function CaBundle::isOpensslParseSafe
Test if it is safe to use the PHP function openssl_x509_parse().
This checks if OpenSSL extensions is vulnerable to remote code execution via the exploit documented as CVE-2013-6420.
Return value
bool
2 calls to CaBundle::isOpensslParseSafe()
- TlsHelper::getCertificateNames in vendor/
composer/ composer/ src/ Composer/ Util/ TlsHelper.php - Extract DNS names out of an X.509 certificate.
- TlsHelper::isOpensslParseSafe in vendor/
composer/ composer/ src/ Composer/ Util/ TlsHelper.php - Test if it is safe to use the PHP function openssl_x509_parse().
File
-
vendor/
composer/ ca-bundle/ src/ CaBundle.php, line 194
Class
- CaBundle
- @author Chris Smith <chris@cs278.org> @author Jordi Boggiano <j.boggiano@seld.be>
Namespace
Composer\CaBundleCode
public static function isOpensslParseSafe() {
return true;
}