Home
last modified time | relevance | path

Searched refs:unserialize (Results 1 – 25 of 302) sorted by relevance

12345678910>>...13

/PHP-7.4/ext/standard/tests/serialize/
H A Dbug25378.phpt2 Bug #25378 (unserialize() crashes with invalid data)
5 var_dump(unserialize("s:-1:\"\";"));
6 var_dump(unserialize("i:823"));
7 var_dump(unserialize("O:8:\"stdClass :0:{}"));
8 var_dump(unserialize("O:8:\"stdClass\"+0:{}"));
9 var_dump(unserialize("O:1000:\"stdClass\":0:{}"));
10 var_dump(unserialize("a:2:{i:0;s:2:\"12\":"));
14 var_dump(unserialize("s:3000:\"123\";"));
15 var_dump(unserialize("s:3000:\"123"));
16 var_dump(unserialize("s:3:\"123;"));
[all …]
H A Dinvalid_signs_in_lengths.phpt6 var_dump(unserialize('s:+1:"x";'));
7 var_dump(unserialize('s:-1:"x";'));
8 var_dump(unserialize('a:+0:{}'));
9 var_dump(unserialize('a:-0:{}'));
10 var_dump(unserialize('O:+8:"stdClass":0:{}'));
11 var_dump(unserialize('O:-8:"stdClass":0:{}'));
12 var_dump(unserialize('C:+11:"ArrayObject":0:{}'));
14 var_dump(unserialize('a:1:{i:0;r:+1;}'));
15 var_dump(unserialize('a:1:{i:0;r:-1;}'));
16 var_dump(unserialize('a:1:{i:0;R:+1;}'));
[all …]
H A Dmax_depth.phpt15 var_dump(unserialize(
19 var_dump(unserialize(
25 var_dump(unserialize(
29 var_dump(unserialize(
42 var_dump(unserialize(
46 var_dump(unserialize(
59 public function unserialize($str) {
67 var_dump(is_array(unserialize(
79 var_dump(unserialize(
83 var_dump(unserialize(
[all …]
H A D002.phpt2 Bug #25378 (unserialize() crashes with invalid data)
5 var_dump(unserialize('b:0;'));
6 var_dump(unserialize('b:1;'));
7 var_dump(unserialize('i:823;'));
8 var_dump(unserialize('s:0:"";'));
9 var_dump(unserialize('s:3:"foo";'));
10 var_dump(unserialize('a:1:{i:0;s:2:"12";}'));
11 var_dump(unserialize('a:2:{i:0;a:0:{}i:1;a:0:{}}'));
12 var_dump(unserialize('a:3:{i:0;s:3:"foo";i:1;s:3:"bar";i:2;s:3:"baz";}'));
13 var_dump(unserialize('O:8:"stdClass":0:{}'));
H A Dunserialize_large.phpt6 var_dump(unserialize("a:1000000000:{}"));
7 var_dump(unserialize("O:1000000000:\"\":0:{}"));
8 var_dump(unserialize("O:1:\"X\":1000000000:{}"));
9 var_dump(unserialize("C:1:\"X\":1000000000:{}"));
13 Notice: unserialize(): Error at offset 14 of 15 bytes in %s on line %d
16 Notice: unserialize(): Error at offset 2 of 20 bytes in %s on line %d
19 Notice: unserialize(): Error at offset 18 of 21 bytes in %s on line %d
24 Notice: unserialize(): Error at offset 20 of 21 bytes in %s on line %d
H A Dserialization_error_002.phpt2 Test unserialize(): error is indistinguishable from deserialized boolean
10 /* Prototype : proto mixed unserialize(string variable_representation)
16 echo "*** Testing unserialize() error/boolean distinction ***\n";
23 $deserialized_garbage = unserialize($garbage);
26 $deserialized_false = unserialize($serialized_false);
29 echo "unserialize error and deserialized false are identical? " . (bool) ($deserialized_false == $d…
33 return ($str == serialize(false) || @unserialize($str) !== false);
36 // Test unserialize error idiom
43 *** Testing unserialize() error/boolean distinction ***
46 Notice: unserialize(): Error at offset 0 of 27 bytes in %s%eserialization_error_002.php on line 20
[all …]
H A Dunserialize_error_001.phpt2 Test unserialize() with non-bool/array allowed_classes
11 var_dump(unserialize($s, ["allowed_classes" => null]));
12 var_dump(unserialize($s, ["allowed_classes" => 0]));
13 var_dump(unserialize($s, ["allowed_classes" => 1]));
15 Warning: unserialize(): allowed_classes option should be array or boolean in %s on line %d
18 Warning: unserialize(): allowed_classes option should be array or boolean in %s on line %d
21 Warning: unserialize(): allowed_classes option should be array or boolean in %s on line %d
H A Dbug72663_2.phpt2 Bug #72663 (2): Don't allow references into failed unserialize
11 function unserialize($data) {
12 $this->data = unserialize($data);
18 var_dump(unserialize($exploit));
22 Notice: unserialize(): Unexpected end of serialized data in %s on line %d
24 Notice: unserialize(): Error at offset 46 of 47 bytes in %s on line %d
26 Notice: unserialize(): Error at offset 79 of 80 bytes in %s on line %d
H A Dunserialize_classes.phpt2 Test unserialize() with second parameter
11 var_dump(unserialize($s));
12 var_dump(unserialize($s, ["allowed_classes" => false]));
13 var_dump(unserialize($s, ["allowed_classes" => true]));
14 var_dump(unserialize($s, ["allowed_classes" => ["bar"]]));
15 var_dump(unserialize($s, ["allowed_classes" => ["FOO"]]));
16 var_dump(unserialize($s, ["allowed_classes" => ["bar", "foO"]]));
H A D005.phpt2 serialize()/unserialize() objects
50 function unserialize($serialized)
83 function unserialize($serialized)
101 var_dump(unserialize($ser));
105 var_dump(unserialize($ser));
109 var_dump(unserialize($ser));
112 var_dump(unserialize('O:9:"TestNAOld":0:{}'));
115 var_dump(unserialize('O:9:"TestNANew":0:{}'));
118 var_dump(unserialize('C:10:"TestNANew2":0:{}'));
146 TestNew::unserialize()
[all …]
H A Dunserialize_subclasses.phpt2 Test unserialize() with allowed_classes and subclasses
12 var_dump(unserialize($c, ["allowed_classes" => ["C"]]));
13 var_dump(unserialize($c, ["allowed_classes" => ["D"]]));
14 var_dump(unserialize($d, ["allowed_classes" => ["C"]]));
15 var_dump(unserialize($d, ["allowed_classes" => ["D"]]));
H A Dbug74300.phpt2 Bug #74300 (unserialize() for float nvexp part)
7 var_dump(unserialize('d:2e+2;'));
8 var_dump(unserialize('d:2e++2;'));
14 Notice: unserialize(): Error at offset 0 of 8 bytes in %s on line %d
H A Dbug73825.phpt2 Bug #73825 Heap out of bounds read on unserialize in finish_nested_data()
5 $obj = unserialize('O:8:"00000000":');
9 Warning: Bad unserialize data in %sbug73825.php on line %d
11 Notice: unserialize(): Error at offset 13 of 15 bytes in %sbug73825.php on line %d
H A Dbug70436.phpt2 Bug #70436: Use After Free Vulnerability in unserialize()
15 function unserialize($data)
17 $this->data = unserialize($data);
31 $data = unserialize($exploit);
49 Notice: unserialize(): Error at offset 0 of 3 bytes in %sbug70436.php on line %d
51 Notice: unserialize(): Error at offset 93 of 94 bytes in %sbug70436.php on line %d
H A Dunserialize_mem_leak.phpt2 Memleaks if unserialize return a self-referenced array/object
12 foo(unserialize($str));
14 foo(unserialize($str));
18 Notice: unserialize(): Error at offset %d of %d bytes in %sunserialize_mem_leak.php on line 9
H A Dbug65806.phpt2 Bug #65806 (unserialize fails with object which is referenced multiple times)
36 $this->_obj = unserialize($this->_serialized);
56 echo "start serialize/unserialize" . PHP_EOL;
57 $newList = unserialize(serialize($list));
58 echo "finish serialize/unserialize" . PHP_EOL;
60 //after unserialize the property myObjC::attrD is null instead of expected object
79 start serialize/unserialize
80 finish serialize/unserialize
H A Dbug68044.phpt2 Bug #68044 Integer overflow in unserialize() (32-bits only)
5 echo unserialize('C:3:"XYZ":18446744075857035259:{}');
9 Warning: unserialize(): %s in %sbug68044.php on line %d
13 Notice: unserialize(): Error at offset 32 of 33 bytes in %s%ebug68044.php on line 2
H A Dbug74614.phpt2 Bug #74614: Use-after-free in PHP7's unserialize()
6 unserialize('a:3020000000000000000000000000000001:{i:0;a:0:{}i:1;i:2;i:2;i:3;i:3;i:4;i:4;i:5;i:5;i:…
10 Warning: unserialize(): %s in %sbug74614.php on line %d
12 Notice: unserialize(): Error at offset %d of 113 bytes in %s on line %d
H A Dbug71311.phpt2 Bug #71311 Use-after-free vulnerability in SPL(ArrayObject, unserialize)
5 $data = unserialize("C:11:\"ArrayObject\":11:{x:i:0;r:3;X}");
11 #0 [internal function]: ArrayObject->unserialize('x:i:0;r:3;X')
12 #1 %s%ebug71311.php(2): unserialize('%s')
H A Dtyped_property_refs.phpt2 unserialize with references to typed properties shall skip the references or fail
26 var_dump(unserialize('O:1:"A":2:{s:1:"a";i:1;s:1:"b";R:2;}'));
27 var_dump(unserialize('O:1:"B":2:{s:1:"a";i:1;s:1:"b";R:2;}'));
30 var_dump(unserialize('O:1:"A":2:{s:1:"a";N;s:1:"b";R:2;}'));
35 var_dump(unserialize('O:1:"B":2:{s:1:"a";N;s:1:"b";R:2;}'));
40 var_dump(unserialize('O:1:"C":2:{s:1:"a";i:1;s:1:"b";R:2;}'));
45 var_dump(unserialize('O:1:"C":2:{s:1:"b";s:1:"x";s:1:"a";R:2;}'));
50 var_dump(unserialize('O:1:"D":2:{s:1:"a";i:1;s:1:"b";R:2;}'));
/PHP-7.4/ext/spl/tests/
H A Dunserialize_errors.phpt10 unserialize('O:11:"ArrayObject":0:{}');
16 unserialize('O:11:"ArrayObject":3:{i:0;b:1;i:1;a:0:{}i:2;a:0:{}}');
22 unserialize('O:11:"ArrayObject":3:{i:0;i:0;i:1;a:0:{}i:2;i:0;}');
28 unserialize('O:11:"ArrayObject":3:{i:0;i:0;i:1;i:0;i:2;a:0:{}}');
57 unserialize('O:13:"ArrayIterator":0:{}');
69 unserialize('O:13:"ArrayIterator":3:{i:0;i:0;i:1;a:0:{}i:2;i:0;}');
75 unserialize('O:13:"ArrayIterator":3:{i:0;i:0;i:1;i:0;i:2;a:0:{}}');
83 unserialize('O:19:"SplDoublyLinkedList":0:{}');
109 unserialize('O:16:"SplObjectStorage":0:{}');
115 unserialize('O:16:"SplObjectStorage":2:{i:0;i:0;i:1;a:0:{}}');
[all …]
/PHP-7.4/ext/gmp/tests/
H A Dserialize.phpt10 var_dump(unserialize($s));
14 var_dump(unserialize(serialize($n)));
17 unserialize('C:3:"GMP":0:{}');
21 unserialize('C:3:"GMP":9:{s:2:"42";}');
41 string(28) "Could not unserialize number"
42 string(32) "Could not unserialize properties"
/PHP-7.4/ext/standard/tests/strings/
H A Dbug72663.phpt10 function unserialize($data) {
11 $this->data = unserialize($data);
18 var_dump(unserialize($exploit));
22 Notice: unserialize(): Unexpected end of serialized data in %sbug72663.php on line %d
24 Notice: unserialize(): Error at offset 46 of 47 bytes in %sbug72663.php on line %d
26 Notice: unserialize(): Error at offset 79 of 80 bytes in %sbug72663.php on line %d
/PHP-7.4/ext/standard/tests/math/
H A Dbug27646.phpt2 Bug #27646 (Cannot serialize/unserialize non-finite numeric values)
10 var_dump(unserialize(serialize($f)));
15 var_dump(unserialize(serialize($f)));
20 var_dump(unserialize(serialize($f)));
25 var_dump(unserialize(serialize($f)));
30 var_dump(unserialize(serialize($f)));
/PHP-7.4/Zend/tests/
H A Dbug79740.phpt2 Bug #79740: serialize() and unserialize() methods can not be called statically
7 public function unserialize() { }
11 var_dump(is_callable(['A', 'unserialize']));
13 A::unserialize();
22 Deprecated: Non-static method A::unserialize() should not be called statically in %s on line %d

Completed in 25 milliseconds

12345678910>>...13