Home
last modified time | relevance | path

Searched refs:unserialize (Results 1 – 25 of 200) sorted by relevance

12345678

/PHP-5.5/ext/standard/tests/serialize/
H A Dbug25378.phpt2 Bug #25378 (unserialize() crashes with invalid data)
5 var_dump(unserialize("s:-1:\"\";"));
6 var_dump(unserialize("i:823"));
7 var_dump(unserialize("O:8:\"stdClass :0:{}"));
8 var_dump(unserialize("O:8:\"stdClass\"+0:{}"));
9 var_dump(unserialize("O:1000:\"stdClass\":0:{}"));
10 var_dump(unserialize("a:2:{i:0;s:2:\"12\":"));
14 var_dump(unserialize("s:3000:\"123\";"));
15 var_dump(unserialize("s:3000:\"123"));
16 var_dump(unserialize("s:3:\"123;"));
[all …]
H A D002.phpt2 Bug #25378 (unserialize() crashes with invalid data)
5 var_dump(unserialize('b:0;'));
6 var_dump(unserialize('b:1;'));
7 var_dump(unserialize('i:823;'));
8 var_dump(unserialize('s:0:"";'));
9 var_dump(unserialize('s:3:"foo";'));
10 var_dump(unserialize('a:1:{i:0;s:2:"12";}'));
11 var_dump(unserialize('a:2:{i:0;a:0:{}i:1;a:0:{}}'));
12 var_dump(unserialize('a:3:{i:0;s:3:"foo";i:1;s:3:"bar";i:2;s:3:"baz";}'));
13 var_dump(unserialize('O:8:"stdClass":0:{}'));
H A Dserialization_error_002.phpt2 Test unserialize(): error is indistinguishable from deserialized boolean
10 /* Prototype : proto mixed unserialize(string variable_representation)
16 echo "*** Testing unserialize() error/boolean distinction ***\n";
23 $deserialized_garbage = unserialize($garbage);
26 $deserialized_false = unserialize($serialized_false);
29 echo "unserialize error and deserialized false are identical? " . (bool) ($deserialized_false == $d…
33 return ($str == serialize(false) || @unserialize($str) !== false);
36 // Test unserialize error idiom
43 *** Testing unserialize() error/boolean distinction ***
46 Notice: unserialize(): Error at offset 0 of 27 bytes in %s%eserialization_error_002.php on line 20
[all …]
H A Dserialization_error_001.phpt2 Test serialize() & unserialize() functions: error conditions - wrong number of args.
10 /* Prototype : proto mixed unserialize(string variable_representation)
16 echo "*** Testing serialize()/unserialize() : error conditions ***\n";
20 var_dump( unserialize() );
24 var_dump( unserialize(1,2) );
29 *** Testing serialize()/unserialize() : error conditions ***
34 Warning: unserialize() expects exactly 1 parameter, 0 given in %s on line 17
40 Warning: unserialize() expects exactly 1 parameter, 2 given in %s on line 21
H A D005.phpt2 serialize()/unserialize() objects
53 function unserialize($serialized)
86 function unserialize($serialized)
104 var_dump(unserialize($ser));
108 var_dump(unserialize($ser));
112 var_dump(unserialize($ser));
115 var_dump(unserialize('O:9:"TestNAOld":0:{}'));
118 var_dump(unserialize('O:9:"TestNANew":0:{}'));
121 var_dump(unserialize('C:10:"TestNANew2":0:{}'));
149 TestNew::unserialize()
[all …]
H A Dbug65806.phpt2 Bug #65806 (unserialize fails with object which is referenced multiple times)
36 $this->_obj = unserialize($this->_serialized);
56 echo "start serialize/unserialize" . PHP_EOL;
57 $newList = unserialize(serialize($list));
58 echo "finish serialize/unserialize" . PHP_EOL;
60 //after unserialize the property myObjC::attrD is null instead of expected object
79 start serialize/unserialize
80 finish serialize/unserialize
H A Dbug67072_2.phpt7 echo unserialize('O:15:"MySplFileObject":1:{s:9:"*filename";s:15:"/home/flag/flag";}');
12 $object = unserialize(sprintf('O:%d:"%s":0:{}', strlen($className), $className));
19 function unserialize($data) { }
37 Notice: unserialize(): Error at offset 26 of 66 bytes in %s on line 4
49 Notice: unserialize(): Error at offset 24 of 25 bytes in %s on line 9
54 Notice: unserialize(): Error at offset 26 of 27 bytes in %s on line 9
68 Notice: unserialize(): Error at offset 17 of 18 bytes in %s on line 9
H A Dbug68044.phpt2 Bug #68044 Integer overflow in unserialize() (32-bits only)
5 echo unserialize('C:3:"XYZ":18446744075857035259:{}');
11 Notice: unserialize(): Error at offset 32 of 33 bytes in %s%ebug68044.php on line 2
H A Dbug70172.phpt2 Bug #70172 - Use After Free Vulnerability in unserialize()
12 function unserialize($data) {
13 $this->data = unserialize($data);
27 $data = unserialize($exploit);
H A D006.phpt2 serialize()/unserialize() with exotic letters
15 var_dump(unserialize(serialize($foo)));
17 var_dump(unserialize(serialize($������)));
H A Dbug69152.phpt2 Bug #69152: Type Confusion Infoleak Vulnerability in unserialize()
5 $x = unserialize('O:9:"exception":1:{s:16:"'."\0".'Exception'."\0".'trace";s:4:"ryat";}');
7 $x = unserialize('O:4:"test":1:{s:27:"__PHP_Incomplete_Class_Name";R:1;}');
17 …nknown" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…
H A Dbug62836_1.phpt2 Bug #62836 (Seg fault or broken object references on unserialize())
7 unserialize("i:4;");
11 print_r(unserialize($serialized_object));
H A Dbug70172_2.phpt2 Bug #70172 - Use After Free Vulnerability in unserialize()
10 function unserialize($data) {
11 $this->data = unserialize($data);
32 $data = unserialize($exploit);
H A Dbug62836_2.phpt2 Bug #62836 (Seg fault or broken object references on unserialize())
10 unserialize("i:4;");
14 print_r(unserialize($serialized_object));
H A Dbug65481.phpt26 public function unserialize($str)
28 $r = unserialize($str);
29 $r = unserialize($r[0]);
H A D004.phpt2 serialize()/unserialize() floats in array.
12 $b = unserialize($str);
18 $b = unserialize($str);
H A Dbug31442.phpt2 Bug #31442 (unserialize broken on 64-bit systems)
7 echo unserialize(serialize(2147483648));
/PHP-5.5/ext/standard/tests/math/
H A Dbug27646.phpt2 Bug #27646 (Cannot serialize/unserialize non-finite numeric values)
10 var_dump(unserialize(serialize($f)));
15 var_dump(unserialize(serialize($f)));
20 var_dump(unserialize(serialize($f)));
25 var_dump(unserialize(serialize($f)));
30 var_dump(unserialize(serialize($f)));
/PHP-5.5/ext/standard/
H A Dphp_var.h31 PHP_FUNCTION(unserialize);
89 if (BG(serialize_lock) || !BG(unserialize).level) { \
92 BG(unserialize).var_hash = (void *)(var_hash_ptr); \
93 BG(unserialize).level = 1; \
96 (var_hash_ptr) = (php_unserialize_data_t)BG(unserialize).var_hash; \
97 ++BG(unserialize).level; \
104 if (BG(serialize_lock) || !BG(unserialize).level) { \
108 if (!--BG(unserialize).level) { \
111 BG(unserialize).var_hash = NULL; \
/PHP-5.5/ext/spl/tests/
H A DSplObjectStorage_unserialize_invalid_parameter1.phpt2 Check that SplObjectStorage::unserialize returns NULL when non-string param is passed
17 var_dump($s->unserialize($input));
22 Warning: SplObjectStorage::unserialize() expects parameter 1 to be %binary_string_optional%, array …
25 Warning: SplObjectStorage::unserialize() expects parameter 1 to be %binary_string_optional%, object…
H A DArrayObject_unserialize_empty_string.phpt2 ArrayObject: test that you cannot unserialize a empty string
9 $a->unserialize("");
14 #0 %s(%d): ArrayObject->unserialize('')
H A Dbug45826.phpt19 $o1 =unserialize($s1);
25 $o2->unserialize($s2);
38 public function unserialize($s) {
39 return parent::unserialize($s);
57 $o1 =unserialize($s1);
63 $o2->unserialize($s2);
/PHP-5.5/ext/session/tests/
H A Dbug72562.phpt2 Bug #72562: Use After Free in unserialize() with Unexpected Session Deserialization
13 $out_1[] = unserialize($uns_1);
25 $out_2 = unserialize($uns_2);
41 Notice: unserialize(): Error at offset 0 of 1 bytes in %s/bug72562.php on line %d
43 Notice: unserialize(): Error at offset 4 of 4 bytes in %s/bug72562.php on line %d
/PHP-5.5/ext/pdo_mysql/tests/
H A Dpdo_mysql_stmt_fetch_serialize_simple.phpt34 public function unserialize($data) {
42 $tmp = unserialize(serialize($obj));
48 $db->exec("INSERT INTO test(myobj) VALUES ('Data fetched from DB to be given to unserialize()')");
77 myclass::unserialize('Value from serialize()')
82 myclass::unserialize('Data fetched from DB to be given to unserialize()')
85 myclass::unserialize('Data fetched from DB to be given to unserialize()')
90 myclass::unserialize('Data fetched from DB to be given to unserialize()')
/PHP-5.5/Zend/tests/generators/errors/
H A Dserialize_unserialize_error.phpt17 var_dump(unserialize('O:9:"Generator":0:{}'));
23 var_dump(unserialize('C:9:"Generator":0:{}'));
38 Notice: unserialize(): Error at offset 19 of 20 bytes in %sserialize_unserialize_error.php on line …
42 #0 %s(%d): unserialize('C:9:"Generator"...')

Completed in 91 milliseconds

12345678