Lines Matching refs:NULL

184 	if (user_pwd == NULL) 
196 if (ret == NULL)
197 return NULL;
198 ret->N = NULL;
199 ret->g = NULL;
200 ret->s = NULL;
201 ret->v = NULL;
202 ret->id = NULL ;
203 ret->info = NULL;
217 if (id != NULL && NULL == (vinfo->id = BUF_strdup(id)))
219 return (info == NULL || NULL != (vinfo->info = BUF_strdup(info))) ;
231 if (NULL == (vinfo->v = BN_bin2bn(tmp, len, NULL)) )
234 return ((vinfo->s = BN_bin2bn(tmp, len, NULL)) != NULL) ;
241 return (vinfo->s != NULL && vinfo->v != NULL) ;
248 if (vb == NULL)
249 return NULL;
254 return NULL;
256 vb->default_g = NULL;
257 vb->default_N = NULL;
258 vb->seed_key = NULL;
259 if ((seed_key != NULL) &&
260 (vb->seed_key = BUF_strdup(seed_key)) == NULL)
265 return NULL;
287 if (newgN == NULL)
288 return NULL;
290 if ((newgN->b64_bn = BUF_strdup(ch)) == NULL)
294 if ((newgN->bn = BN_bin2bn(tmp, len, NULL)))
300 return NULL;
306 if (gN_cache == NULL)
318 if (gN_tab != NULL)
322 if (gN && (id == NULL || strcmp(gN->id,id)==0))
332 if (gN_cache == NULL)
333 return NULL;
351 return NULL;
364 char *last_index = NULL;
368 SRP_gN *gN = NULL;
369 SRP_user_pwd *user_pwd = NULL ;
371 TXT_DB *tmpdb = NULL;
376 if (in == NULL || BIO_read_filename(in,verifier_file) <= 0)
381 if ((tmpdb =TXT_DB_read(in,DB_NUMBER)) == NULL)
389 last_index = SRP_get_default_gN(NULL)->id;
398 if ((gN = (SRP_gN *)OPENSSL_malloc(sizeof(SRP_gN))) == NULL)
407 gN = NULL;
409 if (vb->seed_key != NULL)
418 if ((lgN = SRP_get_gN_by_id(pp[DB_srpgN],SRP_gN_tab))!=NULL)
421 if ((user_pwd = SRP_user_pwd_new()) == NULL)
434 user_pwd = NULL; /* abandon responsability */
439 if (last_index != NULL)
443 if (((gN = SRP_get_gN_by_id(last_index,SRP_gN_tab))==NULL))
450 gN = NULL ;
457 if (gN != NULL)
483 if (vb == NULL)
484 return NULL;
491 if ((vb->seed_key == NULL) ||
492 (vb->default_g == NULL) ||
493 (vb->default_N == NULL))
494 return NULL;
498 if ((user = SRP_user_pwd_new()) == NULL)
499 return NULL;
503 if (!SRP_user_pwd_set_ids(user,username,NULL))
508 EVP_DigestInit_ex(&ctxt, EVP_sha1(), NULL);
511 EVP_DigestFinal_ex(&ctxt, digs, NULL);
513 if (SRP_user_pwd_set_sv_BN(user, BN_bin2bn(digs,SHA_DIGEST_LENGTH,NULL), BN_bin2bn(digv,SHA_DIGEST_LENGTH, NULL)))
517 return NULL;
528 char * result=NULL;
530 BIGNUM *N_bn = NULL, *g_bn = NULL, *s = NULL, *v = NULL;
533 char * defgNid = NULL;
535 if ((user == NULL)||
536 (pass == NULL)||
537 (salt == NULL)||
538 (verifier == NULL))
544 N_bn = BN_bin2bn(tmp, len, NULL);
546 g_bn = BN_bin2bn(tmp, len, NULL);
551 SRP_gN * gN = SRP_get_gN_by_id(g, NULL) ;
552 if (gN == NULL)
559 if (*salt == NULL)
563 s = BN_bin2bn(tmp2, SRP_RANDOM_SALT_LEN, NULL);
569 s = BN_bin2bn(tmp2, len, NULL);
576 if (((vf = OPENSSL_malloc(BN_num_bytes(v)*2)) == NULL))
581 if (*salt == NULL)
584 if ((tmp_salt = (char *)OPENSSL_malloc(SRP_RANDOM_SALT_LEN * 2)) == NULL)
610 BIGNUM *x = NULL;
614 if ((user == NULL)||
615 (pass == NULL)||
616 (salt == NULL)||
617 (verifier == NULL)||
618 (N == NULL)||
619 (g == NULL)||
620 (bn_ctx == NULL))
626 if (*salt == NULL)
630 *salt = BN_bin2bn(tmp2,SRP_RANDOM_SALT_LEN,NULL);
636 if(*verifier == NULL) goto err;