Searched refs:unserialize (Results 1 – 25 of 319) sorted by relevance
12345678910>>...13
/PHP-8.0/ext/standard/tests/serialize/ |
H A D | bug25378.phpt | 2 Bug #25378 (unserialize() crashes with invalid data) 5 var_dump(unserialize("s:-1:\"\";")); 6 var_dump(unserialize("i:823")); 7 var_dump(unserialize("O:8:\"stdClass :0:{}")); 8 var_dump(unserialize("O:8:\"stdClass\"+0:{}")); 9 var_dump(unserialize("O:1000:\"stdClass\":0:{}")); 10 var_dump(unserialize("a:2:{i:0;s:2:\"12\":")); 14 var_dump(unserialize("s:3000:\"123\";")); 15 var_dump(unserialize("s:3000:\"123")); 16 var_dump(unserialize("s:3:\"123;")); [all …]
|
H A D | invalid_signs_in_lengths.phpt | 6 var_dump(unserialize('s:+1:"x";')); 7 var_dump(unserialize('s:-1:"x";')); 8 var_dump(unserialize('a:+0:{}')); 9 var_dump(unserialize('a:-0:{}')); 10 var_dump(unserialize('O:+8:"stdClass":0:{}')); 11 var_dump(unserialize('O:-8:"stdClass":0:{}')); 12 var_dump(unserialize('C:+11:"ArrayObject":0:{}')); 14 var_dump(unserialize('a:1:{i:0;r:+1;}')); 15 var_dump(unserialize('a:1:{i:0;r:-1;}')); 16 var_dump(unserialize('a:1:{i:0;R:+1;}')); [all …]
|
H A D | max_depth.phpt | 24 var_dump(unserialize( 28 var_dump(unserialize( 34 var_dump(unserialize( 38 var_dump(unserialize( 51 var_dump(unserialize( 55 var_dump(unserialize( 68 public function unserialize($str) { 76 var_dump(is_array(unserialize( 88 var_dump(unserialize( 92 var_dump(unserialize( [all …]
|
H A D | 002.phpt | 2 Bug #25378 (unserialize() crashes with invalid data) 5 var_dump(unserialize('b:0;')); 6 var_dump(unserialize('b:1;')); 7 var_dump(unserialize('i:823;')); 8 var_dump(unserialize('s:0:"";')); 9 var_dump(unserialize('s:3:"foo";')); 10 var_dump(unserialize('a:1:{i:0;s:2:"12";}')); 11 var_dump(unserialize('a:2:{i:0;a:0:{}i:1;a:0:{}}')); 12 var_dump(unserialize('a:3:{i:0;s:3:"foo";i:1;s:3:"bar";i:2;s:3:"baz";}')); 13 var_dump(unserialize('O:8:"stdClass":0:{}'));
|
H A D | serialization_error_002.phpt | 2 Test unserialize(): error is indistinguishable from deserialized boolean 5 echo "*** Testing unserialize() error/boolean distinction ***\n"; 12 $deserialized_garbage = unserialize($garbage); 15 $deserialized_false = unserialize($serialized_false); 18 echo "unserialize error and deserialized false are identical? " . (bool) ($deserialized_false == $d… 22 return ($str == serialize(false) || @unserialize($str) !== false); 25 // Test unserialize error idiom 32 *** Testing unserialize() error/boolean distinction *** 35 Notice: unserialize(): Error at offset 0 of 27 bytes in %s on line %d 38 unserialize error and deserialized false are identical? 1
|
H A D | unserialize_large.phpt | 6 var_dump(unserialize("a:1000000000:{}")); 7 var_dump(unserialize("O:1000000000:\"\":0:{}")); 8 var_dump(unserialize("O:1:\"X\":1000000000:{}")); 9 var_dump(unserialize("C:1:\"X\":1000000000:{}")); 13 Notice: unserialize(): Error at offset 14 of 15 bytes in %s on line %d 16 Notice: unserialize(): Error at offset 2 of 20 bytes in %s on line %d 19 Notice: unserialize(): Error at offset 18 of 21 bytes in %s on line %d 24 Notice: unserialize(): Error at offset 20 of 21 bytes in %s on line %d
|
H A D | bug72663_2.phpt | 2 Bug #72663 (2): Don't allow references into failed unserialize 11 function unserialize($data) { 12 $this->data = unserialize($data); 18 var_dump(unserialize($exploit)); 22 Notice: unserialize(): Unexpected end of serialized data in %s on line %d 24 Notice: unserialize(): Error at offset 46 of 47 bytes in %s on line %d 26 Notice: unserialize(): Error at offset 79 of 80 bytes in %s on line %d
|
H A D | unserialize_error_001.phpt | 2 Test unserialize() with non-bool/array allowed_classes 12 unserialize($s, ["allowed_classes" => null]); 18 unserialize($s, ["allowed_classes" => 0]); 25 unserialize($s, ["allowed_classes" => 1]); 32 unserialize(): Option "allowed_classes" must be of type array|bool, null given 33 unserialize(): Option "allowed_classes" must be of type array|bool, int given 34 unserialize(): Option "allowed_classes" must be of type array|bool, int given
|
H A D | unserialize_classes.phpt | 2 Test unserialize() with second parameter 11 var_dump(unserialize($s)); 12 var_dump(unserialize($s, ["allowed_classes" => false])); 13 var_dump(unserialize($s, ["allowed_classes" => true])); 14 var_dump(unserialize($s, ["allowed_classes" => ["bar"]])); 15 var_dump(unserialize($s, ["allowed_classes" => ["FOO"]])); 16 var_dump(unserialize($s, ["allowed_classes" => ["bar", "foO"]]));
|
H A D | unserialize_subclasses.phpt | 2 Test unserialize() with allowed_classes and subclasses 12 var_dump(unserialize($c, ["allowed_classes" => ["C"]])); 13 var_dump(unserialize($c, ["allowed_classes" => ["D"]])); 14 var_dump(unserialize($d, ["allowed_classes" => ["C"]])); 15 var_dump(unserialize($d, ["allowed_classes" => ["D"]]));
|
H A D | 005.phpt | 2 serialize()/unserialize() objects 50 function unserialize($serialized) 83 function unserialize($serialized) 101 var_dump(unserialize($ser)); 105 var_dump(unserialize($ser)); 109 var_dump(unserialize($ser)); 112 var_dump(unserialize('O:9:"TestNAOld":0:{}')); 115 var_dump(unserialize('O:9:"TestNANew":0:{}')); 118 var_dump(unserialize('C:10:"TestNANew2":0:{}')); 144 TestNew::unserialize() [all …]
|
H A D | bug74300.phpt | 2 Bug #74300 (unserialize() for float nvexp part) 7 var_dump(unserialize('d:2e+2;')); 8 var_dump(unserialize('d:2e++2;')); 13 Notice: unserialize(): Error at offset 0 of 8 bytes in %s on line %d
|
H A D | bug73825.phpt | 2 Bug #73825 Heap out of bounds read on unserialize in finish_nested_data() 5 $obj = unserialize('O:8:"00000000":'); 9 Warning: Bad unserialize data in %sbug73825.php on line %d 11 Notice: unserialize(): Error at offset 13 of 15 bytes in %sbug73825.php on line %d
|
H A D | bug70436.phpt | 2 Bug #70436: Use After Free Vulnerability in unserialize() 15 function unserialize($data) 17 $this->data = unserialize($data); 31 $data = unserialize($exploit); 49 Notice: unserialize(): Error at offset 0 of 3 bytes in %sbug70436.php on line %d 51 Notice: unserialize(): Error at offset 93 of 94 bytes in %sbug70436.php on line %d
|
H A D | unserialize_mem_leak.phpt | 2 Memleaks if unserialize return a self-referenced array/object 12 foo(unserialize($str)); 14 foo(unserialize($str)); 18 Notice: unserialize(): Error at offset %d of %d bytes in %sunserialize_mem_leak.php on line 9
|
H A D | bug65806.phpt | 2 Bug #65806 (unserialize fails with object which is referenced multiple times) 36 $this->_obj = unserialize($this->_serialized); 56 echo "start serialize/unserialize" . PHP_EOL; 57 $newList = unserialize(serialize($list)); 58 echo "finish serialize/unserialize" . PHP_EOL; 60 //after unserialize the property myObjC::attrD is null instead of expected object 79 start serialize/unserialize 80 finish serialize/unserialize
|
H A D | bug68044.phpt | 2 Bug #68044 Integer overflow in unserialize() (32-bits only) 5 echo unserialize('C:3:"XYZ":18446744075857035259:{}'); 9 Warning: unserialize(): %s in %sbug68044.php on line %d 13 Notice: unserialize(): Error at offset 32 of 33 bytes in %s%ebug68044.php on line 2
|
H A D | bug74614.phpt | 2 Bug #74614: Use-after-free in PHP7's unserialize() 6 unserialize('a:3020000000000000000000000000000001:{i:0;a:0:{}i:1;i:2;i:2;i:3;i:3;i:4;i:4;i:5;i:5;i:… 10 Warning: unserialize(): %s in %sbug74614.php on line %d 12 Notice: unserialize(): Error at offset %d of 113 bytes in %s on line %d
|
H A D | bug71311.phpt | 2 Bug #71311 Use-after-free vulnerability in SPL(ArrayObject, unserialize) 5 $data = unserialize("C:11:\"ArrayObject\":11:{x:i:0;r:3;X}"); 11 #0 [internal function]: ArrayObject->unserialize('x:i:0;r:3;X') 12 #1 %s%ebug71311.php(2): unserialize('%s')
|
H A D | bug69152.phpt | 2 Bug #69152: Type Confusion Infoleak Vulnerability in unserialize() 5 $x = unserialize('O:9:"exception":1:{s:16:"'."\0".'Exception'."\0".'trace";s:4:"ryat";}'); 7 $x = unserialize('O:4:"test":1:{s:27:"__PHP_Incomplete_Class_Name";R:1;}'); 14 #0 %s(%d): unserialize('O:9:"exception"...')
|
H A D | typed_property_refs.phpt | 2 unserialize with references to typed properties shall skip the references or fail 31 var_dump(unserialize('O:1:"A":2:{s:1:"a";i:1;s:1:"b";R:2;}')); 32 var_dump(unserialize('O:1:"B":2:{s:1:"a";i:1;s:1:"b";R:2;}')); 33 var_dump(unserialize('O:1:"E":2:{s:1:"a";i:1;s:1:"b";R:2;}')); 36 var_dump(unserialize('O:1:"A":2:{s:1:"a";N;s:1:"b";R:2;}')); 41 var_dump(unserialize('O:1:"B":2:{s:1:"a";N;s:1:"b";R:2;}')); 46 var_dump(unserialize('O:1:"C":2:{s:1:"a";i:1;s:1:"b";R:2;}')); 51 var_dump(unserialize('O:1:"C":2:{s:1:"b";s:1:"x";s:1:"a";R:2;}')); 56 var_dump(unserialize('O:1:"D":2:{s:1:"a";i:1;s:1:"b";R:2;}'));
|
/PHP-8.0/ext/spl/tests/ |
H A D | unserialize_errors.phpt | 10 unserialize('O:11:"ArrayObject":0:{}'); 16 unserialize('O:11:"ArrayObject":3:{i:0;b:1;i:1;a:0:{}i:2;a:0:{}}'); 22 unserialize('O:11:"ArrayObject":3:{i:0;i:0;i:1;a:0:{}i:2;i:0;}'); 28 unserialize('O:11:"ArrayObject":3:{i:0;i:0;i:1;i:0;i:2;a:0:{}}'); 57 unserialize('O:13:"ArrayIterator":0:{}'); 69 unserialize('O:13:"ArrayIterator":3:{i:0;i:0;i:1;a:0:{}i:2;i:0;}'); 75 unserialize('O:13:"ArrayIterator":3:{i:0;i:0;i:1;i:0;i:2;a:0:{}}'); 83 unserialize('O:19:"SplDoublyLinkedList":0:{}'); 109 unserialize('O:16:"SplObjectStorage":0:{}'); 115 unserialize('O:16:"SplObjectStorage":2:{i:0;i:0;i:1;a:0:{}}'); [all …]
|
/PHP-8.0/ext/gmp/tests/ |
H A D | serialize.phpt | 10 var_dump(unserialize($s)); 14 var_dump(unserialize(serialize($n))); 17 unserialize('C:3:"GMP":0:{}'); 21 unserialize('C:3:"GMP":9:{s:2:"42";}'); 41 string(28) "Could not unserialize number" 42 string(32) "Could not unserialize properties"
|
/PHP-8.0/ext/standard/tests/math/ |
H A D | bug27646.phpt | 2 Bug #27646 (Cannot serialize/unserialize non-finite numeric values) 10 var_dump(unserialize(serialize($f))); 15 var_dump(unserialize(serialize($f))); 20 var_dump(unserialize(serialize($f))); 25 var_dump(unserialize(serialize($f))); 30 var_dump(unserialize(serialize($f)));
|
/PHP-8.0/ext/standard/tests/strings/ |
H A D | bug72663.phpt | 10 function unserialize($data) { 11 $this->data = unserialize($data); 18 var_dump(unserialize($exploit)); 22 Notice: unserialize(): Unexpected end of serialized data in %sbug72663.php on line %d 24 Notice: unserialize(): Error at offset 46 of 47 bytes in %sbug72663.php on line %d 26 Notice: unserialize(): Error at offset 79 of 80 bytes in %sbug72663.php on line %d
|
Completed in 37 milliseconds
12345678910>>...13