line |
true |
false |
branch |
40
|
0 |
0 |
if (defined $self->[$EVENT_FLUSHED]) |
62
|
0 |
0 |
if (checkForDoSendback($_[10])) { } |
63
|
0 |
0 |
unless (defined $$temp_flushed_event) |
79
|
0 |
0 |
if ($_[3]{'self'}{'PreFilter'}) |
81
|
0 |
0 |
unless $_[3]{'self'}{'PreFilter' . ref($self) . $self->[16]} |
82
|
0 |
0 |
if ($type eq 'input') { } |
107
|
0 |
0 |
if ($self->[$PATCH]) |
111
|
0 |
0 |
if ($self->[$HANDSHAKE]) |
150
|
0 |
0 |
if (@$return) |
157
|
0 |
0 |
if checkForDoSendback($return) and $return->[0] eq $filter |
159
|
0 |
0 |
unless $exchanged |
166
|
0 |
0 |
exists $self->[0][0] ? : |
173
|
0 |
0 |
if (checkForDoSendback($data)) |
175
|
0 |
0 |
if ($data->[0] eq $filter) |
181
|
0 |
0 |
if ($found) { } |
184
|
0 |
0 |
unless $ok or $filter eq $data->[0] and checkForDoSendback($data) |
187
|
0 |
0 |
unless @$data |
204
|
0 |
0 |
if ref $chunks eq 'ARRAY' and scalar @$chunks |
206
|
0 |
0 |
if &blessed($chunks) and $chunks->can('DOSENDBACK') and $chunks->DOSENDBACK |
216
|
0 |
0 |
unless $x509result = &Net::SSLeay::PEM_read_bio_X509($bio) |
227
|
0 |
0 |
unless $evp_pkey = &Net::SSLeay::PEM_read_bio_PrivateKey($bio) |
238
|
0 |
0 |
if $err and $err != 1 |
241
|
0 |
0 |
if $err and $err != 1 |
249
|
0 |
0 |
if $debug |
251
|
0 |
0 |
if $sent != length $data |
263
|
0 |
0 |
if $self->{'cacrl'} |
271
|
0 |
0 |
$params->{'tls1_2'} ? : |
|
0 |
0 |
$params->{'tls'} || $params->{'tls1_2'} ? : |
276
|
0 |
0 |
unless $self->{'client'} or $params->{'nohonor'} |
279
|
0 |
0 |
if ($params->{'chain'}) { } |
281
|
0 |
0 |
if $err and $err != 1 |
284
|
0 |
0 |
if ($params->{'keymem'}) { } |
287
|
0 |
0 |
if $self->{'debug'} |
291
|
0 |
0 |
if $self->{'debug'} |
293
|
0 |
0 |
if $err and $err != 1 |
295
|
0 |
0 |
if ($params->{'crtmem'}) { } |
299
|
0 |
0 |
if $self->{'debug'} |
304
|
0 |
0 |
if $self->{'debug'} |
306
|
0 |
0 |
if $err and $err != 1 |
311
|
0 |
0 |
if ($params->{'cacrt'} or $params->{'cacrtmem'}) |
313
|
0 |
0 |
if ($params->{'cacrtmem'}) { } |
314
|
0 |
0 |
if (ref $params->{'cacrtmem'} eq 'ARRAY') { } |
318
|
0 |
0 |
unless $err |
323
|
0 |
0 |
if $self->{'debug'} |
328
|
0 |
0 |
if $self->{'debug'} |
329
|
0 |
0 |
unless $err and $err == 1 |
332
|
0 |
0 |
if $self->{'debug'} |
334
|
0 |
0 |
unless $err and $err == 1 |
337
|
0 |
0 |
if $err and $err != 1 |
342
|
0 |
0 |
if $params->{'cipher'} |
343
|
0 |
0 |
if $err and $err != 1 |
347
|
0 |
0 |
unless $self->{'rbio'} = &Net::SSLeay::BIO_new(scalar &Net::SSLeay::BIO_s_mem()) |
349
|
0 |
0 |
unless $self->{'wbio'} = &Net::SSLeay::BIO_new(scalar &Net::SSLeay::BIO_s_mem()) |
353
|
0 |
0 |
if $err and $err != 1 |
356
|
0 |
0 |
if ($params->{'dhcert'} or $params->{'dhcertmem'}) |
359
|
0 |
0 |
if ($params->{'dhcertmem'}) { } |
363
|
0 |
0 |
unless -s $params->{'dhcert'} and $dhbio = &Net::SSLeay::BIO_new_file($params->{'dhcert'}, 'r') |
368
|
0 |
0 |
if $self->{'debug'} |
371
|
0 |
0 |
if SSL_set_tmp_dh($self->{'ssl'}, $dhret) < 0 |
373
|
0 |
0 |
if $self->{'debug'} |
381
|
0 |
0 |
unless SSL_CTX_set_tmp_rsa($self->{'context'}, $rsa) |
383
|
0 |
0 |
if $self->{'debug'} |
388
|
0 |
0 |
if $params->{'clientcert'} |
390
|
0 |
0 |
if $params->{'blockbadclientcert'} |
394
|
0 |
0 |
$params->{'blockbadclientcert'} ? : |
|
0 |
0 |
if $debug |
396
|
0 |
0 |
if ($params->{'sni'}) |
399
|
0 |
0 |
if $self->{'debug'} |
400
|
0 |
0 |
if $err and $err != 1 |
411
|
0 |
0 |
if $debug |
412
|
0 |
0 |
$ok ? : |
|
0 |
0 |
if $POE::Filter::SSL::globalinfos->[0] != 2 |
420
|
0 |
0 |
if (my $x = &Net::SSLeay::X509_STORE_CTX_get_current_cert($x509_store_ctx)) |
436
|
0 |
0 |
if $debug |
437
|
0 |
0 |
$self->{'accepted'} ? : |
443
|
0 |
0 |
if $debug |
445
|
0 |
0 |
if $self->doSSL or $self->{'buffer'} |
447
|
0 |
0 |
if $data |
448
|
0 |
0 |
if $debug |
453
|
0 |
0 |
if $debug |
457
|
0 |
0 |
if $self->doSSL or $self->{'buffer'} |
459
|
0 |
0 |
if $debug |
462
|
0 |
0 |
if $debug |
470
|
0 |
0 |
if $debug |
473
|
0 |
0 |
if ($self->{'accepted'}) |
474
|
0 |
0 |
if (defined $self->{'sendbuf'}) |
482
|
0 |
0 |
if ref $data eq 'POE::Filter::SSL' |
483
|
0 |
0 |
if $debug |
484
|
0 |
0 |
if ($self->{'accepted'}) { } |
487
|
0 |
0 |
if $data |
490
|
0 |
0 |
if $self->{'buffer'} |
498
|
0 |
0 |
if ((my $sent = &Net::SSLeay::write($self->{'ssl'}, $data)) != length $data) |
509
|
0 |
0 |
if ((my $sent = &Net::SSLeay::BIO_write($self->{'rbio'}, $data)) != length $data) |
513
|
0 |
0 |
unless $nodoSSL |
523
|
0 |
0 |
if $debug |
524
|
0 |
0 |
unless ($self->{'accepted'}) |
527
|
0 |
0 |
$self->{'client'} ? : |
528
|
0 |
0 |
if ($err == 1) { } |
536
|
0 |
0 |
unless ($err2 == Net::SSLeay::ERROR_WANT_READ()) |
537
|
0 |
0 |
$self->{'client'} ? : |
539
|
0 |
0 |
if ($err3 = &Net::SSLeay::ERR_get_error()) { } |
544
|
0 |
0 |
if (defined $self->{'errorhandler'}) { } |
545
|
0 |
0 |
if (ref $self->{'errorhandler'} eq 'CODE') { } |
|
0 |
0 |
elsif (lc $self->{'errorhandler'} eq 'ignore') { } |
|
0 |
0 |
elsif (lc $self->{'errorhandler'} eq 'carp') { } |
|
0 |
0 |
elsif (lc $self->{'errorhandler'} eq 'confess') { } |
|
0 |
0 |
elsif (lc $self->{'errorhandler'} eq 'carponetime') { } |
560
|
0 |
0 |
unless $self->{'errorstat'}{$err or '-'}{$err2 or '-'}{$err3 or '-'}++ |
566
|
0 |
0 |
unless $self->{'accepted'}++ |
573
|
0 |
0 |
if $debug |
590
|
0 |
0 |
if (defined $self->{'cacrl'}) |
591
|
0 |
0 |
$self->clientCertNotOnCRL($self->{'cacrl'}) ? : |
593
|
0 |
0 |
$self->clientCertExists ? : |
598
|
0 |
0 |
$self->clientCertExists ? : |
605
|
0 |
0 |
if (scalar @certids) |
609
|
0 |
0 |
if $self->{'debug'} |
612
|
0 |
0 |
if $crlstatus |
613
|
0 |
0 |
!($crlstatus =~ /^CRL:/) ? : |
|
0 |
0 |
$crlstatus ? : |
615
|
0 |
0 |
if (ref $_ eq 'ARRAY') { } |
616
|
0 |
0 |
if ($self->{'debug'}) |
617
|
0 |
0 |
if $t |
624
|
0 |
0 |
if $self->{'debug'} |
628
|
0 |
0 |
if $self->{'debug'} |
629
|
0 |
0 |
unless $badcrls |
643
|
0 |
0 |
if $self->{'ssl'} |
645
|
0 |
0 |
if $self->{'context'} |