/php-src/ext/standard/ |
H A D | exec.c | 127 fp = VCWD_POPEN(cmd, "r"); in php_exec() 202 char *cmd; in php_exec_ex() local 278 zend_string *cmd; in php_escape_shell_cmd() local 364 ZSTR_VAL(cmd)[y] = '\0'; in php_escape_shell_cmd() local 375 cmd = zend_string_truncate(cmd, y, 0); in php_escape_shell_cmd() 378 ZSTR_LEN(cmd) = y; in php_escape_shell_cmd() 380 return cmd; in php_escape_shell_cmd() 388 zend_string *cmd; in php_escape_shell_arg() local 465 cmd = zend_string_truncate(cmd, y, 0); in php_escape_shell_arg() 467 ZSTR_LEN(cmd) = y; in php_escape_shell_arg() [all …]
|
/php-src/ext/standard/tests/file/windows_acls/ |
H A D | common.inc | 77 exec($cmd); 86 exec($cmd); 88 exec($cmd); 101 exec($cmd); 108 $cmd = $icacls . ' ' . $path_escaped . ' /remove:d ' . $user; 109 exec($cmd); 111 exec($cmd); 126 exec($cmd); 128 exec($cmd); 131 $cmd .= ':' . '(' . implode(',', $perm_entry) . ')'; [all …]
|
/php-src/sapi/apache2handler/ |
H A D | apache_config.c | 70 e.value = apr_pstrdup(cmd->pool, value); in real_value_hnd() 73 e.htaccess = ((cmd->override & (RSRC_CONF|ACCESS_CONF)) == 0); in real_value_hnd() 79 static const char *php_apache_value_handler(cmd_parms *cmd, void *dummy, const char *name, const ch… in php_apache_value_handler() argument 81 return real_value_hnd(cmd, dummy, name, value, PHP_INI_PERDIR); in php_apache_value_handler() 86 return real_value_hnd(cmd, dummy, name, value, PHP_INI_SYSTEM); in php_apache_admin_value_handler() 100 return real_value_hnd(cmd, dummy, arg1, bool_val, status); in real_flag_hnd() 103 static const char *php_apache_flag_handler(cmd_parms *cmd, void *dummy, const char *name, const cha… in php_apache_flag_handler() argument 105 return real_flag_hnd(cmd, dummy, name, value, PHP_INI_PERDIR); in php_apache_flag_handler() 110 return real_flag_hnd(cmd, dummy, name, value, PHP_INI_SYSTEM); in php_apache_admin_flag_handler() 113 static const char *php_apache_phpini_set(cmd_parms *cmd, void *mconfig, const char *arg) in php_apache_phpini_set() argument [all …]
|
/php-src/ext/standard/tests/file/ |
H A D | bug22414.phpt | 23 …$cmd = $php_escaped . $args . ' -r ' . escapeshellarg("readfile(@getenv('TEST_PHP_EXECUTABLE'));"); 25 …$cmd = $php_escaped . $args . ' -r ' . escapeshellarg('passthru("'.$cmd.'");') . ' > '.escapeshell… 27 …$cmd = $php_escaped . $args . ' -r ' . "\"passthru('".addslashes($cmd)."');\"" . ' > '.escapeshell… 29 exec($cmd);
|
H A D | bug77552.phpt | 18 $cmd = sprintf('mklink /J "%s" "%s"', $junction, $target); 19 exec($cmd); 28 $cmd = sprintf('rmdir /S /Q "%s"', $tmpDir); 29 exec($cmd);
|
/php-src/ext/standard/tests/general_functions/ |
H A D | ghsa-9fcc-425m-g385_002.phpt | 2 GHSA-9fcc-425m-g385 - bypass CVE-2024-1874 - cmd.exe variation 26 $proc = proc_open(["cmd.exe", "/c", $batch_file_path, "\"¬epad.exe"], $descriptorspec, $pipes); 28 $proc = proc_open(["cmd.exe ", "/c", $batch_file_path, "\"¬epad.exe"], $descriptorspec, $pipes… 30 $proc = proc_open(["cmd.exe. ", "/c", $batch_file_path, "\"¬epad.exe"], $descriptorspec, $pipe… 32 $proc = proc_open(["cmd.exe. ... ", "/c", $batch_file_path, "\"¬epad.exe"], $descriptorspec, $p… 34 $proc = proc_open(["\\cmd.exe. ... ", "/c", $batch_file_path, "\"¬epad.exe"], $descriptorspec, … 36 $proc = proc_open(["cmd", "/c", $batch_file_path, "\"¬epad.exe"], $descriptorspec, $pipes); 38 $proc = proc_open(["cmd ", "/c", $batch_file_path, "\"¬epad.exe"], $descriptorspec, $pipes); 40 $proc = proc_open(["cmd. ", "/c", $batch_file_path, "\"¬epad.exe"], $descriptorspec, $pipes); 41 $proc = proc_open(["cmd. ... ", "/c", $batch_file_path, "\"¬epad.exe"], $descriptorspec, $pipes… [all …]
|
H A D | proc_open_cmd.phpt | 2 Harden against cmd.exe hijacking 11 copy(__DIR__ . "/../helpers/bad_cmd.exe", "cmd.exe"); 23 @unlink("cmd.exe"); 30 @unlink("cmd.exe");
|
H A D | proc_open_null.phpt | 7 $cmd = [$php, '-r', 'echo "Test"; fprintf(STDERR, "Error");']; 9 $proc = proc_open($cmd, [1 => ['null'], 2 => ['pipe', 'w']], $pipes); 14 $proc = proc_open($cmd, [1 => ['pipe', 'w'], 2 => ['null']], $pipes);
|
H A D | ghsa-pc52-254m-w9w7_2.phpt | 2 GHSA-54hq-v5wp-fqgv - proc_open does not correctly escape args for cmd files 15 $batch_file_path = __DIR__ . '/ghsa-54hq-v5wp-fqgv_2.cmd'; 28 @unlink(__DIR__ . '/ghsa-54hq-v5wp-fqgv_2.cmd');
|
H A D | proc_open_redirect.phpt | 26 $cmd = [$php, '-r', 'echo "Test\n"; fprintf(STDERR, "Error");']; 27 $proc = proc_open($cmd, [1 => ['pipe', 'w'], 2 => ['redirect', 1]], $pipes); 34 $proc = proc_open($cmd, [1 => ['file', $fileName, 'w'], 2 => ['redirect', 1]], $pipes); 42 $proc = proc_open($cmd, [1 => $file, 2 => ['redirect', 1]], $pipes); 50 $proc = proc_open($cmd, [2 => ['redirect', 1]], $pipes);
|
H A D | proc_open_array.phpt | 49 $cmd = [$php, '-n', '-r', 'var_dump(getenv("ENV_1"), getenv("ENV_2"));']; 52 $proc = proc_open($cmd, $ds, $pipes); 57 $proc = proc_open($cmd, $ds, $pipes, null, $env); 71 $cmd = [$php, '-r', 'var_export(array_slice($argv, 1));', '--', ...$args]; 72 $proc = proc_open($cmd, $ds, $pipes);
|
H A D | bug78569.phpt | 12 $cmd = sprintf('"findstr" "/b" "/c:// FIND ME" "%s" 2>&1', __FILE__); 13 $proc = proc_open($cmd, $descriptorspec, $pipes);
|
H A D | ghsa-pc52-254m-w9w7_3.phpt | 2 GHSA-54hq-v5wp-fqgv - proc_open does not correctly escape args for cmd executing batch files 20 $proc = proc_open(["cmd.exe", "/c", $batch_file_path, "\"¬epad.exe"], $descriptorspec, $pipes);
|
/php-src/ext/sqlite3/tests/ |
H A D | sqlite3_15_open_error-win.phpt | 19 $cmd = $icacls . ' ' . $unreadable . ' /inheritance:r /deny ' . $user . ':(F,M,R,RX,W)'; 20 exec($cmd); 29 $cmd = $icacls . ' ' . $unreadable . ' /grant ' . $user . ':(F,M,R,RX,W)'; 30 exec($cmd);
|
/php-src/ext/standard/tests/misc/ |
H A D | exec_basic1.phpt | 10 $cmd = "echo abc\n\0command"; 12 var_dump(exec($cmd, $output)); 17 var_dump(system($cmd, $output)); 22 var_dump(passthru($cmd, $output));
|
/php-src/build/ |
H A D | order_by_dep.awk | 9 function get_deps(module_name, module_dir, depline, cmd) 14 cmd = "grep PHP_ADD_EXTENSION_DEP " module_dir "/config*.m4" 15 while (cmd | getline) { 22 close(cmd)
|
/php-src/ext/standard/tests/streams/ |
H A D | bug78883.phpt | 16 $cmd = 'cmd.exe "/c START ^"^" /WAIT ' . getenv('TEST_PHP_EXECUTABLE_ESCAPED') . ' -r ^"var_dump(fg… 17 $proc = proc_open($cmd, $descriptorspec, $pipes); 24 // thus cmd is still running and we should kill it
|
H A D | stream_get_meta_data_process_basic.phpt | 7 $cmd = "echo here is some output"; 9 $handle = popen($cmd, $mode);
|
/php-src/sapi/phpdbg/ |
H A D | phpdbg_help.c | 136 void summary_print(phpdbg_command_t const * const cmd) in summary_print() argument 139 spprintf(&summary, 0, "Command: **%s** Alias: **%c** **%s**\n", cmd->name, cmd->alias, cmd->tip); in summary_print() 225 phpdbg_command_t const *cmd; in PHPDBG_COMMAND() local 234 n = get_command(param->str, param->len, &cmd, phpdbg_prompt_commands); in PHPDBG_COMMAND() 237 summary_print(cmd); in PHPDBG_COMMAND() 238 pretty_print(get_help(cmd->name)); in PHPDBG_COMMAND() 243 for (cmd=phpdbg_prompt_commands; cmd->name; cmd++) { in PHPDBG_COMMAND() 244 if (!strncmp(cmd->name, param->str, param->len)) { in PHPDBG_COMMAND() 245 summary_print(cmd); in PHPDBG_COMMAND() 260 return cmd->handler(param); in PHPDBG_COMMAND() [all …]
|
/php-src/sapi/cli/tests/ |
H A D | sapi_windows_set_ctrl_handler.phpt | 28 $cmd = getenv('TEST_PHP_EXECUTABLE_ESCAPED') . " -n " . $argv[0] . " 1"; 31 …$proc = proc_open($cmd, $spec, $pipes, NULL, NULL, ["bypass_shell" => true, "create_process_group"… 41 $cmd = "tasklist /FI \"PID eq $child_pid\" /NH"; 42 echo "Running `$cmd` to check the process indeed exists:\n"; 43 echo trim(shell_exec($cmd)) . "\n";
|
/php-src/ext/pcntl/tests/ |
H A D | pcntl_exec_strings_with_nul_bytes.phpt | 8 pcntl_exec('cmd', ['-n', "value\0null\0byte"]); 15 'cmd', 25 'cmd',
|
/php-src/Zend/tests/ |
H A D | bug40236.phpt | 10 $cmd = "$php -n -d memory_limit=4M -a \"".__DIR__."\"/bug40236.inc"; 11 echo `$cmd`;
|
/php-src/benchmark/ |
H A D | shared.php | 9 $cmd = implode(' ', array_map('escapeshellarg', $args)); 13 fwrite(STDOUT, "> $cmd\n"); 14 $processHandle = proc_open($cmd, $descriptorSpec, $pipes, $cwd ?? getcwd(), null);
|
/php-src/tests/basic/ |
H A D | bug71273.phpt | 7 …$cmd = getenv('TEST_PHP_EXECUTABLE_ESCAPED') . " -n -d html_errors=on -d extension_dir=a/�/w -d ex… 8 $out = shell_exec($cmd);
|
/php-src/.github/scripts/windows/ |
H A D | build_task.bat | 18 cmd /c phpsdk_deps --update --no-backup --branch %BRANCH% --stability %STABILITY% --deps %DEPS_DIR%… 24 …cmd /c phpsdk_deps --update --force --no-backup --branch %BRANCH% --stability %STABILITY% --deps %… 28 cmd /c buildconf.bat --force 37 cmd /c configure.bat ^
|