Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 18.227.111.48
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
www /
server /
php /
80 /
src /
ext /
session /
[ HOME SHELL ]
Name
Size
Permission
Action
tests
[ DIR ]
drwxr-xr-x
CREDITS
42
B
-rw-r--r--
config.m4
1.32
KB
-rw-r--r--
config.w32
393
B
-rw-r--r--
mod_files.bat
1.28
KB
-rw-r--r--
mod_files.c
19.04
KB
-rw-r--r--
mod_files.h
1.13
KB
-rw-r--r--
mod_files.sh
1.98
KB
-rw-r--r--
mod_mm.c
9.66
KB
-rw-r--r--
mod_mm.h
1.2
KB
-rw-r--r--
mod_user.c
5.87
KB
-rw-r--r--
mod_user.h
1.12
KB
-rw-r--r--
mod_user_class.c
4.17
KB
-rw-r--r--
php_session.h
10.94
KB
-rw-r--r--
session.c
90.39
KB
-rw-r--r--
session.stub.php
2.97
KB
-rw-r--r--
session_arginfo.h
10.15
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : mod_user_class.c
/* +----------------------------------------------------------------------+ | Copyright (c) The PHP Group | +----------------------------------------------------------------------+ | This source file is subject to version 3.01 of the PHP license, | | that is bundled with this package in the file LICENSE, and is | | available through the world-wide-web at the following url: | | http://www.php.net/license/3_01.txt | | If you did not receive a copy of the PHP license and are unable to | | obtain it through the world-wide-web, please send a note to | | license@php.net so we can mail you a copy immediately. | +----------------------------------------------------------------------+ | Author: Arpad Ray <arpad@php.net> | +----------------------------------------------------------------------+ */ #include "php.h" #include "php_session.h" #define PS_SANITY_CHECK \ if (PS(session_status) != php_session_active) { \ php_error_docref(NULL, E_WARNING, "Session is not active"); \ RETURN_FALSE; \ } \ if (PS(default_mod) == NULL) { \ zend_throw_error(NULL, "Cannot call default session handler"); \ RETURN_THROWS(); \ } #define PS_SANITY_CHECK_IS_OPEN \ PS_SANITY_CHECK; \ if (!PS(mod_user_is_open)) { \ php_error_docref(NULL, E_WARNING, "Parent session handler is not open"); \ RETURN_FALSE; \ } /* {{{ Wraps the old open handler */ PHP_METHOD(SessionHandler, open) { char *save_path = NULL, *session_name = NULL; size_t save_path_len, session_name_len; int ret; if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss", &save_path, &save_path_len, &session_name, &session_name_len) == FAILURE) { RETURN_THROWS(); } PS_SANITY_CHECK; PS(mod_user_is_open) = 1; zend_try { ret = PS(default_mod)->s_open(&PS(mod_data), save_path, session_name); } zend_catch { PS(session_status) = php_session_none; zend_bailout(); } zend_end_try(); RETVAL_BOOL(SUCCESS == ret); } /* }}} */ /* {{{ Wraps the old close handler */ PHP_METHOD(SessionHandler, close) { int ret; // don't return on failure, since not closing the default handler // could result in memory leaks or other nasties zend_parse_parameters_none(); PS_SANITY_CHECK_IS_OPEN; PS(mod_user_is_open) = 0; zend_try { ret = PS(default_mod)->s_close(&PS(mod_data)); } zend_catch { PS(session_status) = php_session_none; zend_bailout(); } zend_end_try(); RETVAL_BOOL(SUCCESS == ret); } /* }}} */ /* {{{ Wraps the old read handler */ PHP_METHOD(SessionHandler, read) { zend_string *val; zend_string *key; if (zend_parse_parameters(ZEND_NUM_ARGS(), "S", &key) == FAILURE) { RETURN_THROWS(); } PS_SANITY_CHECK_IS_OPEN; if (PS(default_mod)->s_read(&PS(mod_data), key, &val, PS(gc_maxlifetime)) == FAILURE) { RETURN_FALSE; } RETURN_STR(val); } /* }}} */ /* {{{ Wraps the old write handler */ PHP_METHOD(SessionHandler, write) { zend_string *key, *val; if (zend_parse_parameters(ZEND_NUM_ARGS(), "SS", &key, &val) == FAILURE) { RETURN_THROWS(); } PS_SANITY_CHECK_IS_OPEN; RETURN_BOOL(SUCCESS == PS(default_mod)->s_write(&PS(mod_data), key, val, PS(gc_maxlifetime))); } /* }}} */ /* {{{ Wraps the old destroy handler */ PHP_METHOD(SessionHandler, destroy) { zend_string *key; if (zend_parse_parameters(ZEND_NUM_ARGS(), "S", &key) == FAILURE) { RETURN_THROWS(); } PS_SANITY_CHECK_IS_OPEN; RETURN_BOOL(SUCCESS == PS(default_mod)->s_destroy(&PS(mod_data), key)); } /* }}} */ /* {{{ Wraps the old gc handler */ PHP_METHOD(SessionHandler, gc) { zend_long maxlifetime; zend_long nrdels = -1; if (zend_parse_parameters(ZEND_NUM_ARGS(), "l", &maxlifetime) == FAILURE) { RETURN_THROWS(); } PS_SANITY_CHECK_IS_OPEN; if (PS(default_mod)->s_gc(&PS(mod_data), maxlifetime, &nrdels) == FAILURE) { RETURN_FALSE; } RETURN_LONG(nrdels); } /* }}} */ /* {{{ Wraps the old create_sid handler */ PHP_METHOD(SessionHandler, create_sid) { zend_string *id; if (zend_parse_parameters_none() == FAILURE) { RETURN_THROWS(); } PS_SANITY_CHECK; id = PS(default_mod)->s_create_sid(&PS(mod_data)); RETURN_STR(id); } /* }}} */
Close