Analyzing Cryptographic Primitives with Concolic Execution