Skip to main content
Drupal API
User account menu
  • Log in

Breadcrumb

  1. Drupal Core 11.1.x
  2. CaBundle.php

function CaBundle::isOpensslParseSafe

Test if it is safe to use the PHP function openssl_x509_parse().

This checks if OpenSSL extensions is vulnerable to remote code execution via the exploit documented as CVE-2013-6420.

Return value

bool

2 calls to CaBundle::isOpensslParseSafe()
TlsHelper::getCertificateNames in vendor/composer/composer/src/Composer/Util/TlsHelper.php
Extract DNS names out of an X.509 certificate.
TlsHelper::isOpensslParseSafe in vendor/composer/composer/src/Composer/Util/TlsHelper.php
Test if it is safe to use the PHP function openssl_x509_parse().

File

vendor/composer/ca-bundle/src/CaBundle.php, line 194

Class

CaBundle
@author Chris Smith <chris@cs278.org> @author Jordi Boggiano <j.boggiano@seld.be>

Namespace

Composer\CaBundle

Code

public static function isOpensslParseSafe() {
    return true;
}

API Navigation

  • Drupal Core 11.1.x
  • Topics
  • Classes
  • Functions
  • Constants
  • Globals
  • Files
  • Namespaces
  • Deprecated
  • Services
RSS feed
Powered by Drupal