| line |
true |
false |
branch |
|
56
|
0 |
0 |
if ($type ne 'recent' and $type ne 'modified' and $type ne 'others' and $type ne 'all') |
|
63
|
0 |
0 |
if ($type eq 'all') |
|
73
|
0 |
0 |
unless my $fc = 'Metabrik::File::Compress'->new_from_brik_init($self) |
|
75
|
0 |
0 |
if ($type eq 'recent') { } |
|
|
0 |
0 |
elsif ($type eq 'modified') { } |
|
|
0 |
0 |
elsif ($type eq 'others') { } |
|
80
|
0 |
0 |
unless $self->mirror($uri, $gz, $datadir) |
|
81
|
0 |
0 |
unless my $files = $fc->uncompress($output, $xml, $datadir) |
|
89
|
0 |
0 |
unless $self->mirror($uri, $gz, $datadir) |
|
90
|
0 |
0 |
unless my $files = $fc->uncompress($output, $xml, $datadir) |
|
100
|
0 |
0 |
unless $self->mirror($uri, $gz, $datadir) |
|
101
|
0 |
0 |
unless my $files = $fc->uncompress($output, $xml, $datadir) |
|
116
|
0 |
0 |
unless (defined $old) |
|
124
|
0 |
0 |
if (exists $old->{'entry'}{$k}) { } |
|
127
|
0 |
0 |
if ($type eq 'recent' or $type eq 'modified') |
|
147
|
0 |
0 |
if ($type ne 'recent' and $type ne 'modified' and $type ne 'others' and $type ne 'all') |
|
154
|
0 |
0 |
if ($type eq 'all') |
|
155
|
0 |
0 |
unless $self->load('recent') |
|
156
|
0 |
0 |
unless $self->load('modified') |
|
162
|
0 |
0 |
unless my $fx = 'Metabrik::File::Xml'->new_from_brik_init($self) |
|
166
|
0 |
0 |
if ($type eq 'recent') { } |
|
|
0 |
0 |
elsif ($type eq 'modified') { } |
|
|
0 |
0 |
elsif ($type eq 'others') { } |
|
170
|
0 |
0 |
unless my $new = $fx->read($file) |
|
180
|
0 |
0 |
unless my $new = $fx->read($file) |
|
188
|
0 |
0 |
defined $year ? : |
|
228
|
0 |
0 |
unless $self->brik_help_run_undef_arg('print', $h) |
|
229
|
0 |
0 |
unless $self->brik_help_run_invalid_arg('print', $h, 'HASH') |
|
243
|
0 |
0 |
unless $self->brik_help_run_undef_arg('to_hash', $h) |
|
244
|
0 |
0 |
unless $self->brik_help_run_invalid_arg('to_hash', $h, 'HASH') |
|
258
|
0 |
0 |
if (defined $h->{'vuln:vulnerable-software-list'} and defined $h->{'vuln:vulnerable-software-list'}{'vuln:product'}) |
|
261
|
0 |
0 |
if (ref $e eq 'ARRAY') { } |
|
287
|
0 |
0 |
unless $self->brik_help_run_undef_arg('load', $xml) |
|
290
|
0 |
0 |
unless (defined $entries) |
|
308
|
0 |
0 |
unless $self->brik_help_run_undef_arg('load', $xml) |
|
309
|
0 |
0 |
unless $self->brik_help_run_undef_arg('cve_search', $pattern) |
|
312
|
0 |
0 |
unless (defined $entries) |
|
320
|
0 |
0 |
if ($this->{'cve_id'} =~ /$pattern/ or $this->{'summary'} =~ /$pattern/i) |
|
334
|
0 |
0 |
unless $self->brik_help_run_undef_arg('load', $xml) |
|
335
|
0 |
0 |
unless $self->brik_help_run_undef_arg('cpe_search', $cpe) |
|
338
|
0 |
0 |
unless (defined $entries) |
|
347
|
0 |
0 |
if ($vuln_product =~ /$cpe/i) |
|
363
|
0 |
0 |
unless $self->brik_help_run_undef_arg('load', $xml) |
|
365
|
0 |
0 |
if (defined $xml->{'entry'}) |