| line |
true |
false |
branch |
|
59
|
30 |
0 |
defined $DNOIDs{$_[0]} ? : |
|
63
|
9 |
0 |
defined $DNAttribs{$_[0]} ? : |
|
101
|
1 |
1 |
if ($CI{'IssuerDN'} eq $CI{'SubjectDN'}) |
|
102
|
1 |
0 |
if (not defined $CI{'authorityKeyIdentifierSkid'} or $CI{'subjectKeyIdentifier'} eq $CI{'authorityKeyIdentifierSkid'}) |
|
104
|
1 |
0 |
unless (defined $lastMod) |
|
113
|
2 |
0 |
$CI{'Start'} < $now && $CI{'End'} > $now ? : |
|
114
|
0 |
2 |
defined $CI{'basicConstraintsPathLen'} && $CI{'basicConstraintsPathLen'} < $#_ - $#PathLen ? : |
|
121
|
0 |
2 |
if (not $SignerPurposeCA[-1] || $SignerCertSignPurpose[-1] and $lastkeyUsageDigitalSignature) { } |
|
122
|
0 |
0 |
if ($CI{'SubjectDN'} eq "$CI{'IssuerDN'}/CN=proxy") { } |
|
|
0 |
0 |
elsif ($CI{'SubjectDN'} eq "$CI{'IssuerDN'}/CN=limited proxy") { } |
|
|
0 |
0 |
elsif ($CI{'ProxyInfo'} eq 'RFC' or $CI{'ProxyInfo'} eq 'Pre-RFC') { } |
|
123
|
0 |
0 |
if ($CI{'IssuerDN'} =~ m[/CN=limited proxy$]) { } |
|
128
|
0 |
0 |
if (not $CI{'SubjectDN'} =~ m[^$CI{'IssuerDN'}/CN=[0-9]+$]) { } |
|
|
0 |
0 |
elsif ($CI{'IssuerDN'} =~ m[/CN=(?:limited )?proxy$]) { } |
|
135
|
1 |
1 |
if ($CI{'basicConstraintsCA'} or $CI{'keyUsageKeyCertSign'}) { } |
|
142
|
0 |
2 |
defined $CI{"ProxyPathlen$CI{'ProxyInfo'}"} && $CI{"ProxyPathlen$CI{'ProxyInfo'}"} < $#_ - $#ProxyPathLen ? : |
|
159
|
0 |
2 |
if ($i > 0 and $GSIType[$i] =~ /^Bad/) |
|
160
|
0 |
2 |
unless ($Time[$i]) |
|
161
|
0 |
0 |
if (not $Signed[$i] and $i != 0 || $Self[$i]) |
|
162
|
0 |
2 |
if ($i != 0 and $Self[$i]) |
|
163
|
2 |
0 |
if (not $GSIType[$i] =~ /^(?:Lega[sc]y|Limited|RFC|Pre-RFC) Proxy$/ and $i != 0 || $Self[$i]) |
|
164
|
0 |
2 |
unless ($SignerPurposeCA[$i]) |
|
165
|
0 |
2 |
unless ($SignerCertSignPurpose[$i]) |
|
167
|
0 |
2 |
unless ($PathLen[$i]) |
|
168
|
0 |
2 |
unless ($ProxyPathLen[$i]) |
|
181
|
1 |
0 |
defined $in{'trustedCAdirs'} ? : |
|
182
|
1 |
0 |
defined $in{'suppliedcerts'} ? : |
|
183
|
0 |
1 |
defined $in{'trustedCAs'} ? : |
|
227
|
0 |
1 |
$remainingtrusted > -1 ? : |
|
237
|
2 |
0 |
if ($_ =~ /^$IHash[-1].[0-9]+$/) |
|
240
|
1 |
0 |
if ($cert{$file} eq '' and defined $dir{$file}) |
|
254
|
1 |
0 |
if ($IDNs[-1] eq $dn{$file} and !defined($AKID[-1]) || $AKID[-1] eq $skid{$file}) |
|
256
|
0 |
1 |
if ($DNs[-1] eq $IDNs[-1] and !defined($AKID[-1]) || $SKID[-1] eq $AKID[-1]) { } |
|
275
|
0 |
1 |
if $found eq 'no' |
|
276
|
1 |
0 |
if ($DNs[-1] eq $IDNs[-1] and !defined($AKID[-1]) || $SKID[-1] eq $AKID[-1]) |
|
310
|
2 |
5 |
if ($type eq 'md5WithRSA') { } |
|
|
5 |
0 |
elsif ($type eq 'sha1WithRSA') { } |
|
|
0 |
0 |
elsif ($type eq 'md2WithRSA') { } |
|
311
|
2 |
0 |
if (eval 'require Digest::MD5') |
|
317
|
5 |
0 |
if (eval 'require Digest::SHA1') |
|
323
|
0 |
0 |
if (eval 'require Digest::MD2') |
|
343
|
5 |
0 |
if (defined $digestTBS) |
|
351
|
2 |
0 |
if digestTBS($digestType, $TBS) eq rsaverify($SignedInfo, $chex, $nhex) |