line |
!l |
l&&!r |
l&&r |
condition |
401
|
0 |
0 |
0 |
defined $value and not $value =~ /^$/
|
421
|
0 |
0 |
0 |
defined $value and not $value =~ /^$/
|
441
|
0 |
0 |
0 |
defined $value and not $value =~ /^$/
|
463
|
0 |
0 |
305 |
defined $value and not $value =~ /^$/
|
671
|
0 |
1 |
0 |
$self->{'main'}->UNIVERSAL::can('time_method') && $self->{'main'}->time_method('dkim_load_modules')
|
718
|
0 |
0 |
0 |
$sig->UNIVERSAL::can("check_expiration") and not $sig->check_expiration
|
721
|
0 |
0 |
0 |
$minimum_key_bits and $sig->{'_spamassassin_key_size'}
|
|
0 |
0 |
0 |
$minimum_key_bits and $sig->{'_spamassassin_key_size'} and $sig->{'_spamassassin_key_size'} < $minimum_key_bits
|
790
|
0 |
81 |
0 |
defined $suppl_attrib and exists $suppl_attrib->{'dkim_signatures'}
|
809
|
0 |
4 |
0 |
$self->{'main'}->UNIVERSAL::can('time_method') && $self->{'main'}->time_method('check_dkim_signature')
|
813
|
0 |
0 |
4 |
$edns and $edns >= 1024
|
873
|
4 |
0 |
0 |
@signatures and $pms->{'tests_already_hit'}{'__TRUNCATED'}
|
891
|
0 |
0 |
0 |
$valid and $signature->UNIVERSAL::can("check_expiration")
|
896
|
0 |
0 |
0 |
$valid and not $expired
|
|
0 |
0 |
0 |
$valid and not $expired and $minimum_key_bits
|
898
|
0 |
0 |
0 |
$pk and $pk->cork
|
904
|
0 |
0 |
0 |
$valid and not $expired
|
914
|
0 |
0 |
0 |
$valid and not $expired
|
|
0 |
0 |
0 |
$valid and not $expired and $key_size
|
|
0 |
0 |
0 |
$valid and not $expired and $key_size and $key_size >= $minimum_key_bits
|
933
|
0 |
0 |
0 |
defined $d && $pms->{'dkim_author_domains'}{$d}
|
949
|
0 |
0 |
0 |
defined $_ && $_ ne '' && !$seen1{$_}++
|
951
|
0 |
0 |
0 |
defined $_ && $_ ne '' && !$seen2{$_}++
|
953
|
0 |
0 |
0 |
defined $_ && $_ ne '' && !$seen3{$_}++
|
964
|
0 |
0 |
0 |
$sig_result_supported && $sig
|
1008
|
4 |
0 |
0 |
$pms->{'dkim_has_any_author_sig'}{$author_domain} and not $pms->{'dkim_signatures_dependable'}
|
1068
|
0 |
4 |
0 |
$self->{'main'}->UNIVERSAL::can('time_method') && $self->{'main'}->time_method('check_dkim_adsp')
|
1248
|
0 |
0 |
0 |
$valid and $signature->UNIVERSAL::can("check_expiration")
|
1252
|
0 |
0 |
0 |
$valid and not $expired
|
|
0 |
0 |
0 |
$valid and not $expired and $minimum_key_bits
|
1254
|
0 |
0 |
0 |
$key_size and $key_size < $minimum_key_bits
|
line |
l |
!l&&r |
!l&&!r |
condition |
143
|
0 |
63 |
0 |
ref $class || $class
|
610
|
0 |
0 |
0 |
$author_domains{$doms} or grep {/\.\Q$doms\E\z/s;} keys %author_domains
|
653
|
0 |
0 |
0 |
$pms->{'dkim_match_in_whitelist_from_dkim'} || $pms->{'dkim_match_in_whitelist_auth'}
|
660
|
0 |
0 |
0 |
$pms->{'dkim_match_in_def_whitelist_from_dkim'} || $pms->{'dkim_match_in_def_whitelist_auth'}
|
735
|
0 |
0 |
0 |
$sdid eq $d or $sdid =~ /\.\Q$d\E\z/s
|
1104
|
0 |
0 |
4 |
not defined $sp or $sp eq ""
|
1164
|
0 |
0 |
0 |
$self->check_dkim_valid($pms) or would_log("dbg", "dkim")
|
1276
|
0 |
0 |
0 |
not defined $acceptable_sdid or $acceptable_sdid eq ""
|
1317
|
0 |
0 |
0 |
not $valid or $expired
|
|
0 |
0 |
0 |
not $valid or $expired or $key_size_weak
|