diff options
39 files changed, 97 insertions, 35 deletions
diff --git a/src/sp_config_keywords.c b/src/sp_config_keywords.c index f6af86b..cf44ed9 100644 --- a/src/sp_config_keywords.c +++ b/src/sp_config_keywords.c | |||
| @@ -136,6 +136,19 @@ SP_PARSE_FN(parse_global) { | |||
| 136 | {0, 0, 0}}; | 136 | {0, 0, 0}}; |
| 137 | 137 | ||
| 138 | SP_PROCESS_CONFIG_KEYWORDS_ERR(); | 138 | SP_PROCESS_CONFIG_KEYWORDS_ERR(); |
| 139 | |||
| 140 | if (SPCFG(encryption_key)) { | ||
| 141 | if (ZSTR_LEN(SPCFG(encryption_key)) < 10) { | ||
| 142 | sp_log_err("config", "The encryption key set on line %zu is too short. please use at least 10 bytes", parsed_rule->lineno); | ||
| 143 | return SP_PARSER_ERROR; | ||
| 144 | } | ||
| 145 | if (zend_string_equals_literal(SPCFG(encryption_key), "YOU _DO_ NEED TO CHANGE THIS WITH SOME RANDOM CHARACTERS.") || | ||
| 146 | zend_string_equals_literal(SPCFG(encryption_key), "c6a0e02b3b818f7559d5f85303d8fe44")) { | ||
| 147 | sp_log_err("config", "The encryption key set on line %zu is an unchanged dummy value. please use a unique secret.", parsed_rule->lineno); | ||
| 148 | return SP_PARSER_ERROR; | ||
| 149 | } | ||
| 150 | } | ||
| 151 | |||
| 139 | return SP_PARSER_STOP; | 152 | return SP_PARSER_STOP; |
| 140 | } | 153 | } |
| 141 | 154 | ||
diff --git a/src/tests/broken_configuration/config/broken_conf_cookie_name_and_regexp.ini b/src/tests/broken_configuration/config/broken_conf_cookie_name_and_regexp.ini index 503889b..6b43b71 100644 --- a/src/tests/broken_configuration/config/broken_conf_cookie_name_and_regexp.ini +++ b/src/tests/broken_configuration/config/broken_conf_cookie_name_and_regexp.ini | |||
| @@ -1,2 +1,2 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name("my_cookie_name").name_r("my_cookie_regexp").encrypt(); | 2 | sp.cookie.name("my_cookie_name").name_r("my_cookie_regexp").encrypt(); |
diff --git a/src/tests/broken_configuration/config/config_encrypted_cookies_noname.ini b/src/tests/broken_configuration/config/config_encrypted_cookies_noname.ini index 048e404..43a4284 100644 --- a/src/tests/broken_configuration/config/config_encrypted_cookies_noname.ini +++ b/src/tests/broken_configuration/config/config_encrypted_cookies_noname.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name("").encrypt(); | 2 | sp.cookie.name("").encrypt(); |
| 3 | sp.auto_cookie_secure.enable(); | 3 | sp.auto_cookie_secure.enable(); |
diff --git a/src/tests/broken_configuration/config/config_encrypted_regexp_cookies_bad_regexp.ini b/src/tests/broken_configuration/config/config_encrypted_regexp_cookies_bad_regexp.ini index 4fe92fd..817de14 100644 --- a/src/tests/broken_configuration/config/config_encrypted_regexp_cookies_bad_regexp.ini +++ b/src/tests/broken_configuration/config/config_encrypted_regexp_cookies_bad_regexp.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name_r("^super_co[a-z+$").encrypt(); | 2 | sp.cookie.name_r("^super_co[a-z+$").encrypt(); |
| 3 | sp.auto_cookie_secure.enable(); | 3 | sp.auto_cookie_secure.enable(); |
diff --git a/src/tests/broken_configuration/config/config_encryption_key_short.ini b/src/tests/broken_configuration/config/config_encryption_key_short.ini new file mode 100644 index 0000000..7de4438 --- /dev/null +++ b/src/tests/broken_configuration/config/config_encryption_key_short.ini | |||
| @@ -0,0 +1 @@ | |||
| sp.global.secret_key("abcdef"); | |||
diff --git a/src/tests/broken_configuration/encrypt_key_too_short.phpt b/src/tests/broken_configuration/encrypt_key_too_short.phpt new file mode 100644 index 0000000..fe80be1 --- /dev/null +++ b/src/tests/broken_configuration/encrypt_key_too_short.phpt | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | --TEST-- | ||
| 2 | Cookie encryption key too short | ||
| 3 | --SKIPIF-- | ||
| 4 | <?php if (!extension_loaded("snuffleupagus")) print "skip"; ?> | ||
| 5 | --INI-- | ||
| 6 | sp.configuration_file={PWD}/config/config_encryption_key_short.ini | ||
| 7 | --COOKIE-- | ||
| 8 | --ENV-- | ||
| 9 | return <<<EOF | ||
| 10 | REMOTE_ADDR=2001:0db8:0000:0000:0000:fe00:0042:8329 | ||
| 11 | HTTP_USER_AGENT=Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/59.0.3071.109 Chrome/59.0.3071.109 Safari/537.36 | ||
| 12 | HTTPS=1 | ||
| 13 | EOF; | ||
| 14 | --FILE-- | ||
| 15 | <?php | ||
| 16 | ?> | ||
| 17 | --EXPECT-- | ||
| 18 | PHP Fatal error: [snuffleupagus][2001:0db8:0000:0000:0000:fe00:0042:8329][config][log] The encryption key set on line 1 is too short. please use at least 10 bytes in Unknown on line 0 | ||
| 19 | |||
| 20 | Fatal error: [snuffleupagus][2001:0db8:0000:0000:0000:fe00:0042:8329][config][log] The encryption key set on line 1 is too short. please use at least 10 bytes in Unknown on line 0 | ||
| 21 | |||
| 22 | Fatal error: [snuffleupagus][2001:0db8:0000:0000:0000:fe00:0042:8329][config][log] Invalid configuration file in Unknown on line 0 | ||
| 23 | Could not startup. \ No newline at end of file | ||
diff --git a/src/tests/broken_configuration/encrypt_regexp_cookies_bad_regexp.phpt b/src/tests/broken_configuration/encrypt_regexp_cookies_bad_regexp.phpt index 5383df6..ef83154 100644 --- a/src/tests/broken_configuration/encrypt_regexp_cookies_bad_regexp.phpt +++ b/src/tests/broken_configuration/encrypt_regexp_cookies_bad_regexp.phpt | |||
| @@ -2,11 +2,12 @@ | |||
| 2 | Cookie decryption in ipv4 | 2 | Cookie decryption in ipv4 |
| 3 | --SKIPIF-- | 3 | --SKIPIF-- |
| 4 | <?php if (!extension_loaded("snuffleupagus")) print "skip"; ?> | 4 | <?php if (!extension_loaded("snuffleupagus")) print "skip"; ?> |
| 5 | <?php if (PHP_VERSION_ID >= 80000) print "skip"; ?> | ||
| 5 | --INI-- | 6 | --INI-- |
| 6 | sp.configuration_file={PWD}/config/config_encrypted_regexp_cookies_bad_regexp.ini | 7 | sp.configuration_file={PWD}/config/config_encrypted_regexp_cookies_bad_regexp.ini |
| 7 | error_reporting=1 | 8 | error_reporting=1 |
| 8 | --COOKIE-- | 9 | --COOKIE-- |
| 9 | super_cookie=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP3gV9YJZL/pUeNAjCKFW0U2ywmf1CwHzwd2pWM=;awful_cookie=awful_cookie_value; | 10 | super_cookie=IpRZV4rivSjANrEOSxINd%2FdFe17giJgaAAAAAAAAAAAAAAAAAAAAALnmBVs%2BTILKxauHeGcUyJpR%2BX2UiZ6OamUTaWc=;awful_cookie=awful_cookie_value; |
| 10 | --ENV-- | 11 | --ENV-- |
| 11 | return <<<EOF | 12 | return <<<EOF |
| 12 | REMOTE_ADDR=127.0.0.1 | 13 | REMOTE_ADDR=127.0.0.1 |
diff --git a/src/tests/broken_configuration_php8/broken_conf_cookie_name_and_regexp.phpt b/src/tests/broken_configuration_php8/broken_conf_cookie_name_and_regexp.phpt index 8648b4f..c02d67a 100644 --- a/src/tests/broken_configuration_php8/broken_conf_cookie_name_and_regexp.phpt +++ b/src/tests/broken_configuration_php8/broken_conf_cookie_name_and_regexp.phpt | |||
| @@ -4,7 +4,7 @@ Broken configuration - encrypted cookie with name and regexp | |||
| 4 | <?php if (!extension_loaded("snuffleupagus")) print "skip"; ?> | 4 | <?php if (!extension_loaded("snuffleupagus")) print "skip"; ?> |
| 5 | <?php if (PHP_VERSION_ID < 80000) print "skip"; ?> | 5 | <?php if (PHP_VERSION_ID < 80000) print "skip"; ?> |
| 6 | --INI-- | 6 | --INI-- |
| 7 | sp.configuration_file={PWD}/config/broken_conf_cookie_name_and_regexp.ini | 7 | sp.configuration_file={PWD}/../broken_configuration/config/broken_conf_cookie_name_and_regexp.ini |
| 8 | --FILE-- | 8 | --FILE-- |
| 9 | --EXPECT-- | 9 | --EXPECT-- |
| 10 | 10 | ||
diff --git a/src/tests/broken_configuration_php8/config/broken_conf_cookie_name_and_regexp.ini b/src/tests/broken_configuration_php8/config/broken_conf_cookie_name_and_regexp.ini index 503889b..6b43b71 100644 --- a/src/tests/broken_configuration_php8/config/broken_conf_cookie_name_and_regexp.ini +++ b/src/tests/broken_configuration_php8/config/broken_conf_cookie_name_and_regexp.ini | |||
| @@ -1,2 +1,2 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name("my_cookie_name").name_r("my_cookie_regexp").encrypt(); | 2 | sp.cookie.name("my_cookie_name").name_r("my_cookie_regexp").encrypt(); |
diff --git a/src/tests/broken_configuration_php8/config/config_encrypted_cookies_noname.ini b/src/tests/broken_configuration_php8/config/config_encrypted_cookies_noname.ini index 048e404..43a4284 100644 --- a/src/tests/broken_configuration_php8/config/config_encrypted_cookies_noname.ini +++ b/src/tests/broken_configuration_php8/config/config_encrypted_cookies_noname.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name("").encrypt(); | 2 | sp.cookie.name("").encrypt(); |
| 3 | sp.auto_cookie_secure.enable(); | 3 | sp.auto_cookie_secure.enable(); |
diff --git a/src/tests/broken_configuration_php8/config/config_encrypted_regexp_cookies_bad_regexp.ini b/src/tests/broken_configuration_php8/config/config_encrypted_regexp_cookies_bad_regexp.ini index 4fe92fd..817de14 100644 --- a/src/tests/broken_configuration_php8/config/config_encrypted_regexp_cookies_bad_regexp.ini +++ b/src/tests/broken_configuration_php8/config/config_encrypted_regexp_cookies_bad_regexp.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name_r("^super_co[a-z+$").encrypt(); | 2 | sp.cookie.name_r("^super_co[a-z+$").encrypt(); |
| 3 | sp.auto_cookie_secure.enable(); | 3 | sp.auto_cookie_secure.enable(); |
diff --git a/src/tests/broken_configuration_php8/encrypt_key_too_short.phpt b/src/tests/broken_configuration_php8/encrypt_key_too_short.phpt new file mode 100644 index 0000000..c14785e --- /dev/null +++ b/src/tests/broken_configuration_php8/encrypt_key_too_short.phpt | |||
| @@ -0,0 +1,22 @@ | |||
| 1 | --TEST-- | ||
| 2 | Cookie encryption key too short | ||
| 3 | --SKIPIF-- | ||
| 4 | <?php if (!extension_loaded("snuffleupagus")) print "skip"; ?> | ||
| 5 | <?php if (PHP_VERSION_ID < 80000) print "skip"; ?> | ||
| 6 | --INI-- | ||
| 7 | sp.configuration_file={PWD}/../broken_configuration/config/config_encryption_key_short.ini | ||
| 8 | --COOKIE-- | ||
| 9 | --ENV-- | ||
| 10 | return <<<EOF | ||
| 11 | REMOTE_ADDR=2001:0db8:0000:0000:0000:fe00:0042:8329 | ||
| 12 | HTTP_USER_AGENT=Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/59.0.3071.109 Chrome/59.0.3071.109 Safari/537.36 | ||
| 13 | HTTPS=1 | ||
| 14 | EOF; | ||
| 15 | --FILE-- | ||
| 16 | <?php | ||
| 17 | ?> | ||
| 18 | --EXPECT-- | ||
| 19 | Fatal error: [snuffleupagus][2001:0db8:0000:0000:0000:fe00:0042:8329][config][log] The encryption key set on line 1 is too short. please use at least 10 bytes in Unknown on line 0 | ||
| 20 | |||
| 21 | Fatal error: [snuffleupagus][2001:0db8:0000:0000:0000:fe00:0042:8329][config][log] Invalid configuration file in Unknown on line 0 | ||
| 22 | Could not startup. \ No newline at end of file | ||
diff --git a/src/tests/broken_configuration_php8/encrypt_regexp_cookies_bad_regexp.phpt b/src/tests/broken_configuration_php8/encrypt_regexp_cookies_bad_regexp.phpt index 5383df6..6796c5b 100644 --- a/src/tests/broken_configuration_php8/encrypt_regexp_cookies_bad_regexp.phpt +++ b/src/tests/broken_configuration_php8/encrypt_regexp_cookies_bad_regexp.phpt | |||
| @@ -6,7 +6,7 @@ Cookie decryption in ipv4 | |||
| 6 | sp.configuration_file={PWD}/config/config_encrypted_regexp_cookies_bad_regexp.ini | 6 | sp.configuration_file={PWD}/config/config_encrypted_regexp_cookies_bad_regexp.ini |
| 7 | error_reporting=1 | 7 | error_reporting=1 |
| 8 | --COOKIE-- | 8 | --COOKIE-- |
| 9 | super_cookie=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP3gV9YJZL/pUeNAjCKFW0U2ywmf1CwHzwd2pWM=;awful_cookie=awful_cookie_value; | 9 | super_cookie=IpRZV4rivSjANrEOSxINd%2FdFe17giJgaAAAAAAAAAAAAAAAAAAAAALnmBVs%2BTILKxauHeGcUyJpR%2BX2UiZ6OamUTaWc=;awful_cookie=awful_cookie_value; |
| 10 | --ENV-- | 10 | --ENV-- |
| 11 | return <<<EOF | 11 | return <<<EOF |
| 12 | REMOTE_ADDR=127.0.0.1 | 12 | REMOTE_ADDR=127.0.0.1 |
diff --git a/src/tests/config/config_samesite_cookies.ini b/src/tests/config/config_samesite_cookies.ini index 1ca498a..627ff3e 100644 --- a/src/tests/config/config_samesite_cookies.ini +++ b/src/tests/config/config_samesite_cookies.ini | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name("super_cookie").samesite("Lax"); | 2 | sp.cookie.name("super_cookie").samesite("Lax"); |
| 3 | sp.cookie.name("awful_cookie").samesite("strict").encrypt(); | 3 | sp.cookie.name("awful_cookie").samesite("strict").encrypt(); |
| 4 | sp.cookie.name("nice_cookie").samesite("STRICT").encrypt(); | 4 | sp.cookie.name("nice_cookie").samesite("STRICT").encrypt(); |
diff --git a/src/tests/config/phplog.ini b/src/tests/config/phplog.ini index 4eaa287..7126996 100644 --- a/src/tests/config/phplog.ini +++ b/src/tests/config/phplog.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef"); | 1 | sp.global.secret_key("abcdefGHIJ"); |
| 2 | sp.unserialize_hmac.enable(); | 2 | sp.unserialize_hmac.enable(); |
| 3 | sp.log_media("php"); | 3 | sp.log_media("php"); |
diff --git a/src/tests/config/sid_length_limit.ini b/src/tests/config/sid_length_limit.ini new file mode 100644 index 0000000..f6ef335 --- /dev/null +++ b/src/tests/config/sid_length_limit.ini | |||
| @@ -0,0 +1 @@ | |||
| sp.session.sid_min_length("10").sid_max_length("32"); \ No newline at end of file | |||
diff --git a/src/tests/config/syslog.ini b/src/tests/config/syslog.ini index 17dce05..2210975 100644 --- a/src/tests/config/syslog.ini +++ b/src/tests/config/syslog.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef"); | 1 | sp.global.secret_key("abcdefGHIJ"); |
| 2 | sp.unserialize_hmac.enable(); | 2 | sp.unserialize_hmac.enable(); |
| 3 | sp.log_media("syslog"); | 3 | sp.log_media("syslog"); |
diff --git a/src/tests/config/syslog_simulation.ini b/src/tests/config/syslog_simulation.ini index bb52850..4100444 100644 --- a/src/tests/config/syslog_simulation.ini +++ b/src/tests/config/syslog_simulation.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef"); | 1 | sp.global.secret_key("abcdefGHIJ"); |
| 2 | sp.unserialize_hmac.enable().simulation(); | 2 | sp.unserialize_hmac.enable().simulation(); |
| 3 | sp.log_media("syslog"); | 3 | sp.log_media("syslog"); |
diff --git a/src/tests/cookies_encryption/config/config_encrypted_cookies.ini b/src/tests/cookies_encryption/config/config_encrypted_cookies.ini index 4b50440..2d82478 100644 --- a/src/tests/cookies_encryption/config/config_encrypted_cookies.ini +++ b/src/tests/cookies_encryption/config/config_encrypted_cookies.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name("super_cookie").encrypt(); | 2 | sp.cookie.name("super_cookie").encrypt(); |
| 3 | sp.auto_cookie_secure.enable(); | 3 | sp.auto_cookie_secure.enable(); |
diff --git a/src/tests/cookies_encryption/config/config_encrypted_cookies_empty_env.ini b/src/tests/cookies_encryption/config/config_encrypted_cookies_empty_env.ini index 8368d65..311e0ca 100644 --- a/src/tests/cookies_encryption/config/config_encrypted_cookies_empty_env.ini +++ b/src/tests/cookies_encryption/config/config_encrypted_cookies_empty_env.ini | |||
| @@ -1,2 +1,2 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("SUPER_ENV_VAR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("SUPER_ENV_VAR"); |
| 2 | sp.cookie.name("super_cookie").encrypt(); | 2 | sp.cookie.name("super_cookie").encrypt(); |
diff --git a/src/tests/cookies_encryption/config/config_encrypted_cookies_simulation.ini b/src/tests/cookies_encryption/config/config_encrypted_cookies_simulation.ini index 32e24a1..f4f9acc 100644 --- a/src/tests/cookies_encryption/config/config_encrypted_cookies_simulation.ini +++ b/src/tests/cookies_encryption/config/config_encrypted_cookies_simulation.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name("super_cookie").encrypt().simulation(); | 2 | sp.cookie.name("super_cookie").encrypt().simulation(); |
| 3 | sp.auto_cookie_secure.enable(); | 3 | sp.auto_cookie_secure.enable(); |
diff --git a/src/tests/cookies_encryption/config/config_encrypted_regexp_cookies.ini b/src/tests/cookies_encryption/config/config_encrypted_regexp_cookies.ini index 8ea77f7..b6fc8b7 100644 --- a/src/tests/cookies_encryption/config/config_encrypted_regexp_cookies.ini +++ b/src/tests/cookies_encryption/config/config_encrypted_regexp_cookies.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name_r("^super_co[a-z]+$").encrypt(); | 2 | sp.cookie.name_r("^super_co[a-z]+$").encrypt(); |
| 3 | sp.auto_cookie_secure.enable(); | 3 | sp.auto_cookie_secure.enable(); |
diff --git a/src/tests/cookies_encryption/config/config_encrypted_regexp_cookies_empty_env.ini b/src/tests/cookies_encryption/config/config_encrypted_regexp_cookies_empty_env.ini index da84df7..43f6f94 100644 --- a/src/tests/cookies_encryption/config/config_encrypted_regexp_cookies_empty_env.ini +++ b/src/tests/cookies_encryption/config/config_encrypted_regexp_cookies_empty_env.ini | |||
| @@ -1,2 +1,2 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name_r("^super_coo[a-z]+$").encrypt(); | 2 | sp.cookie.name_r("^super_coo[a-z]+$").encrypt(); |
diff --git a/src/tests/cookies_encryption/config/encryption_key_only.ini b/src/tests/cookies_encryption/config/encryption_key_only.ini index 7de4438..e107f15 100644 --- a/src/tests/cookies_encryption/config/encryption_key_only.ini +++ b/src/tests/cookies_encryption/config/encryption_key_only.ini | |||
| @@ -1 +1 @@ | |||
| sp.global.secret_key("abcdef"); | sp.global.secret_key("abcdefGHIJ"); | ||
diff --git a/src/tests/cookies_encryption/encrypt_cookies.phpt b/src/tests/cookies_encryption/encrypt_cookies.phpt index 49587b7..21ec0ed 100644 --- a/src/tests/cookies_encryption/encrypt_cookies.phpt +++ b/src/tests/cookies_encryption/encrypt_cookies.phpt | |||
| @@ -5,7 +5,7 @@ Cookie decryption in ipv4 | |||
| 5 | --INI-- | 5 | --INI-- |
| 6 | sp.configuration_file={PWD}/config/config_encrypted_cookies.ini | 6 | sp.configuration_file={PWD}/config/config_encrypted_cookies.ini |
| 7 | --COOKIE-- | 7 | --COOKIE-- |
| 8 | super_cookie=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP3gV9YJZL/pUeNAjCKFW0U2ywmf1CwHzwd2pWM=;awful_cookie=awful_cookie_value; | 8 | super_cookie=IpRZV4rivSjANrEOSxINd%2FdFe17giJgaAAAAAAAAAAAAAAAAAAAAALnmBVs%2BTILKxauHeGcUyJpR%2BX2UiZ6OamUTaWc=;awful_cookie=awful_cookie_value; |
| 9 | --ENV-- | 9 | --ENV-- |
| 10 | return <<<EOF | 10 | return <<<EOF |
| 11 | REMOTE_ADDR=127.0.0.1 | 11 | REMOTE_ADDR=127.0.0.1 |
diff --git a/src/tests/cookies_encryption/encrypt_cookies3.phpt b/src/tests/cookies_encryption/encrypt_cookies3.phpt index beb4efb..f5cadcb 100644 --- a/src/tests/cookies_encryption/encrypt_cookies3.phpt +++ b/src/tests/cookies_encryption/encrypt_cookies3.phpt | |||
| @@ -5,7 +5,7 @@ Cookie decryption with ipv6 | |||
| 5 | --INI-- | 5 | --INI-- |
| 6 | sp.configuration_file={PWD}/config/config_encrypted_regexp_cookies.ini | 6 | sp.configuration_file={PWD}/config/config_encrypted_regexp_cookies.ini |
| 7 | --COOKIE-- | 7 | --COOKIE-- |
| 8 | super_cookie=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABM84SCotZTpP6b27Lr5lavORPMvqaKpcUahvxw=;awful_cookie=awful_cookie_value; | 8 | super_cookie=eFXrR4GCQtT4Q7%2FLRVtDBH44aMC4hI33AAAAAAAAAAAAAAAAAAAAAGrtoM2Mltxj8%2B9dELwitKN42C8ZE1kYX%2BKWwjM%3D;awful_cookie=awful_cookie_value; |
| 9 | --ENV-- | 9 | --ENV-- |
| 10 | return <<<EOF | 10 | return <<<EOF |
| 11 | REMOTE_ADDR=2001:0db8:0000:0000:0000:fe00:0042:8329 | 11 | REMOTE_ADDR=2001:0db8:0000:0000:0000:fe00:0042:8329 |
diff --git a/src/tests/cookies_encryption/encrypt_regexp_cookies.phpt b/src/tests/cookies_encryption/encrypt_regexp_cookies.phpt index da44855..41c4f2a 100644 --- a/src/tests/cookies_encryption/encrypt_regexp_cookies.phpt +++ b/src/tests/cookies_encryption/encrypt_regexp_cookies.phpt | |||
| @@ -5,7 +5,7 @@ Cookie decryption in ipv4 | |||
| 5 | --INI-- | 5 | --INI-- |
| 6 | sp.configuration_file={PWD}/config/config_encrypted_regexp_cookies.ini | 6 | sp.configuration_file={PWD}/config/config_encrypted_regexp_cookies.ini |
| 7 | --COOKIE-- | 7 | --COOKIE-- |
| 8 | super_cookie=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP3gV9YJZL/pUeNAjCKFW0U2ywmf1CwHzwd2pWM=;awful_cookie=awful_cookie_value; | 8 | super_cookie=IpRZV4rivSjANrEOSxINd%2FdFe17giJgaAAAAAAAAAAAAAAAAAAAAALnmBVs%2BTILKxauHeGcUyJpR%2BX2UiZ6OamUTaWc=;awful_cookie=awful_cookie_value; |
| 9 | --ENV-- | 9 | --ENV-- |
| 10 | return <<<EOF | 10 | return <<<EOF |
| 11 | REMOTE_ADDR=127.0.0.1 | 11 | REMOTE_ADDR=127.0.0.1 |
diff --git a/src/tests/cookies_encryption/encrypt_regexp_cookies3.phpt b/src/tests/cookies_encryption/encrypt_regexp_cookies3.phpt index beb4efb..09f0a75 100644 --- a/src/tests/cookies_encryption/encrypt_regexp_cookies3.phpt +++ b/src/tests/cookies_encryption/encrypt_regexp_cookies3.phpt | |||
| @@ -5,7 +5,7 @@ Cookie decryption with ipv6 | |||
| 5 | --INI-- | 5 | --INI-- |
| 6 | sp.configuration_file={PWD}/config/config_encrypted_regexp_cookies.ini | 6 | sp.configuration_file={PWD}/config/config_encrypted_regexp_cookies.ini |
| 7 | --COOKIE-- | 7 | --COOKIE-- |
| 8 | super_cookie=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABM84SCotZTpP6b27Lr5lavORPMvqaKpcUahvxw=;awful_cookie=awful_cookie_value; | 8 | super_cookie=mzOxoJ9o9Y83iYX15DkJmYrW%2FrJfyB2SAAAAAAAAAAAAAAAAAAAAAKe5DegjtjwoFZirOY4LO6jSlqtZdF%2FUMriwn8w=;awful_cookie=awful_cookie_value; |
| 9 | --ENV-- | 9 | --ENV-- |
| 10 | return <<<EOF | 10 | return <<<EOF |
| 11 | REMOTE_ADDR=2001:0db8:0000:0000:0000:fe00:0042:8329 | 11 | REMOTE_ADDR=2001:0db8:0000:0000:0000:fe00:0042:8329 |
diff --git a/src/tests/cookies_encryption_warning/config/encrypt_cookies_no_env.ini b/src/tests/cookies_encryption_warning/config/encrypt_cookies_no_env.ini index 845bd02..b72b311 100644 --- a/src/tests/cookies_encryption_warning/config/encrypt_cookies_no_env.ini +++ b/src/tests/cookies_encryption_warning/config/encrypt_cookies_no_env.ini | |||
| @@ -1,2 +1,2 @@ | |||
| 1 | sp.global.secret_key("abcdef"); | 1 | sp.global.secret_key("abcdefGHIJ"); |
| 2 | sp.cookie.name("super_cookie").encrypt(); | 2 | sp.cookie.name("super_cookie").encrypt(); |
diff --git a/src/tests/cookies_encryption_warning/config/encrypt_regexp_cookies_no_env.ini b/src/tests/cookies_encryption_warning/config/encrypt_regexp_cookies_no_env.ini index 0e1fa30..d4c4535 100644 --- a/src/tests/cookies_encryption_warning/config/encrypt_regexp_cookies_no_env.ini +++ b/src/tests/cookies_encryption_warning/config/encrypt_regexp_cookies_no_env.ini | |||
| @@ -1,2 +1,2 @@ | |||
| 1 | sp.global.secret_key("abcdef"); | 1 | sp.global.secret_key("abcdefGHIJ"); |
| 2 | sp.cookie.name_r("^super_co[a-z]+$").encrypt(); | 2 | sp.cookie.name_r("^super_co[a-z]+$").encrypt(); |
diff --git a/src/tests/cookies_php8/config/config_encrypted_cookies.ini b/src/tests/cookies_php8/config/config_encrypted_cookies.ini index 4b50440..2d82478 100644 --- a/src/tests/cookies_php8/config/config_encrypted_cookies.ini +++ b/src/tests/cookies_php8/config/config_encrypted_cookies.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.cookie.name("super_cookie").encrypt(); | 2 | sp.cookie.name("super_cookie").encrypt(); |
| 3 | sp.auto_cookie_secure.enable(); | 3 | sp.auto_cookie_secure.enable(); |
diff --git a/src/tests/session_encryption/config/config_crypt_session.ini b/src/tests/session_encryption/config/config_crypt_session.ini index 14b0c2c..054f0f8 100644 --- a/src/tests/session_encryption/config/config_crypt_session.ini +++ b/src/tests/session_encryption/config/config_crypt_session.ini | |||
| @@ -1,2 +1,2 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.session.encrypt(); \ No newline at end of file | 2 | sp.session.encrypt(); \ No newline at end of file |
diff --git a/src/tests/session_encryption/config/config_crypt_session_simul.ini b/src/tests/session_encryption/config/config_crypt_session_simul.ini index fbd43eb..5e3433b 100644 --- a/src/tests/session_encryption/config/config_crypt_session_simul.ini +++ b/src/tests/session_encryption/config/config_crypt_session_simul.ini | |||
| @@ -1,3 +1,3 @@ | |||
| 1 | sp.global.secret_key("abcdef").cookie_env_var("REMOTE_ADDR"); | 1 | sp.global.secret_key("abcdefGHIJ").cookie_env_var("REMOTE_ADDR"); |
| 2 | sp.session.encrypt(); | 2 | sp.session.encrypt(); |
| 3 | sp.session.simulation(); \ No newline at end of file | 3 | sp.session.simulation(); \ No newline at end of file |
diff --git a/src/tests/unserialize/config/config_serialize.ini b/src/tests/unserialize/config/config_serialize.ini index f2c1699..30e8fba 100644 --- a/src/tests/unserialize/config/config_serialize.ini +++ b/src/tests/unserialize/config/config_serialize.ini | |||
| @@ -1,2 +1,2 @@ | |||
| 1 | sp.global.secret_key("abcdef"); | 1 | sp.global.secret_key("abcdefGHIJ"); |
| 2 | sp.unserialize_hmac.enable(); \ No newline at end of file | 2 | sp.unserialize_hmac.enable(); \ No newline at end of file |
diff --git a/src/tests/unserialize/config/config_serialize_sim.ini b/src/tests/unserialize/config/config_serialize_sim.ini index 7f015e0..c20013f 100644 --- a/src/tests/unserialize/config/config_serialize_sim.ini +++ b/src/tests/unserialize/config/config_serialize_sim.ini | |||
| @@ -1,2 +1,2 @@ | |||
| 1 | sp.global.secret_key("abcdef"); | 1 | sp.global.secret_key("abcdefGHIJ"); |
| 2 | sp.unserialize_hmac.enable().simulation(); | 2 | sp.unserialize_hmac.enable().simulation(); |
diff --git a/src/tests/unserialize/config/dump_unserialize.ini b/src/tests/unserialize/config/dump_unserialize.ini index 4352a3e..09480cc 100644 --- a/src/tests/unserialize/config/dump_unserialize.ini +++ b/src/tests/unserialize/config/dump_unserialize.ini | |||
| @@ -1,2 +1,2 @@ | |||
| 1 | sp.global.secret_key("abcdef"); | 1 | sp.global.secret_key("abcdefGHIJ"); |
| 2 | sp.unserialize_hmac.enable().dump("/tmp/dump_result/"); | 2 | sp.unserialize_hmac.enable().dump("/tmp/dump_result/"); |
diff --git a/src/tests/unserialize/serialize.phpt b/src/tests/unserialize/serialize.phpt index e93dbaf..8b7c0bc 100644 --- a/src/tests/unserialize/serialize.phpt +++ b/src/tests/unserialize/serialize.phpt | |||
| @@ -9,5 +9,5 @@ sp.configuration_file={PWD}/config/config_serialize.ini | |||
| 9 | echo serialize("a"); | 9 | echo serialize("a"); |
| 10 | ?> | 10 | ?> |
| 11 | --EXPECT-- | 11 | --EXPECT-- |
| 12 | s:1:"a";650609b417904d0d9bbf1fc44a975d13ecdf6b02b715c1a06271fb3b673f25b1 | 12 | s:1:"a";cdbc93e593656164d448db33e4668a3f30fa794d6658016365f7eb453d48b022 |
| 13 | 13 | ||
diff --git a/src/tests/unserialize/unserialize_sim.phpt b/src/tests/unserialize/unserialize_sim.phpt index 9bff2c1..1256c23 100644 --- a/src/tests/unserialize/unserialize_sim.phpt +++ b/src/tests/unserialize/unserialize_sim.phpt | |||
| @@ -7,12 +7,13 @@ sp.configuration_file={PWD}/config/config_serialize_sim.ini | |||
| 7 | --FILE-- | 7 | --FILE-- |
| 8 | <?php | 8 | <?php |
| 9 | $a=serialize("a"); | 9 | $a=serialize("a"); |
| 10 | echo $a; | 10 | echo $a . PHP_EOL; |
| 11 | var_dump(unserialize($a)); | 11 | var_dump(unserialize($a)); |
| 12 | var_dump(unserialize('s:1:"a";alyualskdufyhalkdjsfhalkjdhflaksjdfhlkasdhflkahdawkuerylksjdfhlkssjgdflaksjdh1337sjdf')); | 12 | var_dump(unserialize('s:1:"a";alyualskdufyhalkdjsfhalkjdhflaksjdfhlkasdhflkahdawkuerylksjdfhlkssjgdflaksjdh1337sjdf')); |
| 13 | ?> | 13 | ?> |
| 14 | --EXPECTF-- | 14 | --EXPECTF-- |
| 15 | s:1:"a";650609b417904d0d9bbf1fc44a975d13ecdf6b02b715c1a06271fb3b673f25b1string(1) "a" | 15 | s:1:"a";cdbc93e593656164d448db33e4668a3f30fa794d6658016365f7eb453d48b022 |
| 16 | string(1) "a" | ||
| 16 | 17 | ||
| 17 | Warning: [snuffleupagus][0.0.0.0][unserialize][simulation] Invalid HMAC for s:1:"a";alyualskdufyhalkdjsfh in %a/unserialize_sim.php on line 5 | 18 | Warning: [snuffleupagus][0.0.0.0][unserialize][simulation] Invalid HMAC for s:1:"a";alyualskdufyhalkdjsfh in %a/unserialize_sim.php on line 5 |
| 18 | string(1) "a" | 19 | string(1) "a" |
diff --git a/src/tests/unserialize_php8/config/config_serialize.ini b/src/tests/unserialize_php8/config/config_serialize.ini index 7de4438..e107f15 100644 --- a/src/tests/unserialize_php8/config/config_serialize.ini +++ b/src/tests/unserialize_php8/config/config_serialize.ini | |||
| @@ -1 +1 @@ | |||
| sp.global.secret_key("abcdef"); | sp.global.secret_key("abcdefGHIJ"); | ||
