| Line | Source | Count |
| 1 | | - |
| 2 | | - |
| 3 | | - |
| 4 | void PKCS12_PBE_add(void) | - |
| 5 | { | - |
| 6 | } | - |
| 7 | | - |
| 8 | int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | - |
| 9 | ASN1_TYPE *param, const EVP_CIPHER *cipher, | - |
| 10 | const EVP_MD *md, int en_de) | - |
| 11 | { | - |
| 12 | PBEPARAM *pbe; | - |
| 13 | int saltlen, iter, ret; | - |
| 14 | unsigned char *salt; | - |
| 15 | unsigned char key[64], iv[16]; | - |
| 16 | int (*pkcs12_key_gen)(const char *pass, int passlen, | - |
| 17 | unsigned char *salt, int slen, | - |
| 18 | int id, int iter, int n, | - |
| 19 | unsigned char *out, | - |
| 20 | const EVP_MD *md_type); | - |
| 21 | | - |
| 22 | pkcs12_key_gen = PKCS12_key_gen_utf8; | - |
| 23 | | - |
| 24 | if (cipher == | TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 25 | ((void *)0)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 26 | ) | - |
| 27 | return never executed: return 0; 0;never executed: return 0; | 0 |
| 28 | | - |
| 29 | | - |
| 30 | | - |
| 31 | pbe = ASN1_TYPE_unpack_sequence((&(PBEPARAM_it)), param); | - |
| 32 | if (pbe == | TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 33 | ((void *)0)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 34 | ) { | - |
| 35 | ERR_put_error(35,(120),(101),__FILE__,43); | - |
| 36 | return never executed: return 0; 0;never executed: return 0; | 0 |
| 37 | } | - |
| 38 | | - |
| 39 | if (!pbe->iter| TRUE | never evaluated | | FALSE | never evaluated |
) | 0 |
| 40 | iter = 1; never executed: iter = 1; | 0 |
| 41 | else | - |
| 42 | iter = ASN1_INTEGER_get(pbe->iter); never executed: iter = ASN1_INTEGER_get(pbe->iter); | 0 |
| 43 | salt = pbe->salt->data; | - |
| 44 | saltlen = pbe->salt->length; | - |
| 45 | if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, 1,| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 46 | iter, EVP_CIPHER_key_length(cipher), key, md)| TRUE | never evaluated | | FALSE | never evaluated |
) { | 0 |
| 47 | ERR_put_error(35,(120),(107),__FILE__,55); | - |
| 48 | PBEPARAM_free(pbe); | - |
| 49 | return never executed: return 0; 0;never executed: return 0; | 0 |
| 50 | } | - |
| 51 | if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, 2,| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 52 | iter, EVP_CIPHER_iv_length(cipher), iv, md)| TRUE | never evaluated | | FALSE | never evaluated |
) { | 0 |
| 53 | ERR_put_error(35,(120),(106),__FILE__,61); | - |
| 54 | PBEPARAM_free(pbe); | - |
| 55 | return never executed: return 0; 0;never executed: return 0; | 0 |
| 56 | } | - |
| 57 | PBEPARAM_free(pbe); | - |
| 58 | ret = EVP_CipherInit_ex(ctx, cipher, | - |
| 59 | ((void *)0) | - |
| 60 | , key, iv, en_de); | - |
| 61 | OPENSSL_cleanse(key, 64); | - |
| 62 | OPENSSL_cleanse(iv, 16); | - |
| 63 | return never executed: return ret; ret;never executed: return ret; | 0 |
| 64 | } | - |
| | |