| line |
true |
false |
branch |
|
31
|
0 |
0 |
unless ($pack->{'data'}) |
|
32
|
0 |
0 |
$ssh->protocol == &PROTOCOL_SSH2() ? : |
|
34
|
0 |
0 |
if ($pack->{'type'}) |
|
47
|
0 |
0 |
if (my $packet = $class->read_poll($ssh)) |
|
54
|
0 |
0 |
if $len == 0 |
|
55
|
0 |
0 |
unless (defined $len) |
|
56
|
0 |
0 |
if $! == 11 or $! == 11 |
|
72
|
0 |
0 |
if ($ssh->protocol == &PROTOCOL_SSH2()) { } |
|
80
|
0 |
0 |
unless $packet |
|
83
|
0 |
0 |
if ($ssh->protocol == &PROTOCOL_SSH2()) { } |
|
84
|
0 |
0 |
if ($type == &SSH2_MSG_DISCONNECT()) |
|
90
|
0 |
0 |
if ($type == &SSH_MSG_DISCONNECT()) |
|
95
|
0 |
0 |
if ($type == $debug) { } |
|
|
0 |
0 |
elsif ($type == $ignore) { } |
|
109
|
0 |
0 |
unless (defined &Net::SSH::Perl::Packet::_crc32) |
|
111
|
0 |
0 |
if $@ |
|
115
|
0 |
0 |
if $incoming->length < 12 |
|
118
|
0 |
0 |
unless defined $len |
|
120
|
0 |
0 |
if $incoming->length < 4 + $pad_len |
|
127
|
0 |
0 |
if (my $cipher = $ssh->receive_cipher) |
|
137
|
0 |
0 |
unless $crc == $stored_crc |
|
142
|
0 |
0 |
if (my $comp = $ssh->compression) |
|
161
|
0 |
0 |
if ($kex) |
|
165
|
0 |
0 |
if $authlen = $ciph && $ciph->authlen |
|
167
|
0 |
0 |
$mac && $mac->enabled ? : |
|
168
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
169
|
0 |
0 |
$mac && $mac->enabled && $mac->etm || $authlen ? : |
|
173
|
0 |
0 |
unless ($ssh->{'session'}{'_last_packet_length'}) |
|
174
|
0 |
0 |
if $incoming->length < $block_size |
|
177
|
0 |
0 |
if ($authlen) { } |
|
|
0 |
0 |
elsif ($aadlen) { } |
|
183
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
191
|
0 |
0 |
if ($plen < 5 or $plen > 262144) |
|
196
|
0 |
0 |
$aadlen ? : |
|
197
|
0 |
0 |
if $need % $block_size |
|
199
|
0 |
0 |
if $aadlen and $incoming->length < $aadlen + $need + $maclen + $authlen or not $aadlen and $incoming->length < $need + $block_size + $maclen |
|
204
|
0 |
0 |
if ($mac and $mac->enabled) { } |
|
|
0 |
0 |
elsif ($authlen) { } |
|
205
|
0 |
0 |
if ($mac->etm) { } |
|
223
|
0 |
0 |
if ($mac and $mac->enabled) { } |
|
224
|
0 |
0 |
unless ($mac->etm) |
|
225
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
230
|
0 |
0 |
unless $macbuf eq $stored_mac |
|
233
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
|
0 |
0 |
if $mac->etm |
|
236
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
243
|
0 |
0 |
unless $padlen >= 4 |
|
250
|
0 |
0 |
if ($comp and $comp->enabled) |
|
265
|
0 |
0 |
if ($pack->type != $type) |
|
266
|
0 |
0 |
if ($pack->type == &SSH2_MSG_GLOBAL_REQUEST()) { } |
|
281
|
0 |
0 |
if ($pack->{'ssh'}->protocol == &PROTOCOL_SSH2()) { } |
|
294
|
0 |
0 |
unless (defined &Net::SSH::Perl::Packet::_crc32) |
|
298
|
0 |
0 |
if ($buffer->length >= &MAX_PACKET_SIZE() - 30) |
|
304
|
0 |
0 |
if (my $comp = $ssh->compression) |
|
322
|
0 |
0 |
$cipher ? : |
|
336
|
0 |
0 |
if ($kex) |
|
340
|
0 |
0 |
if $authlen = $ciph && $ciph->authlen |
|
342
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
343
|
0 |
0 |
$mac && $mac->enabled && $mac->etm || $authlen ? : |
|
346
|
0 |
0 |
if ($comp and $comp->enabled) |
|
354
|
0 |
0 |
if $padlen < 4 |
|
355
|
0 |
0 |
$ciph ? : |
|
360
|
0 |
0 |
unless $mac and $mac->etm |
|
362
|
0 |
0 |
$ciph && $ciph->enabled ? : |
|
363
|
0 |
0 |
if $mac and $mac->etm |
|
366
|
0 |
0 |
if ($mac and $mac->enabled) |
|
367
|
0 |
0 |
$mac->etm ? : |
|
373
|
0 |
0 |
if $mac and $mac->enabled |
|
383
|
0 |
0 |
if @_ |
|
393
|
0 |
0 |
if $meth eq 'DESTROY' |
|
395
|
0 |
0 |
if ($pack->{'data'}->can($meth)) { } |