexttest
- tlstest
|
| 0-1446 |
| 40 | newnmemb > 0 && SIZE_MAX / newnmemb < size) {| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 41 | errno = ENOMEM; | - |
| 42 | return NULL; never executed: return ((void *)0) ; | 0 |
| 43 | } | - |
| 44 | newsize = newnmemb * size; | - |
| 45 | | - |
| 46 | if ((oldnmemb >= MUL_NO_OVERFLOW || size >= MUL_NO_OVERFLOW) &&| TRUE | never evaluated | | FALSE | evaluated 1446 times by 9 testsEvaluated by:- asn1test
- bytestringtest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlsexttest
- tlstest
|
| TRUE | never evaluated | | FALSE | evaluated 1446 times by 9 testsEvaluated by:- asn1test
- bytestringtest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlsexttest
- tlstest
|
| 0-1446 |
| 47 | oldnmemb > 0 && SIZE_MAX / oldnmemb < size) {| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 48 | errno = EINVAL; | - |
| 49 | return NULL; never executed: return ((void *)0) ; | 0 |
| 50 | } | - |
| 51 | oldsize = oldnmemb * size; | - |
| 52 | | - |
| 53 | | - |
| 54 | | - |
| 55 | | - |
| 56 | | - |
| 57 | if (newsize <= oldsize) {| TRUE | never evaluated | | FALSE | evaluated 1446 times by 9 testsEvaluated by:- asn1test
- bytestringtest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlsexttest
- tlstest
|
| 0-1446 |
| 58 | size_t d = oldsize - newsize; | - |
| 59 | | - |
| 60 | if (d < oldsize / 2 && d < getpagesize()) {| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 61 | memset((char *)ptr + newsize, 0, d); | - |
| 62 | return ptr; never executed: return ptr; | 0 |
| 63 | } | - |
| 64 | } never executed: end of block | 0 |
| 65 | | - |
| 66 | newptr = malloc(newsize); | - |
| 67 | if (newptr == NULL)| TRUE | never evaluated | | FALSE | evaluated 1446 times by 9 testsEvaluated by:- asn1test
- bytestringtest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlsexttest
- tlstest
|
| 0-1446 |
| 68 | return NULL; never executed: return ((void *)0) ; | 0 |
| 69 | | - |
| 70 | if (newsize > oldsize) {| TRUE | evaluated 1446 times by 9 testsEvaluated by:- asn1test
- bytestringtest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlsexttest
- tlstest
| | FALSE | never evaluated |
| 0-1446 |
| 71 | memcpy(newptr, ptr, oldsize); | - |
| 72 | memset((char *)newptr + oldsize, 0, newsize - oldsize); | - |
| 73 | } elseexecuted 1446 times by 9 tests: end of blockExecuted by:- asn1test
- bytestringtest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlsexttest
- tlstest
| 1446 |
| 74 | memcpy(newptr, ptr, newsize); never executed: memcpy(newptr, ptr, newsize); | 0 |
| 75 | | - |
| 76 | explicit_bzero(ptr, oldsize); | - |
| 77 | free(ptr); | - |
| 78 | | - |
| 79 | return newptr;executed 1446 times by 9 tests: return newptr;Executed by:- asn1test
- bytestringtest
- keypairtest
- libcrypto.so.44.0.1
- pkcs7test
- servertest
- ssltest
- tlsexttest
- tlstest
| 1446 |
| 80 | } | - |
| | |