Condition Coverage

blib/lib/IO/Socket/SSL.pm
Criterion Covered Total %
condition 366 677 54.0


and 2 conditions

line l !l condition
1504 4 0 !defined($written) && $SSL_ERROR == 98381957083872 && 2
2453 0 2 $check_partial_chain && 1

and 3 conditions

line !l l&&!r l&&r condition
88 0 0 87 defined &Net::SSLeay::P_next_proto_negotiated && !&Net::SSLeay::constant('LIBRESSL_VERSION_NUMBER')
93 0 0 0 defined &Net::SSLeay::CTX_set_tmp_ecdh && ($openssl_version != 268439631 || length pack('P', 0) == 4)
106 0 0 87 $can_ecdh && $openssl_version >= 268443648
108 0 0 87 defined &Net::SSLeay::OCSP_cert2ids && ($netssleay_version < 1.75 || $netssleay_version > 1.77)
111 0 0 87 $can_ocsp && defined &Net::SSLeay::set_tlsext_status_type
113 0 0 87 defined &Net::SSLeay::CTX_set_tlsext_ticket_getkey_cb && $netssleay_version >= 1.8
124 0 0 87 $session_upref and defined &Net::SSLeay::CTX_sess_set_new_cb
0 0 87 $session_upref and defined &Net::SSLeay::CTX_sess_set_new_cb and defined &Net::SSLeay::CTX_sess_set_remove_cb
133 0 0 87 defined &Net::SSLeay::CTX_get0_param && eval { do { Net::SSLeay::X509_V_FLAG_PARTIAL_CHAIN() } }
533 52 0 0 not %default_ca and do { local $SIG{'__DIE__'}; eval { do { require Mozilla::CA; 1 } } }
656 0 0 72 $IOCLASS eq "IO::Socket::IP" and not defined $arg_hash->{'GetAddrInfoFlags'}
661 125 0 2 defined $blocking and not $blocking
728 82 0 15 defined $sh and not $sh
747 195 0 0 $args->{'SSL_usebio'} and not $biosock
837 183 5 7 $ctx->{'session_cache'} and my $session = $ctx->{'session_cache'}->get_session($arg_hash->{'SSL_session_key'})
851 186 0 11 defined $timeout and $timeout > 0
186 0 11 defined $timeout and $timeout > 0 and $self->blocking(0)
861 186 0 11 defined $timeout && time
872 34 17 12 not $err and $dobio
965 160 0 0 not %sess_cb and $ctx->{'session_cache'}
0 0 0 not %sess_cb and $ctx->{'session_cache'} and my $session = &Net::SSLeay::get1_session($ssl)
1016 48 0 19 defined $sh and not $sh
1034 0 0 0 $usebio and not $biosock
1046 78 9 48 @_ && UNIVERSAL::isa($_[0], 'IO::Handle')
1084 121 0 14 defined $timeout and $timeout > 0
121 0 14 defined $timeout and $timeout > 0 and $socket->blocking(0)
1093 121 0 14 defined $timeout && time
1103 17 21 6 not $err and $dobio
1293 0 0 0 $ssleay_set_msg_callback and my $ssl = do { *$self }->{'_SSL_object'}
1304 492 0 212 @_ and $auto_retry
1334 16 8 0 not $! and $err == $Net_SSLeay_ERROR_SSL || $err == $Net_SSLeay_ERROR_SYSCALL
1400 2 1 0 $biosock and UNIVERSAL::can($biosock, "peek")
1415 0 0 6 !$rc && do { *$self }->{'_SSL_object'}
1435 2 1 6132 !$rc && do { *$self }->{'_SSL_object'}
1452 1 5 87 !$rc && do { *$self }->{'_SSL_object'}
1460 5 0 0 $fd and UNIVERSAL::can($fd, "peek")
1487 63 0 0 not $written and $errs
1522 0 0 64 !$wc && do { *$self }->{'_SSL_object'}
1545 5 1 9251 !$wc && do { *$self }->{'_SSL_object'}
1652 24 0 62 $pending and (my $pb = &Net::SSLeay::peek($ssl, $pending)) ne ""
1686 3 57 2 $eod and $delim1 eq '' || $eod < length $buf
1741 113 28 49 $status & 1 and $status & 2 || $stop_args->{'SSL_fast_shutdown'}
1765 1 0 2 not $err and $dobio
1817 256 0 2 $stop_args->{'SSL_ctx_free'} and my $ctx = delete do { *$self }->{'_SSL_ctx'}
1861 24 316 306 $keys->{'_SSL_object'} and my $ssl = do { *$self }->{'_SSL_object'}
1868 88 526 32 $keys->{'_SSL_certificate'} and my $cert = delete do { *$self }->{'_SSL_certificate'}
1880 339 4 303 $untie and not do { *$self }->{'_SSL_bio_socket'}
1904 0 0 0 $ctx_object && $ctx_object->{'context'}
2001 0 0 0 @chain and not $self->peer_certificate
2042 75 0 0 $reload and do { *$self }->{'_SSL_certificate'}
2224 106 66 116 $wtyp eq "anywhere" and $name =~ /^([a-zA-Z0-9_\-]*)\*(.+)/
76 70 26 $wtyp =~ /^(?:full_label|leftmost)$/ and $name =~ /^\*(\..+)$/
2225 82 30 4 $1 ne "" and substr($identity, 0, 4) eq "xn--"
2248 248 46 53 $ipn and $type == GEN_IPADD()
46 47 201 not $ipn and $type == GEN_DNS()
2261 0 14 87 $scheme->{'check_cn'} eq "when_only" and not $alt_dnsNames
2359 0 0 52 ref $self && do { *$self }->{'_SSL_last_err'}
2368 50 0 1 defined $error_trap and ref $error_trap eq "CODE"
2405 83 2 17 not ref $self and $CURRENT_SSL_OBJECT
2567 1 4 0 IO::Handle::opened($self) && do { *$self }->{'_SSL_opened'}
2683 100 177 6 not $is_server || defined $arg_hash->{'SSL_use_cert'} and grep {$arg_hash->{$_};} "SSL_cert", "SSL_cert_file"
277 0 6 not $is_server || defined $arg_hash->{'SSL_use_cert'} and grep {$arg_hash->{$_};} "SSL_cert", "SSL_cert_file" and grep {$arg_hash->{$_};} "SSL_key", "SSL_key_file"
2713 1943 321 0 defined $arg_hash->{$_} and $arg_hash->{$_} eq ""
2736 98 82 103 not $is_server and $verify_mode & 1
180 61 42 not $is_server and $verify_mode & 1 and !$vcn_scheme || $vcn_scheme ne 'none'
2777 98 0 0 $arg_hash->{'SSL_ticket_keycb'} and not $can_tckt_keycb
2795 283 0 0 $ver and $v ne $ver
2858 26 250 20 $ver eq "SSLv23" and not $ssl_op & $SSL_OP_NO{'SSLv3'}
2874 184 103 9 $arg_hash->{'SSL_server'} and my $id = $arg_hash->{'SSL_session_id_context'} || $arg_hash->{'SSL_verify_mode'} & 1 && "$ctx"
2964 117 0 0 ref $file eq "SCALAR" and not $$file
2966 117 0 0 ref $dir eq "SCALAR" and not $$dir
2976 34 83 0 $file || $dir and not &Net::SSLeay::CTX_load_verify_locations($ctx, scalar($file || ''), scalar($dir || ''))
2986 179 0 0 not &Net::SSLeay::CTX_load_verify_locations($ctx, scalar($ca{'SSL_ca_file'} || ''), scalar($dir || '')) and $verify_mode != $Net_SSLeay_VERIFY_NONE
2994 184 103 9 $is_server and $verify_mode & $Net_SSLeay_VERIFY_PEER
3064 1 0 1 not $cert and $arg_hash->{'SSL_passwd_cb'}
0 0 1 not $cert and $arg_hash->{'SSL_passwd_cb'} and defined(my $pw = $arg_hash->{'SSL_passwd_cb'}->(0))
3080 0 2 0 $key and not &Net::SSLeay::CTX_use_PrivateKey($ctx, $key)
3120 114 0 184 not $is_server and $can_pha
114 176 8 not $is_server and $can_pha and $havecert
176 0 8 not $is_server and $can_pha and $havecert and $havekey
3154 6 4 0 $arg_hash->{'SSL_server'} and $curve eq "auto"
3212 271 0 11 @accept_fp && do { my $fail; my $force = $arg_hash->{'SSL_force_fingerprint'}; sub { my($ok, $cert, $depth) = @_; $fail = 1 unless $ok; return 1 if $depth > 0; my %fp; foreach $_ (@accept_fp) { my $fp = ($fp{join $;, $_->[0], $_->[1]} ||= $_->[1] ? &Net::SSLeay::X509_pubkey_digest($cert, scalar &$algo2digest($_->[0])) : &Net::SSLeay::X509_digest($cert, scalar &$algo2digest($_->[0]))); next if $fp ne $_->[2]; return 1; } ; return $force ? 0 : !$fail; } }
3241 164 0 23 $error &&= &Net::SSLeay::ERR_error_string($error)
3247 179 0 103 ($verify_cb || @accept_fp) && sub { my($ok, $ctx_store) = @_; my($certname, $cert, $error, $depth); if ($ctx_store) { $cert = &Net::SSLeay::X509_STORE_CTX_get_current_cert($ctx_store); $error = &Net::SSLeay::X509_STORE_CTX_get_error($ctx_store); $depth = &Net::SSLeay::X509_STORE_CTX_get_error_depth($ctx_store); $certname = &Net::SSLeay::X509_NAME_oneline(scalar &Net::SSLeay::X509_get_issuer_name($cert)) . &Net::SSLeay::X509_NAME_oneline(scalar &Net::SSLeay::X509_get_subject_name($cert)); $error &&= &Net::SSLeay::ERR_error_string($error); } ; DEBUG("ok=$ok [$depth] $certname") if $IO::Socket::SSL::DEBUG >= 3; $ok = &$verify_cb($ok, $ctx_store, $certname, $error, $cert, $depth) if $verify_cb; $ok = &$verify_fingerprint($ok, $cert, $depth) if $verify_fingerprint and $cert; return $ok; }
3266 98 0 184 not $is_server and $can_ocsp_staple
98 11 173 not $is_server and $can_ocsp_staple and not $verify_fingerprint
3314 0 0 0 $status and $status->[2]
3339 0 0 0 @results and $chain[0] == $iossl->peer_certificate
3409 279 0 3 $self->{'session_cache'} and %sess_cb
3565 5 11 0 $v && $v->[0]
3720 0 0 0 $e->{'expire'} and time < $e->{'expire'}
3724 0 0 0 $e->{'nextUpdate'} and time < $e->{'nextUpdate'}
3894 0 0 0 @miss and @found
3946 0 0 0 $resp->{'success'} && $resp->{'content'}
4097 0 0 0 $ssl_ver and $content_type != $trace_constants{'SSL3_RT_HEADER'}
0 0 0 $ssl_ver and $content_type != $trace_constants{'SSL3_RT_HEADER'} and $content_type != $trace_constants{'SSL3_RT_INNER_CONTENT_TYPE'}
4110 0 0 0 $ssl_ver == $trace_constants{'SSL3_VERSION_MAJOR'} && $content_type

or 2 conditions

line l !l condition
155 87 0 eval { do { Net::SSLeay::MODE_AUTO_RETRY() } } || 4
361 87 0 eval { do { require Socket; 'Socket'->VERSION(1.95); die unless Socket::inet_pton(10, '::1') and 10; 'Socket'->import('inet_pton', 'NI_NUMERICHOST', 'NI_NUMERICSERV'); *_getnameinfo = sub { return unless my($err, $host, $port) = Socket::getnameinfo(@_); return if $err; return $host, $port; } ; 'Socket' } } || eval { do { require Socket6; die unless Socket6::inet_pton(10, '::1') and 10; 'Socket6'->import('inet_pton', 'NI_NUMERICHOST', 'NI_NUMERICSERV'); *_getnameinfo = sub { return Socket6::getnameinfo(@_); } ; 'Socket6' } } || undef
668 0 300 $arg_hash->{'Proto'} ||= "tcp"
671 20 194 $arg_hash->{'Listen'} || 0
700 42 30 $! ||= 11
709 97 0 shift() || (return _invalid_object())
736 0 195 $_[0] || {}
751 195 0 &Net::SSLeay::new($ctx->{'context'}) || (return $self->error('SSL structure creation failed'))
908 1 0 $! ||= 110
1004 67 0 shift() || (return _invalid_object())
1005 0 67 shift() || 'IO::Socket::SSL'
1011 67 0 $self->SUPER::accept($class) || (return)
1047 0 126 $_[0] || {}
1057 132 0 &Net::SSLeay::new(do { *$socket }->{'_SSL_ctx'}{'context'}) || (return $socket->error('SSL structure creation failed'))
1134 1 0 $! ||= 110
1203 4 10 $write || 0
1268 0 0 +($SSL_OBJECT{$_[5]} || (return))->[0] || (return)
1304 56 156 do { *$self }->{'_SSL_object'} || (last)
1324 6 2 do { *$self }->{'_SSL_bio_sub'} || 0
1347 10 6197 $offset ||= 0
1414 0 6 do { *$self }->{'_SSL_read_closed'} || 0
1434 2 6133 do { *$self }->{'_SSL_read_closed'} || 0
1451 1 92 do { *$self }->{'_SSL_read_closed'} || 0
1475 2 9313 $offset ||= 0
1496 2 0 $! ||= 32
1510 0 0 $! ||= 32
1521 0 64 do { *$self }->{'_SSL_write_closed'} || 0
1544 5 9252 do { *$self }->{'_SSL_write_closed'} || 0
1565 0 61 $, || ''
0 61 $\ || ''
1695 275 0 shift() || (return _invalid_object())
1720 332 0 shift() || (return _invalid_object())
1748 127 0 do { *$self }->{'_SSL_opened'} || 0
1773 1 0 $! ||= 32
1793 0 0 $! ||= 32
1841 346 300 $keys ||= \%all_my_keys
1915 1 0 do { *$self }->{'_SSL_object'} || (return)
1980 1 0 $ISA[0]->new_from_fd($fd, '+<') || (return $class->error('Could not create socket from file descriptor.'))
1991 1 0 (shift())->_get_ssl_object || (return)
1999 0 0 $self->_get_ssl_object || (return)
2059 6 0 $self->_get_ssl_object || (return)
2060 6 0 &Net::SSLeay::get_certificate($ssl) || (return)
2166 161 48 shift() || 'default'
2213 278 10 $wtyp ||= ""
2299 7 0 $algo || 'sha256'
14 0 $algo || 'sha256'
2306 19 2 $algo ||= "sha256"
2312 11 0 (shift())->_get_ssl_object || (return)
2317 34 0 (shift())->_get_ssl_object || (return)
2331 0 0 (shift())->_get_ssl_object || (return)
2336 3 0 (shift())->_get_ssl_object || (return)
2344 0 0 $self->_get_ssl_object || (return)
2360 0 0 $SSL_ERROR || ''
2387 0 1 Net::SSLeay::print_errs('SSL error: ') || ''
2554 2 0 $self->_get_ssl_object || (return)
2561 2 0 $self->_get_ssl_object || (return)
2694 0 34 undef $arg_hash->{'SSL_ca_path'} ||= undef
2696 0 0 $arg_hash->{'SSL_ca_file'} ||= undef
2697 0 69 $arg_hash->{'SSL_ca_path'} ||= undef
2722 106 177 $arg_hash->{'SSL_verify_mode'} || 0
2725 28 184 $arg_hash->{$_} || (next)
2976 83 0 $file || ''
0 83 $dir || ''
2986 179 0 $ca{'SSL_ca_file'} || ''
157 22 $dir || ''
3127 0 0 &Net::SSLeay::BIO_new_file($f, 'r') || (return 'IO::Socket::SSL'->error("Failed to open DH file $f"))
3178 0 0 &Net::SSLeay::OBJ_txt2nid($curve) || (return 'IO::Socket::SSL'->error("cannot find NID for curve name '${curve}'"))
3209 1 12 $pubkey || ''
3353 0 0 $cl->{$_} || $cl->{''} || $DEFAULT_SSL_ARGS{'SSL_cipher_list'} || (next)
3363 0 0 $cl->{$_} || $cl->{''} || $DEFAULT_SSL_ARGS{'SSL_cipher_list'} || (next)
3531 0 0 ~~@del || 'none'
3712 0 0 $size || 100
3785 0 0 $hard_error ||= ""
4121 0 0 eval { do { &Net::SSLeay::alert_desc_string_long($msg_type) } } || 'Unknown alert'

or 3 conditions

line l !l&&r !l&&!r condition
439 0 261 0 UNIVERSAL::can('Net::SSLeay', $name) || sub { $value; }
505 0 52 0 $openssldir ||= &Net::SSLeay::SSLeay_version(5) =~ /^OPENSSLDIR: "(.+)"$/ ? $1 : (&Net::SSLeay::SSLeay_version(4) =~ /^OPENSSLDIR: "(.+)"$/ ? $1 : "cannot-determine-openssldir-from-ssleay-version")
512 0 52 0 $ENV{'SSL_CERT_DIR'} || ($^O =~ /vms/i ? 'SSLCERTS:' : "$openssldir/certs")
524 0 52 0 $ENV{'SSL_CERT_FILE'} || ($^O =~ /vms/i ? 'SSLCERTS:cert.pem' : "$openssldir/cert.pem")
558 0 0 0 UNIVERSAL::isa($class, "IO::Socket::INET6") or UNIVERSAL::isa($class, "IO::Socket::IP")
650 72 0 68 $arg_hash->{'Domain'} || $arg_hash->{'Family'}
0 72 68 $arg_hash->{$family_key} ||= $arg_hash->{'Domain'} || $arg_hash->{'Family'}
757 6 6 0 $arg_hash->{'SSL_session_key'} ||= do { my $host = $arg_hash->{'PeerAddr'} || $arg_hash->{'PeerHost'} || $self->_update_peer; my $port = $arg_hash->{'PeerPort'} || $arg_hash->{'PeerService'}; $port ? "${host}:$port" : $host }
759 5 1 0 $arg_hash->{'PeerAddr'} || $arg_hash->{'PeerHost'} || $self->_update_peer
760 1 5 0 $arg_hash->{'PeerPort'} || $arg_hash->{'PeerService'}
776 0 0 195 $DEBUG >= 2 or do { *$self }->{'_SSL_msg_callback'}
780 2 83 93 $arg_hash->{'PeerAddr'} || $arg_hash->{'PeerHost'}
788 85 0 0 not $host =~ /[a-z_]/i or $host =~ /:/
805 2 98 95 $arg_hash->{'PeerAddr'} or $arg_hash->{'PeerHost'}
809 42 8 64 $arg_hash->{'SSL_verifycn_name'} || $arg_hash->{'SSL_hostname'}
811 23 41 0 $arg_hash->{'PeerAddr'} || $arg_hash->{'PeerHost'}
844 195 2 0 $ssl ||= do { *$self }->{'_SSL_object'}
940 158 2 0 $ctx ||= do { *$self }->{'_SSL_ctx'}
1033 0 0 67 $biosock || $args->{'SSL_usebio'}
1072 0 0 132 $DEBUG >= 2 or do { *$self }->{'_SSL_msg_callback'}
1075 132 3 0 $ssl ||= do { *$socket }->{'_SSL_object'}
1191 0 14 42 $wbuf ne "" or &Net::SSLeay::BIO_pending($wbio) > 0
1194 0 0 14 not defined $buf or $buf eq ""
1206 0 0 0 $!{'EAGAIN'} or $!{'EWOULDBLOCK'}
1242 0 0 0 $!{'EAGAIN'} or $!{'EWOULDBLOCK'}
1295 0 0 0 $DEBUG >= 2 || do { *$self }->{'_SSL_msg_callback'}
1334 8 0 0 $err == $Net_SSLeay_ERROR_SSL || $err == $Net_SSLeay_ERROR_SYSCALL
1353 6186 7 14 $length or $justpeek
1389 0 0 2 do { *$self }->{'_SSL_bio_socket'} || (do { *$self }->{'_SSL_rawfd'} ||= do { open my $fh, '+<&=', $self; $fh })
1404 1 2 0 $biosock || $self
1461 0 5 0 $fd ||= $self
1474 9251 64 0 $length ||= $buf_len
1583 2 5 84 not defined $/ or wantarray
1591 0 0 0 $! == 11 or $! == 11
1621 0 0 0 $! == 11 or $! == 11
1642 18 7 62 not defined $poke or $poke eq ""
1686 58 1 0 $delim1 eq '' || $eod < length $buf
1707 1 63 0 $biosock || $self
1741 17 46 14 $status & 2 || $stop_args->{'SSL_fast_shutdown'}
1812 5 253 0 do { *$self }->{'_SSL_bio_socket'} || $self
1825 0 31 17 $downgrade or not defined $downgrade
1896 237 0 0 do { *$self }->{'_SSL_object'} || 'IO::Socket::SSL'->_internal_error('Undefined SSL object', 9)
1932 4 155 1 $usebio or defined $original_fileno
1952 155 0 4 not defined $start_handshake or $start_handshake
2044 42 33 0 do { *$self }->{'_SSL_certificate'} ||= &Net::SSLeay::get_peer_certificate($ssl)
2170 209 0 0 $scheme{$scheme} || croak("scheme $scheme not defined")
2195 0 3 52 4 != @ip or 4 != grep({$_ < 256 if defined $_;} @ip)
2261 16 87 14 $scheme->{'check_cn'} eq "always" or $scheme->{'check_cn'} eq "when_only" and not $alt_dnsNames
2290 0 8 0 do { *$self }->{'_SSL_servername'} ||= do { return unless my $ssl = $self->_get_ssl_object; &Net::SSLeay::get_servername($ssl) }
2298 2 19 0 $cert ||= $self->peer_certificate
2351 0 0 0 $ctx->{'ocsp_cache'} ||= "IO::Socket::SSL::OCSP_Cache"->new
2368 34 0 16 do { *$self }->{'_SSL_ioclass_upgraded'} or do { *$self }->{'_SSL_arguments'}{'SSL_keepSocketOnError'}
2408 66 4 30 not $oe or $oe->[1] <= $severity
2467 210 0 0 not $use_threads or delete $CREATED_IN_THIS_THREAD{$ssl}
2683 98 2 183 $is_server || defined $arg_hash->{'SSL_use_cert'}
2694 0 0 34 $arg_hash->{'SSL_ca_file'} ||= (undef $arg_hash->{'SSL_ca_path'} ||= undef)
2705 2948 1755 0 defined $arg_hash->{$_} or delete $arg_hash->{$_}
2736 61 42 0 !$vcn_scheme || $vcn_scheme ne 'none'
2751 90 0 0 $verify_name || ref $vcn_scheme && $vcn_scheme->{'callback'} && 'unknown'
2791 729 517 0 $2 || $3
2874 0 9 103 $arg_hash->{'SSL_session_id_context'} || $arg_hash->{'SSL_verify_mode'} & 1 && "$ctx"
2927 0 0 0 $psk->{$identity} || $psk->{''} || 'IO::Socket::SSL'->_internal_error("no PSK for given identity '${identity}' and no default")
2960 34 83 179 $arg_hash->{'SSL_ca'} or defined $arg_hash->{'SSL_ca_file'}
117 0 179 $arg_hash->{'SSL_ca'} or defined $arg_hash->{'SSL_ca_file'} or defined $arg_hash->{'SSL_ca_path'}
2976 83 0 34 $file || $dir
3101 179 2 117 not $havecert or $havekey
88 1 0 $arg_hash->{'SSL_key_file'} || ($havecert eq 'PEM' ? $arg_hash->{'SSL_cert_file'} : undef)
3202 13 0 0 $algo ||= length $digest == 32 ? "md5" : (length $digest == 40 ? "sha1" : (length $digest == 64 ? "sha256" : (return "IO::Socket::SSL"->_internal_error("cannot detect hash algorithm from fingerprint '${_}'", 9))))
3222 1 14 0 $fp{join $;, $_->[0], $_->[1]} ||= $_->[1] ? &Net::SSLeay::X509_pubkey_digest($cert, scalar &$algo2digest($_->[0])) : &Net::SSLeay::X509_digest($cert, scalar &$algo2digest($_->[0]))
3369 282 0 0 $ctx{''} || (values %ctx)[0]
3370 6 0 276 keys %ctx > 1 or not exists $ctx{''}
3378 13 6 0 $ctx{lc $host} || $ctx{''}
3415 15 0 0 $SSL_OBJECT{$ssl} || do { warn "callback session new: no known SSL object for $ssl"; return }
3449 280 0 0 not $use_threads or delete $CTX_CREATED_IN_THIS_THREAD{$ctx}
3811 0 0 0 not $todo or $self->{'error'}
4091 0 0 0 $tc_ver2s{$ssl_ver} || "(version=$ssl_ver)"
4110 0 0 0 $tc_type2s{$content_type} || "TLS Unknown (type=$content_type)"
4124 0 0 0 $tc_msgtype2s{join $;, $ssl_ver, $msg_type} || "Unknown (ssl_ver=$ssl_ver, msg=$msg_type)"