]> granicus.if.org Git - php/commitdiff
Revert "refix #69111 and one related test"
authorAnatol Belski <ab@php.net>
Fri, 29 Jan 2016 19:50:14 +0000 (20:50 +0100)
committerAnatol Belski <ab@php.net>
Fri, 29 Jan 2016 19:50:14 +0000 (20:50 +0100)
This reverts commit 80f7b0125875116fdbcdaf48cf8b1bbf93cb378c.

ext/session/mod_files.c
ext/session/tests/rfc1867_sid_invalid.phpt

index f0d4367a1e8e874a09f5cd6710ec41e0b15a6086..99687f1efc551d899e7761baae4da9f598eaa7ac 100644 (file)
@@ -113,10 +113,6 @@ static char *ps_files_path_create(char *buf, size_t buflen, ps_files *data, cons
        int i;
        size_t n;
 
-       if (!data) {
-               return NULL;
-       }
-
        key_len = strlen(key);
        if (key_len <= data->dirdepth ||
                buflen < (strlen(data->basedir) + 2 * data->dirdepth + key_len + 5 + sizeof(FILE_PREFIX))) {
@@ -157,7 +153,7 @@ static void ps_files_close(ps_files *data)
        }
 }
 
-static int ps_files_open(ps_files *data, const char *key)
+static void ps_files_open(ps_files *data, const char *key)
 {
        char buf[MAXPATHLEN];
 #if !defined(O_NOFOLLOW) || !defined(PHP_WIN32)
@@ -174,12 +170,18 @@ static int ps_files_open(ps_files *data, const char *key)
                ps_files_close(data);
 
                if (php_session_valid_key(key) == FAILURE) {
+                       if (data->basedir) {
+                               efree(data->basedir);
+                               data->basedir = NULL;
+                               data->basedir_len = 0;
+                       }
+                       efree(data);
                        php_error_docref(NULL, E_WARNING, "The session id is too long or contains illegal characters, valid characters are a-z, A-Z, 0-9 and '-,'");
-                       return FAILURE;
+                       return;
                }
 
                if (!ps_files_path_create(buf, sizeof(buf), data, key)) {
-                       return FAILURE;
+                       return;
                }
 
                data->lastkey = estrdup(key);
@@ -191,7 +193,7 @@ static int ps_files_open(ps_files *data, const char *key)
                /* Check to make sure that the opened file is not outside of allowable dirs.
                   This is not 100% safe but it's hard to do something better without O_NOFOLLOW */
                if(PG(open_basedir) && lstat(buf, &sbuf) == 0 && S_ISLNK(sbuf.st_mode) && php_check_open_basedir(buf)) {
-                       return FAILURE;
+                       return;
                }
                data->fd = VCWD_OPEN_MODE(buf, O_CREAT | O_RDWR | O_BINARY, data->filemode);
 #endif
@@ -203,7 +205,7 @@ static int ps_files_open(ps_files *data, const char *key)
                        if (fstat(data->fd, &sbuf) || (sbuf.st_uid != 0 && sbuf.st_uid != getuid() && sbuf.st_uid != geteuid())) {
                                close(data->fd);
                                data->fd = -1;
-                               return FAILURE;
+                               return;
                        }
 #endif
                        do {
@@ -220,11 +222,8 @@ static int ps_files_open(ps_files *data, const char *key)
 #endif
                } else {
                        php_error_docref(NULL, E_WARNING, "open(%s, O_RDWR) failed: %s (%d)", buf, strerror(errno), errno);
-                       return FAILURE;
                }
        }
-
-       return SUCCESS;
 }
 
 static int ps_files_write(ps_files *data, zend_string *key, zend_string *val)
@@ -234,9 +233,7 @@ static int ps_files_write(ps_files *data, zend_string *key, zend_string *val)
        /* PS(id) may be changed by calling session_regenerate_id().
           Re-initialization should be tried here. ps_files_open() checks
        data->lastkey and reopen when it is needed. */
-       if (FAILURE == ps_files_open(data, ZSTR_VAL(key))) {
-               return FAILURE;
-       }
+       ps_files_open(data, ZSTR_VAL(key));
        if (data->fd < 0) {
                return FAILURE;
        }
@@ -474,18 +471,7 @@ PS_READ_FUNC(files)
        zend_stat_t sbuf;
        PS_FILES_DATA;
 
-       if (FAILURE == ps_files_open(data, ZSTR_VAL(key))) {
-               if (data->basedir) {
-                       efree(data->basedir);
-                       data->basedir = NULL;
-                       data->basedir_len = 0;
-               }
-               efree(data);
-               PS_SET_MOD_DATA(NULL);
-
-               return FAILURE;
-       }
-
+       ps_files_open(data, ZSTR_VAL(key));
        if (data->fd < 0) {
                return FAILURE;
        }
@@ -556,18 +542,7 @@ PS_WRITE_FUNC(files)
 {
        PS_FILES_DATA;
 
-       if (FAILURE == ps_files_write(data, key, val)) {
-               if (data->basedir) {
-                       efree(data->basedir);
-                       data->basedir = NULL;
-                       data->basedir_len = 0;
-               }
-               efree(data);
-               PS_SET_MOD_DATA(NULL);
-               return FAILURE;
-       }
-
-       return SUCCESS;
+       return ps_files_write(data, key, val);
 }
 
 
@@ -606,16 +581,7 @@ PS_UPDATE_TIMESTAMP_FUNC(files)
        ret = VCWD_UTIME(buf, newtime);
        if (ret == -1) {
                /* New session ID, create data file */
-               if (FAILURE == ps_files_write(data, key, val)) {
-                       if (data->basedir) {
-                               efree(data->basedir);
-                               data->basedir = NULL;
-                               data->basedir_len = 0;
-                       }
-                       efree(data);
-                       PS_SET_MOD_DATA(NULL);
-                       return FAILURE;
-               }
+               return ps_files_write(data, key, val);
        }
 
        return SUCCESS;
@@ -637,11 +603,11 @@ PS_DESTROY_FUNC(files)
        char buf[MAXPATHLEN];
        PS_FILES_DATA;
 
-       if (data && !ps_files_path_create(buf, sizeof(buf), data, ZSTR_VAL(key))) {
+       if (!ps_files_path_create(buf, sizeof(buf), data, ZSTR_VAL(key))) {
                return FAILURE;
        }
 
-       if (data && data->fd != -1) {
+       if (data->fd != -1) {
                ps_files_close(data);
 
                if (VCWD_UNLINK(buf) == -1) {
index c4c6f26449af6431e6b3f7f48b645bba364bb1e1..4dd8f1f9799236a7a9932e77f7f982fde2753a34 100644 (file)
@@ -47,10 +47,14 @@ session_destroy();
 --EXPECTF--
 Warning: Unknown: The session id is too long or contains illegal characters, valid characters are a-z, A-Z, 0-9 and '-,' in Unknown on line 0
 
+Warning: Unknown: The session id is too long or contains illegal characters, valid characters are a-z, A-Z, 0-9 and '-,' in Unknown on line 0
+
 Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct () in Unknown on line 0
 
 Warning: Unknown: The session id is too long or contains illegal characters, valid characters are a-z, A-Z, 0-9 and '-,' in Unknown on line 0
 
+Warning: Unknown: The session id is too long or contains illegal characters, valid characters are a-z, A-Z, 0-9 and '-,' in Unknown on line 0
+
 Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct () in Unknown on line 0
 string(%d) "%s"
 bool(true)