| line |
!l |
l&&!r |
l&&r |
condition |
|
88
|
0 |
0 |
87 |
defined &Net::SSLeay::P_next_proto_negotiated && !&Net::SSLeay::constant('LIBRESSL_VERSION_NUMBER') |
|
93
|
0 |
0 |
0 |
defined &Net::SSLeay::CTX_set_tmp_ecdh && ($openssl_version != 268439631 || length pack('P', 0) == 4) |
|
106
|
0 |
0 |
87 |
$can_ecdh && $openssl_version >= 268443648 |
|
108
|
0 |
0 |
87 |
defined &Net::SSLeay::OCSP_cert2ids && ($netssleay_version < 1.75 || $netssleay_version > 1.77) |
|
111
|
0 |
0 |
87 |
$can_ocsp && defined &Net::SSLeay::set_tlsext_status_type |
|
113
|
0 |
0 |
87 |
defined &Net::SSLeay::CTX_set_tlsext_ticket_getkey_cb && $netssleay_version >= 1.8 |
|
124
|
0 |
0 |
87 |
$session_upref and defined &Net::SSLeay::CTX_sess_set_new_cb |
|
|
0 |
0 |
87 |
$session_upref and defined &Net::SSLeay::CTX_sess_set_new_cb and defined &Net::SSLeay::CTX_sess_set_remove_cb |
|
133
|
0 |
0 |
87 |
defined &Net::SSLeay::CTX_get0_param && eval {
do {
Net::SSLeay::X509_V_FLAG_PARTIAL_CHAIN()
}
} |
|
533
|
52 |
0 |
0 |
not %default_ca and do {
local $SIG{'__DIE__'};
eval {
do {
require Mozilla::CA;
1
}
}
} |
|
656
|
0 |
0 |
72 |
$IOCLASS eq "IO::Socket::IP" and not defined $arg_hash->{'GetAddrInfoFlags'} |
|
661
|
125 |
0 |
2 |
defined $blocking and not $blocking |
|
728
|
82 |
0 |
15 |
defined $sh and not $sh |
|
747
|
195 |
0 |
0 |
$args->{'SSL_usebio'} and not $biosock |
|
837
|
183 |
5 |
7 |
$ctx->{'session_cache'} and my $session = $ctx->{'session_cache'}->get_session($arg_hash->{'SSL_session_key'}) |
|
851
|
186 |
0 |
11 |
defined $timeout and $timeout > 0 |
|
|
186 |
0 |
11 |
defined $timeout and $timeout > 0 and $self->blocking(0) |
|
861
|
186 |
0 |
11 |
defined $timeout && time |
|
872
|
34 |
17 |
12 |
not $err and $dobio |
|
965
|
160 |
0 |
0 |
not %sess_cb and $ctx->{'session_cache'} |
|
|
0 |
0 |
0 |
not %sess_cb and $ctx->{'session_cache'} and my $session = &Net::SSLeay::get1_session($ssl) |
|
1016
|
48 |
0 |
19 |
defined $sh and not $sh |
|
1034
|
0 |
0 |
0 |
$usebio and not $biosock |
|
1046
|
78 |
9 |
48 |
@_ && UNIVERSAL::isa($_[0], 'IO::Handle') |
|
1084
|
121 |
0 |
14 |
defined $timeout and $timeout > 0 |
|
|
121 |
0 |
14 |
defined $timeout and $timeout > 0 and $socket->blocking(0) |
|
1093
|
121 |
0 |
14 |
defined $timeout && time |
|
1103
|
17 |
21 |
6 |
not $err and $dobio |
|
1293
|
0 |
0 |
0 |
$ssleay_set_msg_callback and my $ssl = do {
*$self
}->{'_SSL_object'} |
|
1304
|
492 |
0 |
212 |
@_ and $auto_retry |
|
1334
|
16 |
8 |
0 |
not $! and $err == $Net_SSLeay_ERROR_SSL || $err == $Net_SSLeay_ERROR_SYSCALL |
|
1400
|
2 |
1 |
0 |
$biosock and UNIVERSAL::can($biosock, "peek") |
|
1415
|
0 |
0 |
6 |
!$rc && do {
*$self
}->{'_SSL_object'} |
|
1435
|
2 |
1 |
6132 |
!$rc && do {
*$self
}->{'_SSL_object'} |
|
1452
|
1 |
5 |
87 |
!$rc && do {
*$self
}->{'_SSL_object'} |
|
1460
|
5 |
0 |
0 |
$fd and UNIVERSAL::can($fd, "peek") |
|
1487
|
63 |
0 |
0 |
not $written and $errs |
|
1522
|
0 |
0 |
64 |
!$wc && do {
*$self
}->{'_SSL_object'} |
|
1545
|
5 |
1 |
9251 |
!$wc && do {
*$self
}->{'_SSL_object'} |
|
1652
|
24 |
0 |
62 |
$pending and (my $pb = &Net::SSLeay::peek($ssl, $pending)) ne "" |
|
1686
|
3 |
57 |
2 |
$eod and $delim1 eq '' || $eod < length $buf |
|
1741
|
113 |
28 |
49 |
$status & 1 and $status & 2 || $stop_args->{'SSL_fast_shutdown'} |
|
1765
|
1 |
0 |
2 |
not $err and $dobio |
|
1817
|
256 |
0 |
2 |
$stop_args->{'SSL_ctx_free'} and my $ctx = delete do {
*$self
}->{'_SSL_ctx'} |
|
1861
|
24 |
316 |
306 |
$keys->{'_SSL_object'} and my $ssl = do {
*$self
}->{'_SSL_object'} |
|
1868
|
88 |
526 |
32 |
$keys->{'_SSL_certificate'} and my $cert = delete do {
*$self
}->{'_SSL_certificate'} |
|
1880
|
339 |
4 |
303 |
$untie and not do {
*$self
}->{'_SSL_bio_socket'} |
|
1904
|
0 |
0 |
0 |
$ctx_object && $ctx_object->{'context'} |
|
2001
|
0 |
0 |
0 |
@chain and not $self->peer_certificate |
|
2042
|
75 |
0 |
0 |
$reload and do {
*$self
}->{'_SSL_certificate'} |
|
2224
|
106 |
66 |
116 |
$wtyp eq "anywhere" and $name =~ /^([a-zA-Z0-9_\-]*)\*(.+)/ |
|
|
76 |
70 |
26 |
$wtyp =~ /^(?:full_label|leftmost)$/ and $name =~ /^\*(\..+)$/ |
|
2225
|
82 |
30 |
4 |
$1 ne "" and substr($identity, 0, 4) eq "xn--" |
|
2248
|
248 |
46 |
53 |
$ipn and $type == GEN_IPADD() |
|
|
46 |
47 |
201 |
not $ipn and $type == GEN_DNS() |
|
2261
|
0 |
14 |
87 |
$scheme->{'check_cn'} eq "when_only" and not $alt_dnsNames |
|
2359
|
0 |
0 |
52 |
ref $self && do {
*$self
}->{'_SSL_last_err'} |
|
2368
|
50 |
0 |
1 |
defined $error_trap and ref $error_trap eq "CODE" |
|
2405
|
83 |
2 |
17 |
not ref $self and $CURRENT_SSL_OBJECT |
|
2567
|
1 |
4 |
0 |
IO::Handle::opened($self) && do {
*$self
}->{'_SSL_opened'} |
|
2683
|
100 |
177 |
6 |
not $is_server || defined $arg_hash->{'SSL_use_cert'} and grep {$arg_hash->{$_};} "SSL_cert", "SSL_cert_file" |
|
|
277 |
0 |
6 |
not $is_server || defined $arg_hash->{'SSL_use_cert'} and grep {$arg_hash->{$_};} "SSL_cert", "SSL_cert_file" and grep {$arg_hash->{$_};} "SSL_key", "SSL_key_file" |
|
2713
|
1943 |
321 |
0 |
defined $arg_hash->{$_} and $arg_hash->{$_} eq "" |
|
2736
|
98 |
82 |
103 |
not $is_server and $verify_mode & 1 |
|
|
180 |
61 |
42 |
not $is_server and $verify_mode & 1 and !$vcn_scheme || $vcn_scheme ne 'none' |
|
2777
|
98 |
0 |
0 |
$arg_hash->{'SSL_ticket_keycb'} and not $can_tckt_keycb |
|
2795
|
283 |
0 |
0 |
$ver and $v ne $ver |
|
2858
|
26 |
250 |
20 |
$ver eq "SSLv23" and not $ssl_op & $SSL_OP_NO{'SSLv3'} |
|
2874
|
184 |
103 |
9 |
$arg_hash->{'SSL_server'} and my $id = $arg_hash->{'SSL_session_id_context'} || $arg_hash->{'SSL_verify_mode'} & 1 && "$ctx" |
|
2964
|
117 |
0 |
0 |
ref $file eq "SCALAR" and not $$file |
|
2966
|
117 |
0 |
0 |
ref $dir eq "SCALAR" and not $$dir |
|
2976
|
34 |
83 |
0 |
$file || $dir and not &Net::SSLeay::CTX_load_verify_locations($ctx, scalar($file || ''), scalar($dir || '')) |
|
2986
|
179 |
0 |
0 |
not &Net::SSLeay::CTX_load_verify_locations($ctx, scalar($ca{'SSL_ca_file'} || ''), scalar($dir || '')) and $verify_mode != $Net_SSLeay_VERIFY_NONE |
|
2994
|
184 |
103 |
9 |
$is_server and $verify_mode & $Net_SSLeay_VERIFY_PEER |
|
3064
|
1 |
0 |
1 |
not $cert and $arg_hash->{'SSL_passwd_cb'} |
|
|
0 |
0 |
1 |
not $cert and $arg_hash->{'SSL_passwd_cb'} and defined(my $pw = $arg_hash->{'SSL_passwd_cb'}->(0)) |
|
3080
|
0 |
2 |
0 |
$key and not &Net::SSLeay::CTX_use_PrivateKey($ctx, $key) |
|
3120
|
114 |
0 |
184 |
not $is_server and $can_pha |
|
|
114 |
176 |
8 |
not $is_server and $can_pha and $havecert |
|
|
176 |
0 |
8 |
not $is_server and $can_pha and $havecert and $havekey |
|
3154
|
6 |
4 |
0 |
$arg_hash->{'SSL_server'} and $curve eq "auto" |
|
3212
|
271 |
0 |
11 |
@accept_fp && do {
my $fail;
my $force = $arg_hash->{'SSL_force_fingerprint'};
sub {
my($ok, $cert, $depth) = @_;
$fail = 1 unless $ok;
return 1 if $depth > 0;
my %fp;
foreach $_ (@accept_fp) {
my $fp = ($fp{join $;, $_->[0], $_->[1]} ||= $_->[1] ? &Net::SSLeay::X509_pubkey_digest($cert, scalar &$algo2digest($_->[0])) : &Net::SSLeay::X509_digest($cert, scalar &$algo2digest($_->[0])));
next if $fp ne $_->[2];
return 1;
};
return $force ? 0 : !$fail;
}
} |
|
3241
|
164 |
0 |
23 |
$error &&= &Net::SSLeay::ERR_error_string($error) |
|
3247
|
179 |
0 |
103 |
($verify_cb || @accept_fp) && sub {
my($ok, $ctx_store) = @_;
my($certname, $cert, $error, $depth);
if ($ctx_store) {
$cert = &Net::SSLeay::X509_STORE_CTX_get_current_cert($ctx_store);
$error = &Net::SSLeay::X509_STORE_CTX_get_error($ctx_store);
$depth = &Net::SSLeay::X509_STORE_CTX_get_error_depth($ctx_store);
$certname = &Net::SSLeay::X509_NAME_oneline(scalar &Net::SSLeay::X509_get_issuer_name($cert)) . &Net::SSLeay::X509_NAME_oneline(scalar &Net::SSLeay::X509_get_subject_name($cert));
$error &&= &Net::SSLeay::ERR_error_string($error);
};
DEBUG("ok=$ok [$depth] $certname") if $IO::Socket::SSL::DEBUG >= 3;
$ok = &$verify_cb($ok, $ctx_store, $certname, $error, $cert, $depth) if $verify_cb;
$ok = &$verify_fingerprint($ok, $cert, $depth) if $verify_fingerprint and $cert;
return $ok;
}
|
|
3266
|
98 |
0 |
184 |
not $is_server and $can_ocsp_staple |
|
|
98 |
11 |
173 |
not $is_server and $can_ocsp_staple and not $verify_fingerprint |
|
3314
|
0 |
0 |
0 |
$status and $status->[2] |
|
3339
|
0 |
0 |
0 |
@results and $chain[0] == $iossl->peer_certificate |
|
3409
|
279 |
0 |
3 |
$self->{'session_cache'} and %sess_cb |
|
3565
|
5 |
11 |
0 |
$v && $v->[0] |
|
3720
|
0 |
0 |
0 |
$e->{'expire'} and time < $e->{'expire'} |
|
3724
|
0 |
0 |
0 |
$e->{'nextUpdate'} and time < $e->{'nextUpdate'} |
|
3894
|
0 |
0 |
0 |
@miss and @found |
|
3946
|
0 |
0 |
0 |
$resp->{'success'} && $resp->{'content'} |
|
4097
|
0 |
0 |
0 |
$ssl_ver and $content_type != $trace_constants{'SSL3_RT_HEADER'} |
|
|
0 |
0 |
0 |
$ssl_ver and $content_type != $trace_constants{'SSL3_RT_HEADER'} and $content_type != $trace_constants{'SSL3_RT_INNER_CONTENT_TYPE'} |
|
4110
|
0 |
0 |
0 |
$ssl_ver == $trace_constants{'SSL3_VERSION_MAJOR'} && $content_type |
| line |
l |
!l |
condition |
|
155
|
87 |
0 |
eval {
do {
Net::SSLeay::MODE_AUTO_RETRY()
}
} || 4 |
|
361
|
87 |
0 |
eval {
do {
require Socket;
'Socket'->VERSION(1.95);
die unless Socket::inet_pton(10, '::1') and 10;
'Socket'->import('inet_pton', 'NI_NUMERICHOST', 'NI_NUMERICSERV');
*_getnameinfo = sub {
return unless my($err, $host, $port) = Socket::getnameinfo(@_);
return if $err;
return $host, $port;
}
;
'Socket'
}
} || eval {
do {
require Socket6;
die unless Socket6::inet_pton(10, '::1') and 10;
'Socket6'->import('inet_pton', 'NI_NUMERICHOST', 'NI_NUMERICSERV');
*_getnameinfo = sub {
return Socket6::getnameinfo(@_);
}
;
'Socket6'
}
} || undef |
|
668
|
0 |
300 |
$arg_hash->{'Proto'} ||= "tcp" |
|
671
|
20 |
194 |
$arg_hash->{'Listen'} || 0 |
|
700
|
42 |
30 |
$! ||= 11 |
|
709
|
97 |
0 |
shift() || (return _invalid_object()) |
|
736
|
0 |
195 |
$_[0] || {} |
|
751
|
195 |
0 |
&Net::SSLeay::new($ctx->{'context'}) || (return $self->error('SSL structure creation failed')) |
|
908
|
1 |
0 |
$! ||= 110 |
|
1004
|
67 |
0 |
shift() || (return _invalid_object()) |
|
1005
|
0 |
67 |
shift() || 'IO::Socket::SSL' |
|
1011
|
67 |
0 |
$self->SUPER::accept($class) || (return) |
|
1047
|
0 |
126 |
$_[0] || {} |
|
1057
|
132 |
0 |
&Net::SSLeay::new(do {
*$socket
}->{'_SSL_ctx'}{'context'}) || (return $socket->error('SSL structure creation failed')) |
|
1134
|
1 |
0 |
$! ||= 110 |
|
1203
|
4 |
10 |
$write || 0 |
|
1268
|
0 |
0 |
+($SSL_OBJECT{$_[5]} || (return))->[0] || (return) |
|
1304
|
56 |
156 |
do {
*$self
}->{'_SSL_object'} || (last) |
|
1324
|
6 |
2 |
do {
*$self
}->{'_SSL_bio_sub'} || 0 |
|
1347
|
10 |
6197 |
$offset ||= 0 |
|
1414
|
0 |
6 |
do {
*$self
}->{'_SSL_read_closed'} || 0 |
|
1434
|
2 |
6133 |
do {
*$self
}->{'_SSL_read_closed'} || 0 |
|
1451
|
1 |
92 |
do {
*$self
}->{'_SSL_read_closed'} || 0 |
|
1475
|
2 |
9313 |
$offset ||= 0 |
|
1496
|
2 |
0 |
$! ||= 32 |
|
1510
|
0 |
0 |
$! ||= 32 |
|
1521
|
0 |
64 |
do {
*$self
}->{'_SSL_write_closed'} || 0 |
|
1544
|
5 |
9252 |
do {
*$self
}->{'_SSL_write_closed'} || 0 |
|
1565
|
0 |
61 |
$, || '' |
|
|
0 |
61 |
$\ || '' |
|
1695
|
275 |
0 |
shift() || (return _invalid_object()) |
|
1720
|
332 |
0 |
shift() || (return _invalid_object()) |
|
1748
|
127 |
0 |
do {
*$self
}->{'_SSL_opened'} || 0 |
|
1773
|
1 |
0 |
$! ||= 32 |
|
1793
|
0 |
0 |
$! ||= 32 |
|
1841
|
346 |
300 |
$keys ||= \%all_my_keys |
|
1915
|
1 |
0 |
do {
*$self
}->{'_SSL_object'} || (return) |
|
1980
|
1 |
0 |
$ISA[0]->new_from_fd($fd, '+<') || (return $class->error('Could not create socket from file descriptor.')) |
|
1991
|
1 |
0 |
(shift())->_get_ssl_object || (return) |
|
1999
|
0 |
0 |
$self->_get_ssl_object || (return) |
|
2059
|
6 |
0 |
$self->_get_ssl_object || (return) |
|
2060
|
6 |
0 |
&Net::SSLeay::get_certificate($ssl) || (return) |
|
2166
|
161 |
48 |
shift() || 'default' |
|
2213
|
278 |
10 |
$wtyp ||= "" |
|
2299
|
7 |
0 |
$algo || 'sha256' |
|
|
14 |
0 |
$algo || 'sha256' |
|
2306
|
19 |
2 |
$algo ||= "sha256" |
|
2312
|
11 |
0 |
(shift())->_get_ssl_object || (return) |
|
2317
|
34 |
0 |
(shift())->_get_ssl_object || (return) |
|
2331
|
0 |
0 |
(shift())->_get_ssl_object || (return) |
|
2336
|
3 |
0 |
(shift())->_get_ssl_object || (return) |
|
2344
|
0 |
0 |
$self->_get_ssl_object || (return) |
|
2360
|
0 |
0 |
$SSL_ERROR || '' |
|
2387
|
0 |
1 |
Net::SSLeay::print_errs('SSL error: ') || '' |
|
2554
|
2 |
0 |
$self->_get_ssl_object || (return) |
|
2561
|
2 |
0 |
$self->_get_ssl_object || (return) |
|
2694
|
0 |
34 |
undef $arg_hash->{'SSL_ca_path'} ||= undef |
|
2696
|
0 |
0 |
$arg_hash->{'SSL_ca_file'} ||= undef |
|
2697
|
0 |
69 |
$arg_hash->{'SSL_ca_path'} ||= undef |
|
2722
|
106 |
177 |
$arg_hash->{'SSL_verify_mode'} || 0 |
|
2725
|
28 |
184 |
$arg_hash->{$_} || (next) |
|
2976
|
83 |
0 |
$file || '' |
|
|
0 |
83 |
$dir || '' |
|
2986
|
179 |
0 |
$ca{'SSL_ca_file'} || '' |
|
|
157 |
22 |
$dir || '' |
|
3127
|
0 |
0 |
&Net::SSLeay::BIO_new_file($f, 'r') || (return 'IO::Socket::SSL'->error("Failed to open DH file $f")) |
|
3178
|
0 |
0 |
&Net::SSLeay::OBJ_txt2nid($curve) || (return 'IO::Socket::SSL'->error("cannot find NID for curve name '${curve}'")) |
|
3209
|
1 |
12 |
$pubkey || '' |
|
3353
|
0 |
0 |
$cl->{$_} || $cl->{''} || $DEFAULT_SSL_ARGS{'SSL_cipher_list'} || (next) |
|
3363
|
0 |
0 |
$cl->{$_} || $cl->{''} || $DEFAULT_SSL_ARGS{'SSL_cipher_list'} || (next) |
|
3531
|
0 |
0 |
~~@del || 'none' |
|
3712
|
0 |
0 |
$size || 100 |
|
3785
|
0 |
0 |
$hard_error ||= "" |
|
4121
|
0 |
0 |
eval {
do {
&Net::SSLeay::alert_desc_string_long($msg_type)
}
} || 'Unknown alert' |
| line |
l |
!l&&r |
!l&&!r |
condition |
|
439
|
0 |
261 |
0 |
UNIVERSAL::can('Net::SSLeay', $name) || sub {
$value;
}
|
|
505
|
0 |
52 |
0 |
$openssldir ||= &Net::SSLeay::SSLeay_version(5) =~ /^OPENSSLDIR: "(.+)"$/ ? $1 : (&Net::SSLeay::SSLeay_version(4) =~ /^OPENSSLDIR: "(.+)"$/ ? $1 : "cannot-determine-openssldir-from-ssleay-version") |
|
512
|
0 |
52 |
0 |
$ENV{'SSL_CERT_DIR'} || ($^O =~ /vms/i ? 'SSLCERTS:' : "$openssldir/certs") |
|
524
|
0 |
52 |
0 |
$ENV{'SSL_CERT_FILE'} || ($^O =~ /vms/i ? 'SSLCERTS:cert.pem' : "$openssldir/cert.pem") |
|
558
|
0 |
0 |
0 |
UNIVERSAL::isa($class, "IO::Socket::INET6") or UNIVERSAL::isa($class, "IO::Socket::IP") |
|
650
|
72 |
0 |
68 |
$arg_hash->{'Domain'} || $arg_hash->{'Family'} |
|
|
0 |
72 |
68 |
$arg_hash->{$family_key} ||= $arg_hash->{'Domain'} || $arg_hash->{'Family'} |
|
757
|
6 |
6 |
0 |
$arg_hash->{'SSL_session_key'} ||= do {
my $host = $arg_hash->{'PeerAddr'} || $arg_hash->{'PeerHost'} || $self->_update_peer;
my $port = $arg_hash->{'PeerPort'} || $arg_hash->{'PeerService'};
$port ? "${host}:$port" : $host
} |
|
759
|
5 |
1 |
0 |
$arg_hash->{'PeerAddr'} || $arg_hash->{'PeerHost'} || $self->_update_peer |
|
760
|
1 |
5 |
0 |
$arg_hash->{'PeerPort'} || $arg_hash->{'PeerService'} |
|
776
|
0 |
0 |
195 |
$DEBUG >= 2 or do {
*$self
}->{'_SSL_msg_callback'} |
|
780
|
2 |
83 |
93 |
$arg_hash->{'PeerAddr'} || $arg_hash->{'PeerHost'} |
|
788
|
85 |
0 |
0 |
not $host =~ /[a-z_]/i or $host =~ /:/ |
|
805
|
2 |
98 |
95 |
$arg_hash->{'PeerAddr'} or $arg_hash->{'PeerHost'} |
|
809
|
42 |
8 |
64 |
$arg_hash->{'SSL_verifycn_name'} || $arg_hash->{'SSL_hostname'} |
|
811
|
23 |
41 |
0 |
$arg_hash->{'PeerAddr'} || $arg_hash->{'PeerHost'} |
|
844
|
195 |
2 |
0 |
$ssl ||= do {
*$self
}->{'_SSL_object'} |
|
940
|
158 |
2 |
0 |
$ctx ||= do {
*$self
}->{'_SSL_ctx'} |
|
1033
|
0 |
0 |
67 |
$biosock || $args->{'SSL_usebio'} |
|
1072
|
0 |
0 |
132 |
$DEBUG >= 2 or do {
*$self
}->{'_SSL_msg_callback'} |
|
1075
|
132 |
3 |
0 |
$ssl ||= do {
*$socket
}->{'_SSL_object'} |
|
1191
|
0 |
14 |
42 |
$wbuf ne "" or &Net::SSLeay::BIO_pending($wbio) > 0 |
|
1194
|
0 |
0 |
14 |
not defined $buf or $buf eq "" |
|
1206
|
0 |
0 |
0 |
$!{'EAGAIN'} or $!{'EWOULDBLOCK'} |
|
1242
|
0 |
0 |
0 |
$!{'EAGAIN'} or $!{'EWOULDBLOCK'} |
|
1295
|
0 |
0 |
0 |
$DEBUG >= 2 || do {
*$self
}->{'_SSL_msg_callback'} |
|
1334
|
8 |
0 |
0 |
$err == $Net_SSLeay_ERROR_SSL || $err == $Net_SSLeay_ERROR_SYSCALL |
|
1353
|
6186 |
7 |
14 |
$length or $justpeek |
|
1389
|
0 |
0 |
2 |
do {
*$self
}->{'_SSL_bio_socket'} || (do {
*$self
}->{'_SSL_rawfd'} ||= do {
open my $fh, '+<&=', $self;
$fh
}) |
|
1404
|
1 |
2 |
0 |
$biosock || $self |
|
1461
|
0 |
5 |
0 |
$fd ||= $self |
|
1474
|
9251 |
64 |
0 |
$length ||= $buf_len |
|
1583
|
2 |
5 |
84 |
not defined $/ or wantarray |
|
1591
|
0 |
0 |
0 |
$! == 11 or $! == 11 |
|
1621
|
0 |
0 |
0 |
$! == 11 or $! == 11 |
|
1642
|
18 |
7 |
62 |
not defined $poke or $poke eq "" |
|
1686
|
58 |
1 |
0 |
$delim1 eq '' || $eod < length $buf |
|
1707
|
1 |
63 |
0 |
$biosock || $self |
|
1741
|
17 |
46 |
14 |
$status & 2 || $stop_args->{'SSL_fast_shutdown'} |
|
1812
|
5 |
253 |
0 |
do {
*$self
}->{'_SSL_bio_socket'} || $self |
|
1825
|
0 |
31 |
17 |
$downgrade or not defined $downgrade |
|
1896
|
237 |
0 |
0 |
do {
*$self
}->{'_SSL_object'} || 'IO::Socket::SSL'->_internal_error('Undefined SSL object', 9) |
|
1932
|
4 |
155 |
1 |
$usebio or defined $original_fileno |
|
1952
|
155 |
0 |
4 |
not defined $start_handshake or $start_handshake |
|
2044
|
42 |
33 |
0 |
do {
*$self
}->{'_SSL_certificate'} ||= &Net::SSLeay::get_peer_certificate($ssl) |
|
2170
|
209 |
0 |
0 |
$scheme{$scheme} || croak("scheme $scheme not defined") |
|
2195
|
0 |
3 |
52 |
4 != @ip or 4 != grep({$_ < 256 if defined $_;} @ip) |
|
2261
|
16 |
87 |
14 |
$scheme->{'check_cn'} eq "always" or $scheme->{'check_cn'} eq "when_only" and not $alt_dnsNames |
|
2290
|
0 |
8 |
0 |
do {
*$self
}->{'_SSL_servername'} ||= do {
return unless my $ssl = $self->_get_ssl_object;
&Net::SSLeay::get_servername($ssl)
} |
|
2298
|
2 |
19 |
0 |
$cert ||= $self->peer_certificate |
|
2351
|
0 |
0 |
0 |
$ctx->{'ocsp_cache'} ||= "IO::Socket::SSL::OCSP_Cache"->new |
|
2368
|
34 |
0 |
16 |
do {
*$self
}->{'_SSL_ioclass_upgraded'} or do {
*$self
}->{'_SSL_arguments'}{'SSL_keepSocketOnError'} |
|
2408
|
66 |
4 |
30 |
not $oe or $oe->[1] <= $severity |
|
2467
|
210 |
0 |
0 |
not $use_threads or delete $CREATED_IN_THIS_THREAD{$ssl} |
|
2683
|
98 |
2 |
183 |
$is_server || defined $arg_hash->{'SSL_use_cert'} |
|
2694
|
0 |
0 |
34 |
$arg_hash->{'SSL_ca_file'} ||= (undef $arg_hash->{'SSL_ca_path'} ||= undef) |
|
2705
|
2948 |
1755 |
0 |
defined $arg_hash->{$_} or delete $arg_hash->{$_} |
|
2736
|
61 |
42 |
0 |
!$vcn_scheme || $vcn_scheme ne 'none' |
|
2751
|
90 |
0 |
0 |
$verify_name || ref $vcn_scheme && $vcn_scheme->{'callback'} && 'unknown' |
|
2791
|
729 |
517 |
0 |
$2 || $3 |
|
2874
|
0 |
9 |
103 |
$arg_hash->{'SSL_session_id_context'} || $arg_hash->{'SSL_verify_mode'} & 1 && "$ctx" |
|
2927
|
0 |
0 |
0 |
$psk->{$identity} || $psk->{''} || 'IO::Socket::SSL'->_internal_error("no PSK for given identity '${identity}' and no default") |
|
2960
|
34 |
83 |
179 |
$arg_hash->{'SSL_ca'} or defined $arg_hash->{'SSL_ca_file'} |
|
|
117 |
0 |
179 |
$arg_hash->{'SSL_ca'} or defined $arg_hash->{'SSL_ca_file'} or defined $arg_hash->{'SSL_ca_path'} |
|
2976
|
83 |
0 |
34 |
$file || $dir |
|
3101
|
179 |
2 |
117 |
not $havecert or $havekey |
|
|
88 |
1 |
0 |
$arg_hash->{'SSL_key_file'} || ($havecert eq 'PEM' ? $arg_hash->{'SSL_cert_file'} : undef) |
|
3202
|
13 |
0 |
0 |
$algo ||= length $digest == 32 ? "md5" : (length $digest == 40 ? "sha1" : (length $digest == 64 ? "sha256" : (return "IO::Socket::SSL"->_internal_error("cannot detect hash algorithm from fingerprint '${_}'", 9)))) |
|
3222
|
1 |
14 |
0 |
$fp{join $;, $_->[0], $_->[1]} ||= $_->[1] ? &Net::SSLeay::X509_pubkey_digest($cert, scalar &$algo2digest($_->[0])) : &Net::SSLeay::X509_digest($cert, scalar &$algo2digest($_->[0])) |
|
3369
|
282 |
0 |
0 |
$ctx{''} || (values %ctx)[0] |
|
3370
|
6 |
0 |
276 |
keys %ctx > 1 or not exists $ctx{''} |
|
3378
|
13 |
6 |
0 |
$ctx{lc $host} || $ctx{''} |
|
3415
|
15 |
0 |
0 |
$SSL_OBJECT{$ssl} || do {
warn "callback session new: no known SSL object for $ssl";
return
} |
|
3449
|
280 |
0 |
0 |
not $use_threads or delete $CTX_CREATED_IN_THIS_THREAD{$ctx} |
|
3811
|
0 |
0 |
0 |
not $todo or $self->{'error'} |
|
4091
|
0 |
0 |
0 |
$tc_ver2s{$ssl_ver} || "(version=$ssl_ver)" |
|
4110
|
0 |
0 |
0 |
$tc_type2s{$content_type} || "TLS Unknown (type=$content_type)" |
|
4124
|
0 |
0 |
0 |
$tc_msgtype2s{join $;, $ssl_ver, $msg_type} || "Unknown (ssl_ver=$ssl_ver, msg=$msg_type)" |