mirror of
https://github.com/OpenXE-org/OpenXE.git
synced 2025-02-11 12:10:09 +01:00
190 lines
6.1 KiB
PHP
190 lines
6.1 KiB
PHP
<?php
|
|
|
|
/**
|
|
* @see https://github.com/laminas/laminas-validator for the canonical source repository
|
|
* @copyright https://github.com/laminas/laminas-validator/blob/master/COPYRIGHT.md
|
|
* @license https://github.com/laminas/laminas-validator/blob/master/LICENSE.md New BSD License
|
|
*/
|
|
|
|
namespace Laminas\Validator;
|
|
|
|
use Traversable;
|
|
|
|
class Ip extends AbstractValidator
|
|
{
|
|
const INVALID = 'ipInvalid';
|
|
const NOT_IP_ADDRESS = 'notIpAddress';
|
|
|
|
/**
|
|
* @var array
|
|
*/
|
|
protected $messageTemplates = [
|
|
self::INVALID => 'Invalid type given. String expected',
|
|
self::NOT_IP_ADDRESS => 'The input does not appear to be a valid IP address',
|
|
];
|
|
|
|
/**
|
|
* Internal options
|
|
*
|
|
* @var array
|
|
*/
|
|
protected $options = [
|
|
'allowipv4' => true, // Enable IPv4 Validation
|
|
'allowipv6' => true, // Enable IPv6 Validation
|
|
'allowipvfuture' => false, // Enable IPvFuture Validation
|
|
'allowliteral' => true, // Enable IPs in literal format (only IPv6 and IPvFuture)
|
|
];
|
|
|
|
/**
|
|
* Sets the options for this validator
|
|
*
|
|
* @param array|Traversable $options
|
|
* @throws Exception\InvalidArgumentException If there is any kind of IP allowed or $options is not an array
|
|
* or Traversable.
|
|
* @return AbstractValidator
|
|
*/
|
|
public function setOptions($options = [])
|
|
{
|
|
parent::setOptions($options);
|
|
|
|
if (! $this->options['allowipv4'] && ! $this->options['allowipv6'] && ! $this->options['allowipvfuture']) {
|
|
throw new Exception\InvalidArgumentException('Nothing to validate. Check your options');
|
|
}
|
|
|
|
return $this;
|
|
}
|
|
|
|
/**
|
|
* Returns true if and only if $value is a valid IP address
|
|
*
|
|
* @param mixed $value
|
|
* @return bool
|
|
*/
|
|
public function isValid($value)
|
|
{
|
|
if (! is_string($value)) {
|
|
$this->error(self::INVALID);
|
|
return false;
|
|
}
|
|
|
|
$this->setValue($value);
|
|
|
|
if ($this->options['allowipv4'] && $this->validateIPv4($value)) {
|
|
return true;
|
|
} else {
|
|
if ((bool) $this->options['allowliteral']) {
|
|
static $regex = '/^\[(.*)\]$/';
|
|
if ((bool) preg_match($regex, $value, $matches)) {
|
|
$value = $matches[1];
|
|
}
|
|
}
|
|
|
|
if (($this->options['allowipv6'] && $this->validateIPv6($value)) ||
|
|
($this->options['allowipvfuture'] && $this->validateIPvFuture($value))
|
|
) {
|
|
return true;
|
|
}
|
|
}
|
|
$this->error(self::NOT_IP_ADDRESS);
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Validates an IPv4 address
|
|
*
|
|
* @param string $value
|
|
* @return bool
|
|
*/
|
|
protected function validateIPv4($value)
|
|
{
|
|
if (preg_match('/^([01]{8}\.){3}[01]{8}\z/i', $value)) {
|
|
// binary format 00000000.00000000.00000000.00000000
|
|
$value = bindec(substr($value, 0, 8)) . '.' . bindec(substr($value, 9, 8)) . '.'
|
|
. bindec(substr($value, 18, 8)) . '.' . bindec(substr($value, 27, 8));
|
|
} elseif (preg_match('/^([0-9]{3}\.){3}[0-9]{3}\z/i', $value)) {
|
|
// octet format 777.777.777.777
|
|
$value = (int) substr($value, 0, 3) . '.' . (int) substr($value, 4, 3) . '.'
|
|
. (int) substr($value, 8, 3) . '.' . (int) substr($value, 12, 3);
|
|
} elseif (preg_match('/^([0-9a-f]{2}\.){3}[0-9a-f]{2}\z/i', $value)) {
|
|
// hex format ff.ff.ff.ff
|
|
$value = hexdec(substr($value, 0, 2)) . '.' . hexdec(substr($value, 3, 2)) . '.'
|
|
. hexdec(substr($value, 6, 2)) . '.' . hexdec(substr($value, 9, 2));
|
|
}
|
|
|
|
$ip2long = ip2long($value);
|
|
if ($ip2long === false) {
|
|
return false;
|
|
}
|
|
|
|
return $value == long2ip($ip2long);
|
|
}
|
|
|
|
/**
|
|
* Validates an IPv6 address
|
|
*
|
|
* @param string $value Value to check against
|
|
* @return bool True when $value is a valid ipv6 address
|
|
* False otherwise
|
|
*/
|
|
protected function validateIPv6($value)
|
|
{
|
|
if (strlen($value) < 3) {
|
|
return $value == '::';
|
|
}
|
|
|
|
if (strpos($value, '.')) {
|
|
$lastcolon = strrpos($value, ':');
|
|
if (! ($lastcolon && $this->validateIPv4(substr($value, $lastcolon + 1)))) {
|
|
return false;
|
|
}
|
|
|
|
$value = substr($value, 0, $lastcolon) . ':0:0';
|
|
}
|
|
|
|
if (strpos($value, '::') === false) {
|
|
return preg_match('/\A(?:[a-f0-9]{1,4}:){7}[a-f0-9]{1,4}\z/i', $value);
|
|
}
|
|
|
|
$colonCount = substr_count($value, ':');
|
|
if ($colonCount < 8) {
|
|
return preg_match('/\A(?::|(?:[a-f0-9]{1,4}:)+):(?:(?:[a-f0-9]{1,4}:)*[a-f0-9]{1,4})?\z/i', $value);
|
|
}
|
|
|
|
// special case with ending or starting double colon
|
|
if ($colonCount == 8) {
|
|
return preg_match('/\A(?:::)?(?:[a-f0-9]{1,4}:){6}[a-f0-9]{1,4}(?:::)?\z/i', $value);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Validates an IPvFuture address.
|
|
*
|
|
* IPvFuture is loosely defined in the Section 3.2.2 of RFC 3986
|
|
*
|
|
* @param string $value Value to check against
|
|
* @return bool True when $value is a valid IPvFuture address
|
|
* False otherwise
|
|
*/
|
|
protected function validateIPvFuture($value)
|
|
{
|
|
/*
|
|
* ABNF:
|
|
* IPvFuture = "v" 1*HEXDIG "." 1*( unreserved / sub-delims / ":" )
|
|
* unreserved = ALPHA / DIGIT / "-" / "." / "_" / "~"
|
|
* sub-delims = "!" / "$" / "&" / "'" / "(" / ")" / "*" / "+" / ","
|
|
* / ";" / "="
|
|
*/
|
|
static $regex = '/^v([[:xdigit:]]+)\.[[:alnum:]\-\._~!\$&\'\(\)\*\+,;=:]+$/';
|
|
|
|
$result = (bool) preg_match($regex, $value, $matches);
|
|
|
|
/*
|
|
* "As such, implementations must not provide the version flag for the
|
|
* existing IPv4 and IPv6 literal address forms described below."
|
|
*/
|
|
return $result && $matches[1] != 4 && $matches[1] != 6;
|
|
}
|
|
}
|