at path:
ROOT
/
wp-includes
/
Requests
/
src
/
Ssl.php
run:
R
W
Run
Auth
DIR
2024-09-15 08:00:44
R
W
Run
Cookie
DIR
2024-06-24 17:16:39
R
W
Run
Exception
DIR
2024-09-15 08:01:08
R
W
Run
Proxy
DIR
2024-09-15 08:01:41
R
W
Run
Response
DIR
2024-09-15 08:01:51
R
W
Run
Transport
DIR
2024-09-15 08:02:03
R
W
Run
Utility
DIR
2024-06-24 17:16:39
R
W
Run
Auth.php
860 By
2022-12-15 21:32:17
R
W
Run
Delete
Rename
Autoload.php
9.12 KB
2023-04-05 13:12:26
R
W
Run
Delete
Rename
Capability.php
652 By
2023-04-05 13:12:26
R
W
Run
Delete
Rename
Cookie.php
15.03 KB
2024-09-04 11:48:32
R
W
Run
Delete
Rename
Exception.php
1.09 KB
2022-12-15 21:32:17
R
W
Run
Delete
Rename
HookManager.php
709 By
2022-12-15 21:32:17
R
W
Run
Delete
Rename
Hooks.php
2.96 KB
2023-10-12 12:34:33
R
W
Run
Delete
Rename
IdnaEncoder.php
12.14 KB
2023-04-05 13:12:26
R
W
Run
Delete
Rename
Ipv6.php
5.51 KB
2022-12-15 21:32:17
R
W
Run
Delete
Rename
Iri.php
28.93 KB
2023-10-12 12:34:33
R
W
Run
Delete
Rename
Port.php
1.47 KB
2022-12-15 21:32:17
R
W
Run
Delete
Rename
Proxy.php
867 By
2022-12-15 21:32:17
R
W
Run
Delete
Rename
Requests.php
33.2 KB
2024-09-04 11:48:32
R
W
Run
Delete
Rename
Response.php
4.18 KB
2023-04-05 13:12:26
R
W
Run
Delete
Rename
Session.php
8.89 KB
2023-10-12 12:34:33
R
W
Run
Delete
Rename
Ssl.php
5.3 KB
2022-12-15 21:32:17
R
W
Run
Delete
Rename
Transport.php
1.51 KB
2022-12-15 21:32:17
R
W
Run
Delete
Rename
error_log
4.48 KB
2026-02-05 03:47:01
R
W
Run
Delete
Rename
error_log
up
📄
Ssl.php
Save
<?php /** * SSL utilities for Requests * * @package Requests\Utilities */ namespace WpOrg\Requests; use WpOrg\Requests\Exception\InvalidArgument; use WpOrg\Requests\Utility\InputValidator; /** * SSL utilities for Requests * * Collection of utilities for working with and verifying SSL certificates. * * @package Requests\Utilities */ final class Ssl { /** * Verify the certificate against common name and subject alternative names * * Unfortunately, PHP doesn't check the certificate against the alternative * names, leading things like 'https://www.github.com/' to be invalid. * * @link https://tools.ietf.org/html/rfc2818#section-3.1 RFC2818, Section 3.1 * * @param string|Stringable $host Host name to verify against * @param array $cert Certificate data from openssl_x509_parse() * @return bool * @throws \WpOrg\Requests\Exception\InvalidArgument When the passed $host argument is not a string or a stringable object. * @throws \WpOrg\Requests\Exception\InvalidArgument When the passed $cert argument is not an array or array accessible. */ public static function verify_certificate($host, $cert) { if (InputValidator::is_string_or_stringable($host) === false) { throw InvalidArgument::create(1, '$host', 'string|Stringable', gettype($host)); } if (InputValidator::has_array_access($cert) === false) { throw InvalidArgument::create(2, '$cert', 'array|ArrayAccess', gettype($cert)); } $has_dns_alt = false; // Check the subjectAltName if (!empty($cert['extensions']['subjectAltName'])) { $altnames = explode(',', $cert['extensions']['subjectAltName']); foreach ($altnames as $altname) { $altname = trim($altname); if (strpos($altname, 'DNS:') !== 0) { continue; } $has_dns_alt = true; // Strip the 'DNS:' prefix and trim whitespace $altname = trim(substr($altname, 4)); // Check for a match if (self::match_domain($host, $altname) === true) { return true; } } if ($has_dns_alt === true) { return false; } } // Fall back to checking the common name if we didn't get any dNSName // alt names, as per RFC2818 if (!empty($cert['subject']['CN'])) { // Check for a match return (self::match_domain($host, $cert['subject']['CN']) === true); } return false; } /** * Verify that a reference name is valid * * Verifies a dNSName for HTTPS usage, (almost) as per Firefox's rules: * - Wildcards can only occur in a name with more than 3 components * - Wildcards can only occur as the last character in the first * component * - Wildcards may be preceded by additional characters * * We modify these rules to be a bit stricter and only allow the wildcard * character to be the full first component; that is, with the exclusion of * the third rule. * * @param string|Stringable $reference Reference dNSName * @return boolean Is the name valid? * @throws \WpOrg\Requests\Exception\InvalidArgument When the passed argument is not a string or a stringable object. */ public static function verify_reference_name($reference) { if (InputValidator::is_string_or_stringable($reference) === false) { throw InvalidArgument::create(1, '$reference', 'string|Stringable', gettype($reference)); } if ($reference === '') { return false; } if (preg_match('`\s`', $reference) > 0) { // Whitespace detected. This can never be a dNSName. return false; } $parts = explode('.', $reference); if ($parts !== array_filter($parts)) { // DNSName cannot contain two dots next to each other. return false; } // Check the first part of the name $first = array_shift($parts); if (strpos($first, '*') !== false) { // Check that the wildcard is the full part if ($first !== '*') { return false; } // Check that we have at least 3 components (including first) if (count($parts) < 2) { return false; } } // Check the remaining parts foreach ($parts as $part) { if (strpos($part, '*') !== false) { return false; } } // Nothing found, verified! return true; } /** * Match a hostname against a dNSName reference * * @param string|Stringable $host Requested host * @param string|Stringable $reference dNSName to match against * @return boolean Does the domain match? * @throws \WpOrg\Requests\Exception\InvalidArgument When either of the passed arguments is not a string or a stringable object. */ public static function match_domain($host, $reference) { if (InputValidator::is_string_or_stringable($host) === false) { throw InvalidArgument::create(1, '$host', 'string|Stringable', gettype($host)); } // Check if the reference is blocklisted first if (self::verify_reference_name($reference) !== true) { return false; } // Check for a direct match if ((string) $host === (string) $reference) { return true; } // Calculate the valid wildcard match if the host is not an IP address // Also validates that the host has 3 parts or more, as per Firefox's ruleset, // as a wildcard reference is only allowed with 3 parts or more, so the // comparison will never match if host doesn't contain 3 parts or more as well. if (ip2long($host) === false) { $parts = explode('.', $host); $parts[0] = '*'; $wildcard = implode('.', $parts); if ($wildcard === (string) $reference) { return true; } } return false; } }