line |
true |
false |
branch |
63
|
0 |
0 |
if $line eq '-----BEGIN PGP SIGNATURE-----' |
64
|
0 |
0 |
if $line =~ /^---/ .. $line eq '' |
66
|
0 |
0 |
unless defined $file |
76
|
0 |
0 |
unless (-r $Module::Signature::SIGNATURE) |
81
|
0 |
0 |
unless (my $sigtext = _read_sigfile($Module::Signature::SIGNATURE)) |
86
|
0 |
0 |
unless (my($cipher_map) = _cipher_map($sigtext)) |
91
|
0 |
0 |
unless (defined(my $plaintext = _mkdigest($cipher_map))) |
98
|
0 |
0 |
if ($rv == 0) { } |
|
0 |
0 |
elsif ($rv == -3) { } |
|
0 |
0 |
elsif ($rv == -4) { } |
101
|
0 |
0 |
if (@{$mani;} or @{$file;}) { } |
106
|
0 |
0 |
if $Module::Signature::Verbose |
126
|
0 |
0 |
if $signature ne $Module::Signature::SIGNATURE |
128
|
0 |
0 |
if ($Module::Signature::AutoKeyRetrieve and not $Module::Signature::CanKeyRetrieve) |
129
|
0 |
0 |
unless (defined $Module::Signature::CanKeyRetrieve) |
135
|
0 |
0 |
$sock ? : |
136
|
0 |
0 |
if $sock |
141
|
0 |
0 |
if (my $version = _has_gpg()) { } |
|
0 |
0 |
elsif (eval {
do {
require Crypt::OpenPGP;
1
}
}) { } |
154
|
0 |
0 |
unless my $gpg = _which_gpg() |
155
|
0 |
0 |
unless `$gpg --version` =~ /GnuPG.*?(\S+)\s*$/m |
167
|
0 |
0 |
if (_legacy_extutils()) { } |
169
|
0 |
0 |
if (_public_maniskip()) { } |
176
|
0 |
0 |
unless $skip |
178
|
0 |
0 |
if ($ok ||= !(-e 'MANIFEST.SKIP') && _default_skip(@_)) |
190
|
0 |
0 |
unless $skip |
222
|
0 |
0 |
if /\bRCS\b/ or /\bCVS\b/ or /\B\.svn\b/ or /,v$/ or /^MANIFEST\.bak/ or /^Makefile$/ or m[^blib/] or /^MakeMaker-\d/ or /^pm_to_blib/ or /^blibdirs/ or m[^_build/] or /^Build$/ or /^pmfiles\.dat/ or /^MYMETA\./ or /~$/ or /\.old$/ or /\#$/ or /^\.#/ |
233
|
0 |
0 |
if $which_gpg |
237
|
0 |
0 |
if ($version and $version =~ /GnuPG/) |
247
|
0 |
0 |
if defined &Win32::GetShortPathName and $Module::Signature::SIGNATURE =~ m[[^-\w.:~\\/]] |
258
|
0 |
0 |
$Module::Signature::Verbose ? : |
259
|
0 |
0 |
$Module::Signature::AutoKeyRetrieve && $version ge '1.0.7' ? : |
|
0 |
0 |
$Module::Signature::KeyServer ? : |
269
|
0 |
0 |
if ($Module::Signature::Verbose) { } |
279
|
0 |
0 |
if ($?) { } |
|
0 |
0 |
elsif ($output =~ /((?: +[\dA-F]{4}){10,})/) { } |
287
|
0 |
0 |
if $? and $Module::Signature::AutoKeyRetrieve |
288
|
0 |
0 |
!$? ? : |
294
|
0 |
0 |
if $version ge '1.2.0' |
303
|
0 |
0 |
$Module::Signature::KeyServer ? : |
306
|
0 |
0 |
unless my $rv = $pgp->handle('Data', $sigtext) |
309
|
0 |
0 |
if not $rv->{'Validity'} and $Module::Signature::AutoKeyRetrieve |
311
|
0 |
0 |
if ($rv->{'Validity'}) { } |
313
|
0 |
0 |
if $Module::Signature::Verbose |
320
|
0 |
0 |
$rv->{'Validity'} ? : |
329
|
0 |
0 |
unless open D, "< $sigfile" |
331
|
0 |
0 |
if ($] >= 5.006 and readline(D) =~ /\r/) { } |
333
|
0 |
0 |
unless open D, '<', $sigfile |
337
|
0 |
0 |
unless open D, "< $sigfile" |
344
|
0 |
0 |
if (1 .. $_ eq $begin) |
345
|
0 |
0 |
if (not $found and /signed via the Module::Signature module, version ([0-9\.]+)\./) |
347
|
0 |
0 |
if (eval {
do {
require version;
'version'->parse($1) < 'version'->parse('0.82')
}
}) |
356
|
0 |
0 |
if $_ eq $end |
370
|
0 |
0 |
if $str1 eq $str2 |
372
|
0 |
0 |
if (eval {
do {
require Text::Diff;
1
}
}) { } |
379
|
0 |
0 |
unless open S, "< $Module::Signature::SIGNATURE" |
380
|
0 |
0 |
unless open D, "| diff -u --strip-trailing-cr $Module::Signature::SIGNATURE -" |
383
|
0 |
0 |
if 1 .. /^-----BEGIN PGP SIGNED MESSAGE-----/ |
384
|
0 |
0 |
if /^Hash: / .. /^$/ |
385
|
0 |
0 |
if 1 .. /^-----BEGIN PGP SIGNATURE/ |
386
|
0 |
0 |
if print D $str2, "-----BEGIN PGP SIGNATURE-----\n", $_ |
402
|
0 |
0 |
if (@{$mani;} or @{$file;}) |
407
|
0 |
0 |
if (not $overwrite and -e $Module::Signature::SIGNATURE and -t STDIN) |
410
|
0 |
0 |
unless readline(STDIN) =~ /[Yy]/ |
413
|
0 |
0 |
if (my $version = _has_gpg()) { } |
|
0 |
0 |
elsif (eval {
do {
require Crypt::OpenPGP;
1
}
}) { } |
430
|
0 |
0 |
if -e $sigfile and -d $sigfile || !(-w $sigfile) |
437
|
0 |
0 |
if $Module::Signature::AUTHOR |
438
|
0 |
0 |
unless open D, "| $gpg $set_key --clearsign --openpgp --personal-digest-preferences RIPEMD160 >> $sigfile.tmp" |
443
|
0 |
0 |
unless (-e "$sigfile.tmp" and -s "$sigfile.tmp") |
448
|
0 |
0 |
unless open D, "< $sigfile.tmp" |
450
|
0 |
0 |
unless (open S, "> $sigfile") |
470
|
0 |
0 |
if (/key ID ([0-9A-F]+)$/) { } |
|
0 |
0 |
elsif (/signature from "(.+)"$/) { } |
479
|
0 |
0 |
if (defined $key_id and defined $key_name) |
482
|
0 |
0 |
if (/^\(\d+\)/) { } |
|
0 |
0 |
elsif ($found_name) { } |
485
|
0 |
0 |
if (/key \Q$key_id\E/) |
491
|
0 |
0 |
if (/\Q$key_name\E/) |
497
|
0 |
0 |
unless ($found_key) |
511
|
0 |
0 |
unless my $ring = 'Crypt::OpenPGP::KeyRing'->new('Filename', $pgp->{'cfg'}->get('SecRing')) |
515
|
0 |
0 |
if $Module::Signature::AUTHOR |
518
|
0 |
0 |
if ($uid) { } |
519
|
0 |
0 |
unless $kb = $ring->find_keyblock_by_uid($uid) |
523
|
0 |
0 |
unless $kb = $ring->find_keyblock_by_index(-1) |
529
|
0 |
0 |
if $Module::Signature::Debug |
531
|
0 |
0 |
unless my $signature = $pgp->sign('Data', $plaintext, 'Detach', 0, 'Clearsign', 1, 'Armour', 1, 'Key', $cert, 'PassphraseCallback', \&Crypt::OpenPGP::_default_passphrase_cb) |
541
|
0 |
0 |
unless open D, "> $sigfile" |
549
|
0 |
0 |
unless ($server->find_keyblock_by_keyid($cert->key_id)) |
569
|
0 |
0 |
unless my $digest = _mkdigest_files(@_) |
573
|
0 |
0 |
if $file eq $Module::Signature::SIGNATURE |
587
|
0 |
0 |
unless my($base, $variant) = $algorithm =~ /^([_a-zA-Z]+)([0-9]+)$/g |
598
|
0 |
0 |
if eval {
do {
warn "Unknown cipher: $algorithm, please install Digest::$base, Digest::$base$variant, or Digest::${base}::PurePerl\n"
}
} |
600
|
0 |
0 |
unless (my $obj = eval {
do {
'Digest'->new($algorithm)
}
} || eval {
do {
require "Digest/$base.pm";
"Digest::$base"->new($variant)
}
} || eval {
do {
require "Digest/$algorithm.pm";
"Digest::$algorithm"->new
}
} || eval {
do {
require "Digest/$base/PurePerl.pm";
"Digest::${base}::PurePerl"->new($variant)
}
} || eval {
do {
require "Digest/$algorithm/PurePerl.pm";
"Digest::${algorithm}::PurePerl"->new
}
} or do {
return if eval {
do {
warn "Unknown cipher: $algorithm, please install Digest::$base, Digest::$base$variant, or Digest::${base}::PurePerl\n"
}
}
}) |
614
|
0 |
0 |
if $file eq $Module::Signature::SIGNATURE |
616
|
0 |
0 |
if ($verify_map) { } |
617
|
0 |
0 |
if (my $vmf = $verify_map->{$file}) { } |
619
|
0 |
0 |
if ($this_cipher eq $Module::Signature::Cipher) { } |
632
|
0 |
0 |
if $Module::Signature::Debug |
633
|
0 |
0 |
if ($dosnames) |
638
|
0 |
0 |
if (exists $found->{$file}) { } |
639
|
0 |
0 |
if $Module::Signature::Verbose |
643
|
0 |
0 |
unless open F, "< $file" |
644
|
0 |
0 |
if ($Module::Signature::LegacySigFile) { } |
645
|
0 |
0 |
if (-B $file) { } |
657
|
0 |
0 |
if (not length $eol) { } |
661
|
0 |
0 |
if (grep /[\015\012]/, @lines) { } |
664
|
0 |
0 |
$eol eq "\n" ? : |
670
|
0 |
0 |
if ($verify_digest) { } |
671
|
0 |
0 |
if ($this_hexdigest eq $verify_digest) |
681
|
0 |
0 |
-B $file ? : |