!C99Shell v. 2.1 [PHP 8 Update] [02.02.2022]!

Software: Apache/2.4.53 (Unix) OpenSSL/1.1.1o PHP/7.4.29 mod_perl/2.0.12 Perl/v5.34.1. PHP/7.4.29 

uname -a: Linux vps-2738122-x 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64 

uid=1(daemon) gid=1(daemon) grupos=1(daemon) 

Safe-mode: OFF (not secure)

/opt/apex_led/php/vendor/onelogin/php-saml/tests/src/OneLogin/Saml2/   drwxrwxr-x
Free 15.6 GB of 61.93 GB (25.19%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     AuthnRequestTest.php (8.59 KB)      -rwxrwxr-x
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php

/**
 * Unit tests for AuthN Request
 */
class OneLogin_Saml2_AuthnRequestTest extends PHPUnit_Framework_TestCase
{
    private 
$_settings;

    
/**
    * Initializes the Test Suite
    */
    
public function setUp()
    {
        
$settingsDir TEST_ROOT .'/settings/';
        include 
$settingsDir.'settings1.php';

        
$settings = new OneLogin_Saml2_Settings($settingsInfo);
        
$this->_settings $settings;
    }

    
/**
    * Tests the OneLogin_Saml2_AuthnRequest Constructor. 
    * The creation of a deflated SAML Request
    *
    * @covers OneLogin_Saml2_AuthnRequest
    */
    
public function testCreateDeflatedSAMLRequestURLParameter()
    {
        
$authnRequest = new OneLogin_Saml2_AuthnRequest($this->_settings);
        
$parameters = array('SAMLRequest' => $authnRequest->getRequest());
        
$authUrl OneLogin_Saml2_Utils::redirect('http://idp.example.com/SSOService.php'$parameterstrue);
        
$this->assertRegExp('#^http://idp\.example\.com\/SSOService\.php\?SAMLRequest=#'$authUrl);
        
parse_str(parse_url($authUrlPHP_URL_QUERY), $exploded);
        
// parse_url already urldecode de params so is not required.
        
$payload $exploded['SAMLRequest'];
        
$decoded base64_decode($payload);
        
$inflated gzinflate($decoded);
        
$this->assertRegExp('#^<samlp:AuthnRequest#'$inflated);
    }

    
/**
    * Tests the OneLogin_Saml2_AuthnRequest Constructor. 
    * The creation of a deflated SAML Request with AuthNContext
    *
    * @covers OneLogin_Saml2_AuthnRequest
    */
    
public function testAuthNContext()
    {
        
$settingsDir TEST_ROOT .'/settings/';
        include 
$settingsDir.'settings1.php';

        
$settings = new OneLogin_Saml2_Settings($settingsInfo);
        
$authnRequest = new OneLogin_Saml2_AuthnRequest($settings);
        
$encodedRequest $authnRequest->getRequest();
        
$decoded base64_decode($encodedRequest);
        
$request gzinflate($decoded);
        
$this->assertContains('<samlp:RequestedAuthnContext Comparison="exact">'$request);
        
$this->assertContains('<saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>'$request);

        
$settingsInfo['security']['requestedAuthnContext']= true;
        
$settings2 = new OneLogin_Saml2_Settings($settingsInfo);
        
$authnRequest2 = new OneLogin_Saml2_AuthnRequest($settings2);
        
$encodedRequest2 $authnRequest2->getRequest();
        
$decoded2 base64_decode($encodedRequest2);
        
$request2 gzinflate($decoded2);
        
$this->assertContains('<samlp:RequestedAuthnContext Comparison="exact">'$request2);
        
$this->assertContains('<saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>'$request2);

        
$settingsInfo['security']['requestedAuthnContext'] = false;
        
$settings3 = new OneLogin_Saml2_Settings($settingsInfo);
        
$authnRequest3 = new OneLogin_Saml2_AuthnRequest($settings3);
        
$encodedRequest3 $authnRequest3->getRequest();
        
$decoded3 base64_decode($encodedRequest3);
        
$request3 gzinflate($decoded3);
        
$this->assertNotContains('<samlp:RequestedAuthnContext Comparison="exact">'$request3);
        
$this->assertNotContains('<saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>'$request3);

        
$settingsInfo['security']['requestedAuthnContext']= array ('urn:oasis:names:tc:SAML:2.0:ac:classes:Password''urn:oasis:names:tc:SAML:2.0:ac:classes:X509');
        
$settings4 = new OneLogin_Saml2_Settings($settingsInfo);
        
$authnRequest4 = new OneLogin_Saml2_AuthnRequest($settings4);
        
$encodedRequest4 $authnRequest4->getRequest();
        
$decoded4 base64_decode($encodedRequest4);
        
$request4 gzinflate($decoded4);
        
$this->assertContains('<samlp:RequestedAuthnContext Comparison="exact">'$request4);
        
$this->assertNotContains('<saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>'$request4);
        
$this->assertContains('<saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef>'$request4);
        
$this->assertContains('<saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:X509</saml:AuthnContextClassRef>'$request4);
    }

    
/**
    * Tests the OneLogin_Saml2_AuthnRequest Constructor. 
    * The creation of a deflated SAML Request with ForceAuthn
    *
    * @covers OneLogin_Saml2_AuthnRequest
    */
    
public function testForceAuthN()
    {
        
$settingsDir TEST_ROOT .'/settings/';
        include 
$settingsDir.'settings1.php';

        
$settings = new OneLogin_Saml2_Settings($settingsInfo);
        
$authnRequest = new OneLogin_Saml2_AuthnRequest($settings);
        
$encodedRequest $authnRequest->getRequest();
        
$decoded base64_decode($encodedRequest);
        
$request gzinflate($decoded);
        
$this->assertNotContains('ForceAuthn="true"'$request);

        
$authnRequest2 = new OneLogin_Saml2_AuthnRequest($settingsfalsefalse);
        
$encodedRequest2 $authnRequest2->getRequest();
        
$decoded2 base64_decode($encodedRequest2);
        
$request2 gzinflate($decoded2);
        
$this->assertNotContains('ForceAuthn="true"'$request2);

        
$authnRequest3 = new OneLogin_Saml2_AuthnRequest($settingstruefalse);
        
$encodedRequest3 $authnRequest3->getRequest();
        
$decoded3 base64_decode($encodedRequest3);
        
$request3 gzinflate($decoded3);
        
$this->assertContains('ForceAuthn="true"'$request3);
    }

    
/**
    * Tests the OneLogin_Saml2_AuthnRequest Constructor. 
    * The creation of a deflated SAML Request with isPassive
    *
    * @covers OneLogin_Saml2_AuthnRequest
    */
    
public function testIsPassive()
    {
        
$settingsDir TEST_ROOT .'/settings/';
        include 
$settingsDir.'settings1.php';

        
$settings = new OneLogin_Saml2_Settings($settingsInfo);
        
$authnRequest = new OneLogin_Saml2_AuthnRequest($settings);
        
$encodedRequest $authnRequest->getRequest();
        
$decoded base64_decode($encodedRequest);
        
$request gzinflate($decoded);
        
$this->assertNotContains('IsPassive="true"'$request);

        
$authnRequest2 = new OneLogin_Saml2_AuthnRequest($settingsfalsefalse);
        
$encodedRequest2 $authnRequest2->getRequest();
        
$decoded2 base64_decode($encodedRequest2);
        
$request2 gzinflate($decoded2);
        
$this->assertNotContains('IsPassive="true"'$request2);

        
$authnRequest3 = new OneLogin_Saml2_AuthnRequest($settingsfalsetrue);
        
$encodedRequest3 $authnRequest3->getRequest();
        
$decoded3 base64_decode($encodedRequest3);
        
$request3 gzinflate($decoded3);
        
$this->assertContains('IsPassive="true"'$request3);
    }

    
/**
    * Tests the OneLogin_Saml2_AuthnRequest Constructor. 
    * The creation of a deflated SAML Request
    *
    * @covers OneLogin_Saml2_AuthnRequest
    */
    
public function testCreateEncSAMLRequest()
    {
        
$settingsDir TEST_ROOT .'/settings/';
        include 
$settingsDir.'settings1.php';

        
$settingsInfo['organization'] = array (
            
'es' => array (
                
'name' => 'sp_prueba',
                
'displayname' => 'SP prueba',
                
'url' => 'http://sp.example.com'
            
)
        );
        
$settingsInfo['security']['wantNameIdEncrypted'] = true;

        
$settings = new OneLogin_Saml2_Settings($settingsInfo);

        
$authnRequest = new OneLogin_Saml2_AuthnRequest($settings);
        
$parameters = array('SAMLRequest' => $authnRequest->getRequest());
        
$authUrl OneLogin_Saml2_Utils::redirect('http://idp.example.com/SSOService.php'$parameterstrue);
        
$this->assertRegExp('#^http://idp\.example\.com\/SSOService\.php\?SAMLRequest=#'$authUrl);
        
parse_str(parse_url($authUrlPHP_URL_QUERY), $exploded);
        
// parse_url already urldecode de params so is not required.
        
$payload $exploded['SAMLRequest'];
        
$decoded base64_decode($payload);
        
$message gzinflate($decoded);
        
$this->assertRegExp('#^<samlp:AuthnRequest#'$message);
        
$this->assertRegExp('#AssertionConsumerServiceURL="http://stuff.com/endpoints/endpoints/acs.php">#'$message);
        
$this->assertRegExp('#<saml:Issuer>http://stuff.com/endpoints/metadata.php</saml:Issuer>#'$message);
        
$this->assertRegExp('#Format="urn:oasis:names:tc:SAML:2.0:nameid-format:encrypted"#'$message);
        
$this->assertRegExp('#ProviderName="SP prueba"#'$message);
    }
}

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.1 [PHP 8 Update] [02.02.2022] maintained byC99Shell Github | Generation time: 0.305 ]--