mirror of
https://github.com/php/php-src.git
synced 2025-08-16 05:58:45 +02:00

* master: (41 commits) Update copyright year to 2014 Update copyright year to 2014 Update copyright year to 2014 Update copyright year to 2014 Update copyright year to 2014 Update copyright year to 2014 Update copyright year to 2014 NEWS Fix Request #67453 Allow to unserialize empty data. Update copyright year to 2014 Update copyright year for re2c generated files Update copyright year to 2014 Update copyright year for re2c files as well Fix patch for bug #67436 fix failed test Fix test on modern distro where old unsecure algo are disabled in openssl config. Testing recent algo should be enough to check this function. Added tests for bug 67436 Fixed wrong XFAIL test - already fixed Fix typo in Bug #67406 NEWS entry Fix typo in Bug #67406 NEWS entry ... Conflicts: Zend/zend_compile.c ext/session/session.c ext/standard/array.c ext/standard/http_fopen_wrapper.c tests/classes/bug63462.phpt
326 lines
9.3 KiB
C
326 lines
9.3 KiB
C
/*
|
|
+----------------------------------------------------------------------+
|
|
| PHP Version 5 |
|
|
+----------------------------------------------------------------------+
|
|
| Copyright (c) 1997-2014 The PHP Group |
|
|
+----------------------------------------------------------------------+
|
|
| This source file is subject to version 3.01 of the PHP license, |
|
|
| that is bundled with this package in the file LICENSE, and is |
|
|
| available through the world-wide-web at the following url: |
|
|
| http://www.php.net/license/3_01.txt |
|
|
| If you did not receive a copy of the PHP license and are unable to |
|
|
| obtain it through the world-wide-web, please send a note to |
|
|
| license@php.net so we can mail you a copy immediately. |
|
|
+----------------------------------------------------------------------+
|
|
| Author: Rasmus Lerdorf <rasmus@lerdorf.on.ca> |
|
|
+----------------------------------------------------------------------+
|
|
*/
|
|
/* $Id$ */
|
|
|
|
#include <stdio.h>
|
|
#include "php.h"
|
|
#include "ext/standard/php_standard.h"
|
|
#include "ext/date/php_date.h"
|
|
#include "SAPI.h"
|
|
#include "php_main.h"
|
|
#include "head.h"
|
|
#ifdef TM_IN_SYS_TIME
|
|
#include <sys/time.h>
|
|
#else
|
|
#include <time.h>
|
|
#endif
|
|
|
|
#include "php_globals.h"
|
|
|
|
|
|
/* Implementation of the language Header() function */
|
|
/* {{{ proto void header(string header [, bool replace, [int http_response_code]])
|
|
Sends a raw HTTP header */
|
|
PHP_FUNCTION(header)
|
|
{
|
|
zend_bool rep = 1;
|
|
sapi_header_line ctr = {0};
|
|
|
|
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s|bl", &ctr.line,
|
|
&ctr.line_len, &rep, &ctr.response_code) == FAILURE)
|
|
return;
|
|
|
|
sapi_header_op(rep ? SAPI_HEADER_REPLACE:SAPI_HEADER_ADD, &ctr TSRMLS_CC);
|
|
}
|
|
/* }}} */
|
|
|
|
/* {{{ proto void header_remove([string name])
|
|
Removes an HTTP header previously set using header() */
|
|
PHP_FUNCTION(header_remove)
|
|
{
|
|
sapi_header_line ctr = {0};
|
|
|
|
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "|s", &ctr.line,
|
|
&ctr.line_len) == FAILURE)
|
|
return;
|
|
|
|
sapi_header_op(ZEND_NUM_ARGS() == 0 ? SAPI_HEADER_DELETE_ALL : SAPI_HEADER_DELETE, &ctr TSRMLS_CC);
|
|
}
|
|
/* }}} */
|
|
|
|
PHPAPI int php_header(TSRMLS_D)
|
|
{
|
|
if (sapi_send_headers(TSRMLS_C)==FAILURE || SG(request_info).headers_only) {
|
|
return 0; /* don't allow output */
|
|
} else {
|
|
return 1; /* allow output */
|
|
}
|
|
}
|
|
|
|
|
|
PHPAPI int php_setcookie(char *name, int name_len, char *value, int value_len, time_t expires, char *path, int path_len, char *domain, int domain_len, int secure, int url_encode, int httponly TSRMLS_DC)
|
|
{
|
|
char *cookie;
|
|
int len=sizeof("Set-Cookie: ");
|
|
zend_string *dt;
|
|
sapi_header_line ctr = {0};
|
|
int result;
|
|
zend_string *encoded_value = NULL;
|
|
|
|
if (name && strpbrk(name, "=,; \t\r\n\013\014") != NULL) { /* man isspace for \013 and \014 */
|
|
zend_error( E_WARNING, "Cookie names cannot contain any of the following '=,; \\t\\r\\n\\013\\014'" );
|
|
return FAILURE;
|
|
}
|
|
|
|
if (!url_encode && value && strpbrk(value, ",; \t\r\n\013\014") != NULL) { /* man isspace for \013 and \014 */
|
|
zend_error( E_WARNING, "Cookie values cannot contain any of the following ',; \\t\\r\\n\\013\\014'" );
|
|
return FAILURE;
|
|
}
|
|
|
|
len += name_len;
|
|
if (value && url_encode) {
|
|
encoded_value = php_url_encode(value, value_len);
|
|
len += encoded_value->len;
|
|
} else if (value) {
|
|
encoded_value = STR_INIT(value, value_len, 0);
|
|
len += encoded_value->len;
|
|
}
|
|
|
|
if (path) {
|
|
len += path_len;
|
|
}
|
|
if (domain) {
|
|
len += domain_len;
|
|
}
|
|
|
|
cookie = emalloc(len + 100);
|
|
|
|
if (value && value_len == 0) {
|
|
/*
|
|
* MSIE doesn't delete a cookie when you set it to a null value
|
|
* so in order to force cookies to be deleted, even on MSIE, we
|
|
* pick an expiry date in the past
|
|
*/
|
|
dt = php_format_date("D, d-M-Y H:i:s T", sizeof("D, d-M-Y H:i:s T")-1, 1, 0 TSRMLS_CC);
|
|
snprintf(cookie, len + 100, "Set-Cookie: %s=deleted; expires=%s; Max-Age=0", name, dt->val);
|
|
STR_FREE(dt);
|
|
} else {
|
|
snprintf(cookie, len + 100, "Set-Cookie: %s=%s", name, value ? encoded_value->val : "");
|
|
if (expires > 0) {
|
|
const char *p;
|
|
char tsdelta[13];
|
|
strlcat(cookie, COOKIE_EXPIRES, len + 100);
|
|
dt = php_format_date("D, d-M-Y H:i:s T", sizeof("D, d-M-Y H:i:s T")-1, expires, 0 TSRMLS_CC);
|
|
/* check to make sure that the year does not exceed 4 digits in length */
|
|
p = zend_memrchr(dt->val, '-', dt->len);
|
|
if (!p || *(p + 5) != ' ') {
|
|
STR_FREE(dt);
|
|
efree(cookie);
|
|
STR_FREE(encoded_value);
|
|
zend_error(E_WARNING, "Expiry date cannot have a year greater than 9999");
|
|
return FAILURE;
|
|
}
|
|
strlcat(cookie, dt->val, len + 100);
|
|
STR_FREE(dt);
|
|
|
|
snprintf(tsdelta, sizeof(tsdelta), "%li", (long) difftime(expires, time(NULL)));
|
|
strlcat(cookie, COOKIE_MAX_AGE, len + 100);
|
|
strlcat(cookie, tsdelta, len + 100);
|
|
}
|
|
}
|
|
|
|
if (encoded_value) {
|
|
STR_FREE(encoded_value);
|
|
}
|
|
|
|
if (path && path_len > 0) {
|
|
strlcat(cookie, COOKIE_PATH, len + 100);
|
|
strlcat(cookie, path, len + 100);
|
|
}
|
|
if (domain && domain_len > 0) {
|
|
strlcat(cookie, COOKIE_DOMAIN, len + 100);
|
|
strlcat(cookie, domain, len + 100);
|
|
}
|
|
if (secure) {
|
|
strlcat(cookie, COOKIE_SECURE, len + 100);
|
|
}
|
|
if (httponly) {
|
|
strlcat(cookie, COOKIE_HTTPONLY, len + 100);
|
|
}
|
|
|
|
ctr.line = cookie;
|
|
ctr.line_len = strlen(cookie);
|
|
|
|
result = sapi_header_op(SAPI_HEADER_ADD, &ctr TSRMLS_CC);
|
|
efree(cookie);
|
|
return result;
|
|
}
|
|
|
|
|
|
/* php_set_cookie(name, value, expires, path, domain, secure) */
|
|
/* {{{ proto bool setcookie(string name [, string value [, int expires [, string path [, string domain [, bool secure[, bool httponly]]]]]])
|
|
Send a cookie */
|
|
PHP_FUNCTION(setcookie)
|
|
{
|
|
char *name, *value = NULL, *path = NULL, *domain = NULL;
|
|
long expires = 0;
|
|
zend_bool secure = 0, httponly = 0;
|
|
int name_len, value_len = 0, path_len = 0, domain_len = 0;
|
|
|
|
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s|slssbb", &name,
|
|
&name_len, &value, &value_len, &expires, &path,
|
|
&path_len, &domain, &domain_len, &secure, &httponly) == FAILURE) {
|
|
return;
|
|
}
|
|
|
|
if (php_setcookie(name, name_len, value, value_len, expires, path, path_len, domain, domain_len, secure, 1, httponly TSRMLS_CC) == SUCCESS) {
|
|
RETVAL_TRUE;
|
|
} else {
|
|
RETVAL_FALSE;
|
|
}
|
|
}
|
|
/* }}} */
|
|
|
|
/* {{{ proto bool setrawcookie(string name [, string value [, int expires [, string path [, string domain [, bool secure[, bool httponly]]]]]])
|
|
Send a cookie with no url encoding of the value */
|
|
PHP_FUNCTION(setrawcookie)
|
|
{
|
|
char *name, *value = NULL, *path = NULL, *domain = NULL;
|
|
long expires = 0;
|
|
zend_bool secure = 0, httponly = 0;
|
|
int name_len, value_len = 0, path_len = 0, domain_len = 0;
|
|
|
|
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s|slssbb", &name,
|
|
&name_len, &value, &value_len, &expires, &path,
|
|
&path_len, &domain, &domain_len, &secure, &httponly) == FAILURE) {
|
|
return;
|
|
}
|
|
|
|
if (php_setcookie(name, name_len, value, value_len, expires, path, path_len, domain, domain_len, secure, 0, httponly TSRMLS_CC) == SUCCESS) {
|
|
RETVAL_TRUE;
|
|
} else {
|
|
RETVAL_FALSE;
|
|
}
|
|
}
|
|
/* }}} */
|
|
|
|
|
|
/* {{{ proto bool headers_sent([string &$file [, int &$line]])
|
|
Returns true if headers have already been sent, false otherwise */
|
|
PHP_FUNCTION(headers_sent)
|
|
{
|
|
zval *arg1 = NULL, *arg2 = NULL;
|
|
const char *file="";
|
|
int line=0;
|
|
|
|
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "|z/z/", &arg1, &arg2) == FAILURE)
|
|
return;
|
|
|
|
if (SG(headers_sent)) {
|
|
line = php_output_get_start_lineno(TSRMLS_C);
|
|
file = php_output_get_start_filename(TSRMLS_C);
|
|
}
|
|
|
|
switch(ZEND_NUM_ARGS()) {
|
|
case 2:
|
|
zval_dtor(arg2);
|
|
ZVAL_LONG(arg2, line);
|
|
case 1:
|
|
zval_dtor(arg1);
|
|
if (file) {
|
|
ZVAL_STRING(arg1, file);
|
|
} else {
|
|
ZVAL_EMPTY_STRING(arg1);
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (SG(headers_sent)) {
|
|
RETURN_TRUE;
|
|
} else {
|
|
RETURN_FALSE;
|
|
}
|
|
}
|
|
/* }}} */
|
|
|
|
/* {{{ php_head_apply_header_list_to_hash
|
|
Turn an llist of sapi_header_struct headers into a numerically indexed zval hash */
|
|
static void php_head_apply_header_list_to_hash(void *data, void *arg TSRMLS_DC)
|
|
{
|
|
sapi_header_struct *sapi_header = (sapi_header_struct *)data;
|
|
|
|
if (arg && sapi_header) {
|
|
add_next_index_string((zval *)arg, (char *)(sapi_header->header));
|
|
}
|
|
}
|
|
|
|
/* {{{ proto array headers_list(void)
|
|
Return list of headers to be sent / already sent */
|
|
PHP_FUNCTION(headers_list)
|
|
{
|
|
if (zend_parse_parameters_none() == FAILURE) {
|
|
return;
|
|
}
|
|
|
|
if (!&SG(sapi_headers).headers) {
|
|
RETURN_FALSE;
|
|
}
|
|
array_init(return_value);
|
|
zend_llist_apply_with_argument(&SG(sapi_headers).headers, php_head_apply_header_list_to_hash, return_value TSRMLS_CC);
|
|
}
|
|
/* }}} */
|
|
|
|
/* {{{ proto long http_response_code([int response_code])
|
|
Sets a response code, or returns the current HTTP response code */
|
|
PHP_FUNCTION(http_response_code)
|
|
{
|
|
long response_code = 0;
|
|
|
|
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "|l", &response_code) == FAILURE) {
|
|
return;
|
|
}
|
|
|
|
if (response_code)
|
|
{
|
|
long old_response_code;
|
|
|
|
old_response_code = SG(sapi_headers).http_response_code;
|
|
SG(sapi_headers).http_response_code = response_code;
|
|
|
|
if (old_response_code) {
|
|
RETURN_LONG(old_response_code);
|
|
}
|
|
|
|
RETURN_TRUE;
|
|
}
|
|
|
|
if (!SG(sapi_headers).http_response_code) {
|
|
RETURN_FALSE;
|
|
}
|
|
|
|
RETURN_LONG(SG(sapi_headers).http_response_code);
|
|
}
|
|
/* }}} */
|
|
|
|
/*
|
|
* Local variables:
|
|
* tab-width: 4
|
|
* c-basic-offset: 4
|
|
* vim600: sw=4 ts=4 fdm=marker
|
|
* vim<600: sw=4 ts=4 * End:
|
|
*/
|