line |
true |
false |
branch |
42
|
3 |
9 |
unless my($subtype, $alg, $id, $version, $m_cost, $t_cost, $parallel, $encoded_salt, $encoded_hash) = $pwhash =~ /$regex/x |
52
|
1 |
1 |
if (my($subtype, $alg, $id, $version, $m_cost, $t_cost, $parallel, $salt, $hash) = _unpack_hash($input)) { } |
|
1 |
0 |
elsif (($subtype, $version, $m_cost, $t_cost, $parallel, my $encoded_salt, my $encoded_hash) = $input =~ /$unencrypted_regex/x) { } |
53
|
0 |
1 |
if $id eq $to and $alg eq $self->{'cipher'} |
81
|
1 |
4 |
unless my($subtype, $alg, $id, $version, $m_cost, $t_cost, $parallel, $salt, $hash) = _unpack_hash($pwhash) |
82
|
1 |
3 |
if $pwhash ne _pack_hash(@{$self;}{"subtype", "cipher", "active", "memory_cost", "time_cost", "parallelism"}, $salt, $hash) |
93
|
4 |
1 |
if (my($subtype, $alg, $id, $version, $m_got, $t_got, $parallel_got, $salt, $hash) = _unpack_hash($pwhash)) { } |
|
1 |
0 |
elsif ($pwhash =~ /$unencrypted_regex/x) { } |
94
|
0 |
4 |
unless my $raw = eval {
do {
argon2_raw($subtype, $password, $salt, $t_got, $m_got, $parallel_got, length $hash)
}
} |
95
|
0 |
4 |
unless my $decrypted = eval {
do {
$self->decrypt_hash($alg, $id, $salt, $hash)
}
} |