| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package LWP::Protocol::https; |
|
2
|
|
|
|
|
|
|
|
|
3
|
3
|
|
|
3
|
|
346272
|
use strict; |
|
|
3
|
|
|
|
|
21
|
|
|
|
3
|
|
|
|
|
88
|
|
|
4
|
3
|
|
|
3
|
|
18
|
use warnings; |
|
|
3
|
|
|
|
|
6
|
|
|
|
3
|
|
|
|
|
154
|
|
|
5
|
|
|
|
|
|
|
|
|
6
|
|
|
|
|
|
|
our $VERSION = '6.11'; |
|
7
|
|
|
|
|
|
|
|
|
8
|
3
|
|
|
3
|
|
31
|
use base qw(LWP::Protocol::http); |
|
|
3
|
|
|
|
|
7
|
|
|
|
3
|
|
|
|
|
1640
|
|
|
9
|
|
|
|
|
|
|
require Net::HTTPS; |
|
10
|
|
|
|
|
|
|
|
|
11
|
|
|
|
|
|
|
sub socket_type |
|
12
|
|
|
|
|
|
|
{ |
|
13
|
12
|
|
|
12
|
0
|
293476
|
return "https"; |
|
14
|
|
|
|
|
|
|
} |
|
15
|
|
|
|
|
|
|
|
|
16
|
|
|
|
|
|
|
sub _extra_sock_opts |
|
17
|
|
|
|
|
|
|
{ |
|
18
|
10
|
|
|
10
|
|
22087
|
my $self = shift; |
|
19
|
10
|
50
|
|
|
|
25
|
my %ssl_opts = %{$self->{ua}{ssl_opts} || {}}; |
|
|
10
|
|
|
|
|
121
|
|
|
20
|
10
|
100
|
|
|
|
46
|
if (delete $ssl_opts{verify_hostname}) { |
|
21
|
6
|
|
50
|
|
|
65
|
$ssl_opts{SSL_verify_mode} ||= 1; |
|
22
|
6
|
|
|
|
|
17
|
$ssl_opts{SSL_verifycn_scheme} = 'www'; |
|
23
|
|
|
|
|
|
|
} |
|
24
|
|
|
|
|
|
|
else { |
|
25
|
4
|
50
|
|
|
|
46
|
if ( $Net::HTTPS::SSL_SOCKET_CLASS eq 'Net::SSL' ) { |
|
26
|
0
|
|
|
|
|
0
|
$ssl_opts{SSL_verifycn_scheme} = ''; |
|
27
|
|
|
|
|
|
|
} else { |
|
28
|
4
|
|
|
|
|
23
|
$ssl_opts{SSL_verifycn_scheme} = 'none'; |
|
29
|
|
|
|
|
|
|
} |
|
30
|
|
|
|
|
|
|
} |
|
31
|
10
|
100
|
|
|
|
34
|
if ($ssl_opts{SSL_verify_mode}) { |
|
32
|
6
|
0
|
33
|
|
|
27
|
unless (exists $ssl_opts{SSL_ca_file} || exists $ssl_opts{SSL_ca_path}) { |
|
33
|
0
|
0
|
0
|
|
|
0
|
if ($Net::HTTPS::SSL_SOCKET_CLASS eq 'IO::Socket::SSL' |
|
|
|
0
|
0
|
|
|
|
|
|
34
|
|
|
|
|
|
|
&& defined &IO::Socket::SSL::default_ca |
|
35
|
|
|
|
|
|
|
&& IO::Socket::SSL::default_ca() ) { |
|
36
|
|
|
|
|
|
|
# IO::Socket::SSL has a usable default CA |
|
37
|
|
|
|
|
|
|
} elsif ( my $cafile = eval { |
|
38
|
0
|
|
|
|
|
0
|
require Mozilla::CA; |
|
39
|
0
|
|
|
|
|
0
|
Mozilla::CA::SSL_ca_file() |
|
40
|
|
|
|
|
|
|
}) { |
|
41
|
|
|
|
|
|
|
# use Mozilla::CA |
|
42
|
0
|
|
|
|
|
0
|
$ssl_opts{SSL_ca_file} = $cafile; |
|
43
|
|
|
|
|
|
|
} else { |
|
44
|
0
|
|
|
|
|
0
|
die <<'EOT'; |
|
45
|
|
|
|
|
|
|
Can't verify SSL peers without knowing which Certificate Authorities to trust. |
|
46
|
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
This problem can be fixed by either setting the PERL_LWP_SSL_CA_FILE |
|
48
|
|
|
|
|
|
|
environment variable to the file where your trusted CA are, or by installing |
|
49
|
|
|
|
|
|
|
the Mozilla::CA module for set of commonly trusted CAs. |
|
50
|
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
To completly disable the verification that you talk to the correct SSL peer you |
|
52
|
|
|
|
|
|
|
can set SSL_verify_mode to 0 within ssl_opts. But, if you do this you can't be |
|
53
|
|
|
|
|
|
|
sure that you communicate with the expected peer. |
|
54
|
|
|
|
|
|
|
EOT |
|
55
|
|
|
|
|
|
|
} |
|
56
|
|
|
|
|
|
|
} |
|
57
|
|
|
|
|
|
|
} |
|
58
|
10
|
|
|
|
|
35
|
$self->{ssl_opts} = \%ssl_opts; |
|
59
|
10
|
|
|
|
|
73
|
return (%ssl_opts, $self->SUPER::_extra_sock_opts); |
|
60
|
|
|
|
|
|
|
} |
|
61
|
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
# This is a subclass of LWP::Protocol::http. |
|
63
|
|
|
|
|
|
|
# That parent class calls ->_check_sock() during the |
|
64
|
|
|
|
|
|
|
# request method. This allows us to hook in and run checks |
|
65
|
|
|
|
|
|
|
# sub _check_sock |
|
66
|
|
|
|
|
|
|
# { |
|
67
|
|
|
|
|
|
|
# my($self, $req, $sock) = @_; |
|
68
|
|
|
|
|
|
|
# } |
|
69
|
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
sub _get_sock_info |
|
71
|
|
|
|
|
|
|
{ |
|
72
|
8
|
|
|
8
|
|
718401
|
my $self = shift; |
|
73
|
8
|
|
|
|
|
69
|
$self->SUPER::_get_sock_info(@_); |
|
74
|
8
|
|
|
|
|
2126
|
my($res, $sock) = @_; |
|
75
|
8
|
50
|
33
|
|
|
164
|
if ($sock->can('get_sslversion') and my $sslversion = $sock->get_sslversion) { |
|
76
|
8
|
|
|
|
|
304
|
$res->header("Client-SSL-Version" => $sslversion); |
|
77
|
|
|
|
|
|
|
} |
|
78
|
8
|
|
|
|
|
695
|
$res->header("Client-SSL-Cipher" => $sock->get_cipher); |
|
79
|
8
|
|
|
|
|
760
|
my $cert = $sock->get_peer_certificate; |
|
80
|
8
|
50
|
|
|
|
64
|
if ($cert) { |
|
81
|
8
|
|
|
|
|
51
|
$res->header("Client-SSL-Cert-Subject" => $cert->subject_name); |
|
82
|
8
|
|
|
|
|
1182
|
$res->header("Client-SSL-Cert-Issuer" => $cert->issuer_name); |
|
83
|
|
|
|
|
|
|
} |
|
84
|
8
|
50
|
|
|
|
1026
|
if (!$self->{ssl_opts}{SSL_verify_mode}) { |
|
|
|
0
|
|
|
|
|
|
|
85
|
8
|
|
|
|
|
61
|
$res->push_header("Client-SSL-Warning" => "Peer certificate not verified"); |
|
86
|
|
|
|
|
|
|
} |
|
87
|
|
|
|
|
|
|
elsif (!$self->{ssl_opts}{SSL_verifycn_scheme}) { |
|
88
|
0
|
|
|
|
|
0
|
$res->push_header("Client-SSL-Warning" => "Peer hostname match with certificate not verified"); |
|
89
|
|
|
|
|
|
|
} |
|
90
|
8
|
|
|
|
|
442
|
$res->header("Client-SSL-Socket-Class" => $Net::HTTPS::SSL_SOCKET_CLASS); |
|
91
|
|
|
|
|
|
|
} |
|
92
|
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
# upgrade plain socket to SSL, used for CONNECT tunnel when proxying https |
|
94
|
|
|
|
|
|
|
# will only work if the underlying socket class of Net::HTTPS is |
|
95
|
|
|
|
|
|
|
# IO::Socket::SSL, but code will only be called in this case |
|
96
|
|
|
|
|
|
|
if ( $Net::HTTPS::SSL_SOCKET_CLASS->can('start_SSL')) { |
|
97
|
|
|
|
|
|
|
*_upgrade_sock = sub { |
|
98
|
6
|
|
|
6
|
|
98174
|
my ($self,$sock,$url) = @_; |
|
99
|
6
|
|
|
|
|
29
|
$sock = LWP::Protocol::https::Socket->start_SSL( $sock, |
|
100
|
|
|
|
|
|
|
SSL_verifycn_name => $url->host, |
|
101
|
|
|
|
|
|
|
SSL_hostname => $url->host, |
|
102
|
|
|
|
|
|
|
$self->_extra_sock_opts, |
|
103
|
|
|
|
|
|
|
); |
|
104
|
6
|
50
|
|
|
|
84195
|
$@ = LWP::Protocol::https::Socket->errstr if ! $sock; |
|
105
|
6
|
|
|
|
|
33
|
return $sock; |
|
106
|
|
|
|
|
|
|
} |
|
107
|
|
|
|
|
|
|
} |
|
108
|
|
|
|
|
|
|
|
|
109
|
|
|
|
|
|
|
#----------------------------------------------------------- |
|
110
|
|
|
|
|
|
|
package LWP::Protocol::https::Socket; |
|
111
|
|
|
|
|
|
|
|
|
112
|
3
|
|
|
3
|
|
94243
|
use base qw(Net::HTTPS LWP::Protocol::http::SocketMethods); |
|
|
3
|
|
|
|
|
9
|
|
|
|
3
|
|
|
|
|
1648
|
|
|
113
|
|
|
|
|
|
|
|
|
114
|
|
|
|
|
|
|
1; |
|
115
|
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
__END__ |