| line |
true |
false |
branch |
|
29
|
5 |
5 |
unless ($pack->{'data'}) |
|
30
|
0 |
5 |
$ssh->protocol == &PROTOCOL_SSH2() ? : |
|
32
|
5 |
0 |
if ($pack->{'type'}) |
|
45
|
4 |
4 |
if (my $packet = $class->read_poll($ssh)) |
|
52
|
0 |
4 |
if $len == 0 |
|
53
|
0 |
4 |
unless (defined $len) |
|
54
|
0 |
0 |
if $! == 11 or $! == 11 |
|
70
|
0 |
9 |
if ($ssh->protocol == &PROTOCOL_SSH2()) { } |
|
78
|
4 |
5 |
unless $packet |
|
81
|
0 |
5 |
if ($ssh->protocol == &PROTOCOL_SSH2()) { } |
|
82
|
0 |
0 |
if ($type == &SSH2_MSG_DISCONNECT()) |
|
88
|
1 |
4 |
if ($type == &SSH_MSG_DISCONNECT()) |
|
93
|
0 |
4 |
if ($type == $debug) { } |
|
|
0 |
4 |
elsif ($type == $ignore) { } |
|
107
|
0 |
9 |
unless (defined &Net::SSH::Perl::Packet::_crc32) |
|
109
|
0 |
0 |
if $@ |
|
113
|
4 |
5 |
if $incoming->length < 12 |
|
116
|
0 |
5 |
unless defined $len |
|
118
|
0 |
5 |
if $incoming->length < 4 + $pad_len |
|
125
|
0 |
5 |
if (my $cipher = $ssh->receive_cipher) |
|
135
|
0 |
5 |
unless $crc == $stored_crc |
|
140
|
0 |
5 |
if (my $comp = $ssh->compression) |
|
159
|
0 |
0 |
if ($kex) |
|
163
|
0 |
0 |
if $authlen = $ciph && $ciph->authlen |
|
165
|
0 |
0 |
$mac && $mac->enabled ? : |
|
166
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
167
|
0 |
0 |
$mac && $mac->enabled && $mac->etm || $authlen ? : |
|
171
|
0 |
0 |
unless ($ssh->{'session'}{'_last_packet_length'}) |
|
172
|
0 |
0 |
if $incoming->length < $block_size |
|
175
|
0 |
0 |
if ($authlen) { } |
|
|
0 |
0 |
elsif ($aadlen) { } |
|
181
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
189
|
0 |
0 |
if ($plen < 5 or $plen > 262144) |
|
194
|
0 |
0 |
$aadlen ? : |
|
195
|
0 |
0 |
if $need % $block_size |
|
197
|
0 |
0 |
if $aadlen and $incoming->length < $aadlen + $need + $maclen + $authlen or not $aadlen and $incoming->length < $need + $block_size + $maclen |
|
202
|
0 |
0 |
if ($mac and $mac->enabled) { } |
|
|
0 |
0 |
elsif ($authlen) { } |
|
203
|
0 |
0 |
if ($mac->etm) { } |
|
221
|
0 |
0 |
if ($mac and $mac->enabled) { } |
|
222
|
0 |
0 |
unless ($mac->etm) |
|
223
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
228
|
0 |
0 |
unless $macbuf eq $stored_mac |
|
231
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
|
0 |
0 |
if $mac->etm |
|
234
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
241
|
0 |
0 |
unless $padlen >= 4 |
|
248
|
0 |
0 |
if ($comp and $comp->enabled) |
|
263
|
1 |
0 |
if ($pack->type != $type) |
|
264
|
0 |
1 |
if ($pack->type == &SSH2_MSG_GLOBAL_REQUEST()) { } |
|
279
|
0 |
5 |
if ($pack->{'ssh'}->protocol == &PROTOCOL_SSH2()) { } |
|
292
|
1 |
4 |
unless (defined &Net::SSH::Perl::Packet::_crc32) |
|
296
|
0 |
5 |
if ($buffer->length >= &MAX_PACKET_SIZE() - 30) |
|
302
|
0 |
5 |
if (my $comp = $ssh->compression) |
|
320
|
0 |
5 |
$cipher ? : |
|
334
|
0 |
0 |
if ($kex) |
|
338
|
0 |
0 |
if $authlen = $ciph && $ciph->authlen |
|
340
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
341
|
0 |
0 |
$mac && $mac->enabled && $mac->etm || $authlen ? : |
|
344
|
0 |
0 |
if ($comp and $comp->enabled) |
|
352
|
0 |
0 |
if $padlen < 4 |
|
353
|
0 |
0 |
$ciph ? : |
|
358
|
0 |
0 |
unless $mac and $mac->etm |
|
360
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
361
|
0 |
0 |
if $mac and $mac->etm |
|
364
|
0 |
0 |
if ($mac and $mac->enabled) |
|
365
|
0 |
0 |
$mac->etm ? : |
|
371
|
0 |
0 |
if $mac and $mac->enabled |
|
381
|
0 |
11 |
if @_ |
|
391
|
10 |
4 |
if $meth eq "DESTROY" |
|
393
|
4 |
0 |
if ($pack->{'data'}->can($meth)) { } |