Source file "io/undertow/protocols/ssl/ALPNHackClientHelloExplorer.java" was not found during generation of report.
| Element | Missed Instructions | Cov. | Missed Branches | Cov. | Missed | Cxty | Missed | Lines | Missed | Methods |
| Total | 648 of 648 | 0% | 80 of 80 | 0% | 56 | 56 | 165 | 165 | 16 | 16 |
| rewriteClientHello(byte[], List) | 0% | 0% | 7 | 7 | 28 | 28 | 1 | 1 | ||
| exploreExtensions(ByteBuffer, List, ByteArrayOutputStream) | 0% | 0% | 6 | 6 | 24 | 24 | 1 | 1 | ||
| exploreClientHello(ByteBuffer, List, ByteArrayOutputStream) | 0% | 0% | 8 | 8 | 21 | 21 | 1 | 1 | ||
| generateAlpnExtension(List) | 0% | 0% | 4 | 4 | 17 | 17 | 1 | 1 | ||
| exploreClientHello(ByteBuffer) | 0% | 0% | 8 | 8 | 15 | 15 | 1 | 1 | ||
| exploreHandshake(ByteBuffer, byte, byte, int, List, ByteArrayOutputStream) | 0% | 0% | 5 | 5 | 16 | 16 | 1 | 1 | ||
| exploreTLSRecord(ByteBuffer, byte, byte, byte, List, ByteArrayOutputStream) | 0% | 0% | 4 | 4 | 13 | 13 | 1 | 1 | ||
| exploreALPNExt(ByteBuffer, List) | 0% | 0% | 2 | 2 | 5 | 5 | 1 | 1 | ||
| getInt24(ByteBuffer) | 0% | n/a | 1 | 1 | 2 | 2 | 1 | 1 | ||
| processByteVector(ByteBuffer, int, ByteArrayOutputStream) | 0% | 0% | 3 | 3 | 5 | 5 | 1 | 1 | ||
| writeInt16(ByteArrayOutputStream, int) | 0% | 0% | 2 | 2 | 4 | 4 | 1 | 1 | ||
| readByteVector8(ByteBuffer) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| processByteVector8(ByteBuffer, ByteArrayOutputStream) | 0% | 0% | 2 | 2 | 5 | 5 | 1 | 1 | ||
| getInt16(ByteBuffer) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 | ||
| processByteVector16(ByteBuffer, ByteArrayOutputStream) | 0% | n/a | 1 | 1 | 4 | 4 | 1 | 1 | ||
| getInt8(ByteBuffer) | 0% | n/a | 1 | 1 | 1 | 1 | 1 | 1 |