| line |
true |
false |
branch |
|
29
|
0 |
0 |
unless ($$params{'starttls'}) |
|
31
|
0 |
0 |
unless $self->HANDLESSL |
|
38
|
0 |
0 |
if $$self{'crypting'}++ |
|
40
|
0 |
0 |
unless $$self{'ssl'} = &Net::SSLeay::new($$self{'ctx'}) |
|
43
|
0 |
0 |
if ($$self{'params'}{'clientcertrequest'}) |
|
46
|
0 |
0 |
unless $$self{'params'}{'noblockbadclientcert'} |
|
60
|
0 |
0 |
$ok ? : |
|
|
0 |
0 |
if $$globalinfos[0] != 2 |
|
62
|
0 |
0 |
if (my $x = &Net::SSLeay::X509_STORE_CTX_get_current_cert($x509_store_ctx)) |
|
63
|
0 |
0 |
$getserial ? : |
|
75
|
0 |
0 |
$rv > 0 ? : |
|
|
0 |
0 |
$rv == 0 ? : |
|
76
|
0 |
0 |
if ($$self{'acceptstate'}) |
|
77
|
0 |
0 |
if $$self{'debug'} |
|
79
|
0 |
0 |
if ($$self{'acceptstate'} > 2) |
|
86
|
0 |
0 |
$err == Net::SSLeay::ERROR_WANT_WRITE() ? : |
|
|
0 |
0 |
$err == Net::SSLeay::ERROR_WANT_READ() ? : |
|
88
|
0 |
0 |
if $$self{'debug'} |
|
99
|
0 |
0 |
if ($$self{'crypting'}) { } |
|
102
|
0 |
0 |
unless exists $$self{'acceptstate'} |
|
104
|
0 |
0 |
if ($$self{'acceptstate'} < 3) |
|
106
|
0 |
0 |
if ($$self{'acceptstate'} < 3) |
|
107
|
0 |
0 |
unless $$self{'acceptstate'} |
|
109
|
0 |
0 |
if $$self{'debug'} |
|
117
|
0 |
0 |
unless (defined $$offset) |
|
121
|
0 |
0 |
if (defined $$buf) { } |
|
131
|
0 |
0 |
unless defined(my $read = &Net::SSLeay::read($$self{'ssl'}, $$len)) |
|
137
|
0 |
0 |
if ($$offset > $buf_len) |
|
147
|
0 |
0 |
defined $len ? : |
|
|
0 |
0 |
defined $offset ? : |
|
158
|
0 |
0 |
if ($$self{'crypting'}) { } |
|
160
|
0 |
0 |
unless (defined $offset) |
|
164
|
0 |
0 |
unless exists $$self{'acceptstate'} |
|
166
|
0 |
0 |
if ($$self{'acceptstate'} < 3) |
|
168
|
0 |
0 |
if ($$self{'acceptstate'} < 3) |
|
169
|
0 |
0 |
unless $$self{'acceptstate'} |
|
171
|
0 |
0 |
if $$self{'debug'} |
|
198
|
0 |
0 |
if (@_) { } |
|
209
|
0 |
0 |
if (defined $$self{'socket'}) |
|
215
|
0 |
0 |
if (exists $$self{'client'}) |
|
228
|
0 |
0 |
if (defined $$self{'socket'}) |