| line |
true |
false |
branch |
|
155
|
0 |
8 |
if (not ref $options or ref $options ne 'HASH') |
|
165
|
7 |
1 |
unless $$options{'no_integrity'} |
|
166
|
0 |
7 |
unless $$options{'no_integrity'} or $$options{'no_confidentiality'} or $NO_CRYPT_AVAILABLE |
|
241
|
0 |
11 |
unless $self->_parse_challenge(\$challenge, 'server', $$self{'server_params'}) |
|
244
|
4 |
7 |
if ($$self{'state'} == 1) |
|
246
|
0 |
4 |
unless $sparams{'rspauth'} |
|
248
|
0 |
4 |
unless $$self{'rspauth'} eq $sparams{'rspauth'} |
|
257
|
0 |
7 |
if (my(@missing) = grep({not exists $sparams{$_};} @server_required)) |
|
270
|
0 |
7 |
unless $self->_client_layer(\%sparams, \%response) |
|
277
|
7 |
0 |
unless (defined $realm) |
|
281
|
7 |
0 |
if (defined $realm) |
|
286
|
2 |
5 |
if (defined $authzid) |
|
291
|
0 |
7 |
if (defined $serv_name) |
|
296
|
0 |
7 |
unless defined $user |
|
301
|
0 |
7 |
unless defined $password |
|
324
|
0 |
12 |
if (defined $$params{'realm'} and ref $$params{'realm'} eq 'ARRAY') |
|
329
|
0 |
12 |
unless defined $realm |
|
331
|
4 |
8 |
defined $$params{'authzid'} ? : |
|
349
|
0 |
12 |
if (my $cipher = $$self{'cipher'}) |
|
350
|
0 |
0 |
unless $$cipher{'fixup'} |
|
369
|
7 |
5 |
if $$params{'qop'} ne 'auth' |
|
379
|
7 |
5 |
if $$params{'qop'} ne 'auth' |
|
394
|
1 |
7 |
unless ($self->_parse_challenge(\$challenge, 'client', $$self{'client_params'})) |
|
400
|
0 |
7 |
if (my(@missing) = grep({not exists $cparams{$_};} @client_required)) |
|
406
|
0 |
7 |
unless ($count == ++$$self{'nonce_counts'}{$cparams{'nonce'}}) |
|
412
|
1 |
6 |
unless ($self->is_qop_supported($qop)) |
|
418
|
0 |
6 |
unless ($username) |
|
424
|
0 |
6 |
if (exists $cparams{'authzid'} and $cparams{'authzid'} eq '') |
|
435
|
1 |
5 |
if ($cservice ne $self->service or $chost ne $self->host) |
|
441
|
0 |
5 |
unless (defined $self->callback('getsecret')) |
|
450
|
0 |
5 |
unless defined $password |
|
454
|
0 |
5 |
unless $self->_server_layer($qop) |
|
460
|
2 |
3 |
unless $expected eq $$self{'client_params'}{'response'} |
|
494
|
18 |
113 |
$is_array ? : |
|
518
|
65 |
52 |
if ($v =~ /^"(.*)"$/s) |
|
521
|
7 |
110 |
if (exists $multi{$type}{$k}) { } |
|
|
1 |
109 |
elsif (defined $$params{$k}) { } |
|
532
|
0 |
18 |
length $$challenge_ref ? : |
|
538
|
65 |
66 |
$is_client ? : |
|
540
|
0 |
131 |
if (not defined $v) { } |
|
|
73 |
58 |
elsif (exists $$qdval{$k}) { } |
|
557
|
0 |
5 |
if $maxssf < 0 |
|
559
|
0 |
5 |
if $minssf < 0 |
|
561
|
0 |
5 |
if $maxssf < $minssf |
|
564
|
0 |
5 |
if ($auth eq 'auth-conf' and $self->_select_cipher($minssf, $maxssf, $ciphers)) |
|
569
|
3 |
2 |
if ($auth eq 'auth-int') |
|
573
|
2 |
0 |
if ($auth eq 'auth') |
|
587
|
7 |
6 |
if /^auth$/ |
|
589
|
4 |
9 |
if /^auth-int$/ |
|
590
|
0 |
13 |
if /^auth-conf$/ |
|
596
|
0 |
7 |
if $maxssf < 0 |
|
598
|
0 |
7 |
if $minssf < 0 |
|
600
|
0 |
7 |
if $maxssf < $minssf |
|
606
|
7 |
0 |
if $minssf < 1 |
|
607
|
7 |
0 |
if $minssf <= 1 and $maxssf >= 1 |
|
608
|
7 |
0 |
if $maxssf > 1 |
|
616
|
0 |
7 |
if ($cmask & 4 and $self->_select_cipher($minssf, $maxssf, \@sciphers)) |
|
622
|
4 |
3 |
if ($cmask & 2) |
|
627
|
3 |
0 |
if ($cmask & 1) |
|
642
|
0 |
0 |
grep({$$c{'name'} eq $_;} @$ciphers) && $$c{'ssf'} >= $minssf && $$c{'ssf'} <= $maxssf ? : |
|
648
|
0 |
0 |
unless eval "require $$_{'pkg'}" |
|
664
|
0 |
0 |
unless $$self{'khc'} |
|
669
|
0 |
0 |
if ($bs > 1) |
|
685
|
0 |
0 |
if $len <= 16 |
|
691
|
0 |
0 |
if ($$self{'khs'}) |
|
695
|
0 |
0 |
unless $buf |
|
700
|
0 |
0 |
if ($$self{'khs'} and $$self{'cipher'}{'bs'} > 1) |
|
708
|
0 |
0 |
if $mac ne $check |
|
709
|
0 |
0 |
if unpack('N', $seqnum) != $$self{'rcvseqnum'} |
|
719
|
0 |
0 |
if ($bs <= 1) |
|
721
|
0 |
0 |
$d ? : |
|
727
|
0 |
0 |
$d ? : |
|
730
|
0 |
0 |
$d ? : |
|
734
|
0 |
0 |
$d ? : |