| blib/lib/Net/SIP/SocketPool.pm | |||
|---|---|---|---|
| Criterion | Covered | Total | % |
| condition | 30 | 69 | 43.4 |
| line | l | !l | condition |
|---|---|---|---|
| 445 | 5 | 5 | $self->{'tls'} && 1 |
| line | !l | l&&!r | l&&r | condition |
|---|---|---|---|---|
| 206 | 30 | 0 | 37 | $packet->is_response and my $fo = $self->{'tids'}{$packet->tid} |
| 218 | 30 | 0 | 30 | $_->{'peer'} and $_->{'peer'}{'addr'} eq $dst->{'addr'} |
| 286 | 143 | 20 | 5 | $self->{'loop'} and not $fo->{'inside_connect'} |
| 287 | 0 | 143 | 25 | not $self->{'timeout_timer'} and $fo->{'didit'} |
| 316 | 10 | 20 | 0 | $_->{'inside_connect'} and $tdiff > $CONNECT_TIMEOUT |
| 414 | 123 | 0 | 0 | shift() and not _check_from($self, $from) |
| 438 | 10 | 0 | 0 | $self->{'dst'} and not _check_from($self, $from) |
| 460 | 88 | 0 | 0 | $Net::SIP::SocketPool::DEBUG and $fo->{'rbuf'} ne '' |
| 488 | 86 | 0 | 0 | $hdrpos < 0 and length $fo->{'rbuf'} > $MAX_SIP_HEADER |
| line | l | !l | condition |
|---|---|---|---|
| 75 | 13 | 0 | eval 'use IO::Socket::SSL;1' && eval { do { die 'need at least version 1.956' unless 'IO::Socket::SSL'->VERSION >= 1.956; $SSL_WANT_READ = IO::Socket::SSL::SSL_WANT_READ(); $SSL_WANT_WRITE = IO::Socket::SSL::SSL_WANT_WRITE(); $SSL_VERIFY_PEER = IO::Socket::SSL::SSL_VERIFY_PEER(); $SSL_VERIFY_FAIL_IF_NO_PEER_CERT = IO::Socket::SSL::SSL_VERIFY_FAIL_IF_NO_PEER_CERT(); *SSL_ERROR = \$IO::Socket::SSL::SSL_ERROR; $SSL_REUSE_CTX = 'IO::Socket::SSL'->VERSION >= 1.969; 1 } } || die("no SSL support using IO::Socket::SSL: $@") |
| 91 | 38 | 0 | $tls ||= {} |
| 108 | 76 | 0 | 'IO::Socket::SSL::SSL_Context'->new($self->{'tls'}{$_}) || die("failed to create SSL context: $SSL_ERROR") |
| 114 | 105 | 0 | $proto || die('no protocol given') |
| 136 | 0 | 0 | $_->{'fd'} || (next) |
| 315 | 30 | 30 | $_->{'didit'} || (next) |
| 337 | 0 | 0 | $self->{'timeout_timer'} || (return) |
| 531 | 20 | 10 | $fo->{'tids'} ||= [] |
| line | l | !l&&r | !l&&!r | condition |
|---|---|---|---|---|
| 75 | 25 | 13 | 0 | $CAN_TLS //= eval 'use IO::Socket::SSL;1' && eval { do { die 'need at least version 1.956' unless 'IO::Socket::SSL'->VERSION >= 1.956; $SSL_WANT_READ = IO::Socket::SSL::SSL_WANT_READ(); $SSL_WANT_WRITE = IO::Socket::SSL::SSL_WANT_WRITE(); $SSL_VERIFY_PEER = IO::Socket::SSL::SSL_VERIFY_PEER(); $SSL_VERIFY_FAIL_IF_NO_PEER_CERT = IO::Socket::SSL::SSL_VERIFY_FAIL_IF_NO_PEER_CERT(); *SSL_ERROR = \$IO::Socket::SSL::SSL_ERROR; $SSL_REUSE_CTX = 'IO::Socket::SSL'->VERSION >= 1.969; 1 } } || die("no SSL support using IO::Socket::SSL: $@") |
| 315 | 0 | 30 | 0 | $time ||= $self->{'loop'}->looptime |
| 389 | 0 | 0 | 0 | $ip ne $dst->{'addr'} or $port ne $dst->{'port'} |
| 470 | 0 | 0 | 0 | $!{'EAGAIN'} or $!{'EWOULDBLOCK'} |
| 488 | 0 | 0 | 86 | $hdrpos < 0 and length $fo->{'rbuf'} > $MAX_SIP_HEADER or $hdrpos > $MAX_SIP_HEADER |
| 559 | 0 | 0 | 0 | $rv || $! |
| 567 | 0 | 15 | 0 | $!{'EALREADY'} or $!{'EINPROGRESS'} |
| 622 | 0 | 0 | 0 | $!{'EAGAIN'} or $!{'EWOULDBLOCK'} |