| line |
true |
false |
branch |
|
56
|
0 |
1 |
if $depth > 10 |
|
57
|
0 |
1 |
if $self->_bad_host($host) |
|
60
|
0 |
1 |
if $host =~ /^\d+\.\d+\.\d+\.\d+$/ |
|
62
|
0 |
1 |
unless my $sock = $res->bgsend($host) |
|
67
|
0 |
1 |
unless ($sock and $sock eq 'MOCK') |
|
71
|
0 |
0 |
unless $nf |
|
74
|
0 |
1 |
unless my $packet = $res->bgread($sock) |
|
81
|
1 |
0 |
if ($rr->type eq 'A') { } |
|
|
0 |
0 |
elsif ($rr->type eq 'CNAME') { } |
|
82
|
1 |
0 |
if $self->_bad_host($rr->address) |
|
91
|
0 |
0 |
if @addr |
|
92
|
0 |
0 |
unless $cname |
|
101
|
0 |
23 |
unless $$self{$list_name} |
|
102
|
0 |
35 |
if (ref $rule eq 'CODE') { } |
|
|
12 |
23 |
elsif (ref $rule) { } |
|
103
|
0 |
0 |
if &$rule($host) |
|
106
|
0 |
12 |
if $host =~ /$rule/ |
|
108
|
1 |
22 |
if $host eq $rule |
|
117
|
0 |
11 |
if $self->_host_list_match('whitelisted_hosts', $host) |
|
118
|
0 |
11 |
if $self->_host_list_match('blocked_hosts', $host) |
|
119
|
0 |
11 |
if $host =~ /^localhost$/i or $host =~ /\s/i |
|
130
|
0 |
11 |
if @parts > 4 |
|
135
|
2 |
24 |
unless /^\d+$/ or /^0x[a-f\d]+$/ |
|
137
|
13 |
11 |
if /^0/ |
|
141
|
0 |
9 |
if $overflow_flag |
|
145
|
1 |
8 |
if (@parts == 1) { } |
|
|
4 |
4 |
elsif (@parts == 2) { } |
|
|
1 |
3 |
elsif (@parts == 3) { } |
|
|
3 |
0 |
elsif (@parts == 4) { } |
|
147
|
0 |
1 |
if $parts[0] > 4294967295 |
|
152
|
0 |
4 |
if $parts[0] > 255 or $parts[1] > 16777215 |
|
158
|
0 |
1 |
if $parts[0] > 255 or $parts[1] > 255 or $parts[2] > 65535 |
|
165
|
0 |
3 |
if $parts[0] > 255 or $parts[1] > 255 or $parts[2] > 255 or $parts[3] > 255 |
|
176
|
1 |
1 |
if ($haddr & 4278190080) == 0 or ($haddr & 4278190080) == 167772160 or ($haddr & 4278190080) == 2130706432 or ($haddr & 4293918720) == 2886729728 or ($haddr & 4294901760) == 2851995648 or ($haddr & 4294901760) == 3232235520 or ($haddr & 4294967040) == 3221225984 or ($haddr & 4294967040) == 3227017984 or $haddr == 4294967295 or ($haddr & 4026531840) == 3758096384 |
|
191
|
1 |
0 |
if $self->_host_list_match('blocked_hosts', $can_ip) |
|
204
|
0 |
9 |
$first_res ? : |
|
207
|
8 |
1 |
if ($self->_bad_host($host)) |
|
217
|
0 |
1 |
if (my $pp = $$self{'paranoid_proxy'}) |
|
238
|
0 |
1 |
unless $method |
|
240
|
0 |
1 |
unless $url |
|
242
|
0 |
1 |
unless $url->scheme |
|
244
|
0 |
1 |
if $self->_need_proxy($url) |
|
250
|
0 |
1 |
unless $scheme eq 'http' or $scheme eq 'https' |
|
261
|
0 |
1 |
if ($x = $self->protocols_allowed) { } |
|
|
0 |
1 |
elsif ($x = $self->protocols_forbidden) { } |
|
262
|
0 |
0 |
if (grep((lc $_ eq $scheme), @$x)) { } |
|
272
|
0 |
0 |
if (grep((lc $_ eq $scheme), @$x)) { } |
|
284
|
1 |
0 |
unless ($protocol) |
|
287
|
0 |
1 |
if ($@) |
|
293
|
1 |
0 |
$scheme eq 'http' ? : |
|
294
|
0 |
1 |
if ($@) |
|
297
|
0 |
0 |
if ($scheme eq 'https') |
|
315
|
1 |
0 |
if ($use_eval) { } |
|
322
|
1 |
0 |
if ($error) |
|
336
|
0 |
1 |
if $cookie_jar |
|
338
|
1 |
0 |
if $self->can('run_handlers') |
|
346
|
1 |
0 |
if (@_) |
|
351
|
0 |
0 |
unless $$self{'blocked_hosts'} |
|
358
|
1 |
0 |
if (@_) |
|
363
|
0 |
0 |
unless $$self{'whitelisted_hosts'} |
|
370
|
2 |
1 |
if (@_) |
|
373
|
0 |
2 |
unless UNIVERSAL::isa($$self{'resolver'}, 'Net::DNS::Resolver') |
|
384
|
0 |
1 |
unless ref $url |
|
387
|
0 |
1 |
if (my $proxy = $$self{'proxy'}{$scheme}) |
|
388
|
0 |
0 |
if ($$self{'no_proxy'} and @{$$self{'no_proxy'};}) |
|
389
|
0 |
0 |
if (my $host = eval {
do {
$url->host
}
}) |
|
391
|
0 |
0 |
if ($host =~ /\Q$domain\E$/) |
|
410
|
1 |
0 |
if (defined $request) { } |
|
411
|
1 |
0 |
if (ref $request) { } |
|
412
|
0 |
1 |
if ref $request eq 'ARRAY' or ref $request eq 'HASH' or not $request->can('method') or not $request->can('uri') |