Remove owasp tool
This commit is contained in:
		| @@ -1,7 +1,6 @@ | ||||
| { | ||||
|     "require": { | ||||
|         "robthree/twofactorauth": "^1.6", | ||||
|         "yubico/u2flib-server": "^1.0", | ||||
|         "owasp/csrf-protector-php": "dev-master" | ||||
|         "yubico/u2flib-server": "^1.0" | ||||
|     } | ||||
| } | ||||
|   | ||||
							
								
								
									
										42
									
								
								data/web/inc/lib/composer.lock
									
									
									
										generated
									
									
									
								
							
							
						
						
									
										42
									
								
								data/web/inc/lib/composer.lock
									
									
									
										generated
									
									
									
								
							| @@ -4,44 +4,8 @@ | ||||
|         "Read more about it at https://getcomposer.org/doc/01-basic-usage.md#composer-lock-the-lock-file", | ||||
|         "This file is @generated automatically" | ||||
|     ], | ||||
|     "content-hash": "413fc63dc6c7815f0a175217bccb490a", | ||||
|     "content-hash": "5652a086b6d277d72d7ae0341e517b1e", | ||||
|     "packages": [ | ||||
|         { | ||||
|             "name": "owasp/csrf-protector-php", | ||||
|             "version": "dev-master", | ||||
|             "source": { | ||||
|                 "type": "git", | ||||
|                 "url": "https://github.com/mebjas/CSRF-Protector-PHP.git", | ||||
|                 "reference": "aec0d6966992363a7192b2ae9fb0a9643e8fa26b" | ||||
|             }, | ||||
|             "dist": { | ||||
|                 "type": "zip", | ||||
|                 "url": "https://api.github.com/repos/mebjas/CSRF-Protector-PHP/zipball/aec0d6966992363a7192b2ae9fb0a9643e8fa26b", | ||||
|                 "reference": "aec0d6966992363a7192b2ae9fb0a9643e8fa26b", | ||||
|                 "shasum": "" | ||||
|             }, | ||||
|             "require-dev": { | ||||
|                 "satooshi/php-coveralls": "~1.0" | ||||
|             }, | ||||
|             "type": "library", | ||||
|             "autoload": { | ||||
|                 "classmap": [ | ||||
|                     "libs/csrf/" | ||||
|                 ] | ||||
|             }, | ||||
|             "notification-url": "https://packagist.org/downloads/", | ||||
|             "license": [ | ||||
|                 "APACHE" | ||||
|             ], | ||||
|             "description": "CSRF protector php, a standalone php library for csrf mitigation in web applications. Easy to integrate in any php web app.", | ||||
|             "homepage": "https://github.com/mebjas/CSRF-Protector-PHP", | ||||
|             "keywords": [ | ||||
|                 "csrf", | ||||
|                 "owasp", | ||||
|                 "security" | ||||
|             ], | ||||
|             "time": "2017-04-12T05:47:07+00:00" | ||||
|         }, | ||||
|         { | ||||
|             "name": "robthree/twofactorauth", | ||||
|             "version": "1.6", | ||||
| @@ -132,9 +96,7 @@ | ||||
|     "packages-dev": [], | ||||
|     "aliases": [], | ||||
|     "minimum-stability": "stable", | ||||
|     "stability-flags": { | ||||
|         "owasp/csrf-protector-php": 20 | ||||
|     }, | ||||
|     "stability-flags": [], | ||||
|     "prefer-stable": false, | ||||
|     "prefer-lowest": false, | ||||
|     "platform": [], | ||||
|   | ||||
| @@ -6,14 +6,6 @@ $vendorDir = dirname(dirname(__FILE__)); | ||||
| $baseDir = dirname($vendorDir); | ||||
|  | ||||
| return array( | ||||
|     'alreadyInitializedException' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|     'baseJSFileNotFoundExceptio' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|     'configFileNotFoundException' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|     'csrfProtector' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|     'incompleteConfigurationException' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|     'jsFileNotFoundException' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|     'logDirectoryNotFoundException' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|     'logFileWriteError' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|     'u2flib_server\\Error' => $vendorDir . '/yubico/u2flib-server/src/u2flib_server/U2F.php', | ||||
|     'u2flib_server\\RegisterRequest' => $vendorDir . '/yubico/u2flib-server/src/u2flib_server/U2F.php', | ||||
|     'u2flib_server\\Registration' => $vendorDir . '/yubico/u2flib-server/src/u2flib_server/U2F.php', | ||||
|   | ||||
| @@ -21,14 +21,6 @@ class ComposerStaticInit873464e4bd965a3168f133248b1b218b | ||||
|     ); | ||||
|  | ||||
|     public static $classMap = array ( | ||||
|         'alreadyInitializedException' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|         'baseJSFileNotFoundExceptio' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|         'configFileNotFoundException' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|         'csrfProtector' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|         'incompleteConfigurationException' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|         'jsFileNotFoundException' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|         'logDirectoryNotFoundException' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|         'logFileWriteError' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php', | ||||
|         'u2flib_server\\Error' => __DIR__ . '/..' . '/yubico/u2flib-server/src/u2flib_server/U2F.php', | ||||
|         'u2flib_server\\RegisterRequest' => __DIR__ . '/..' . '/yubico/u2flib-server/src/u2flib_server/U2F.php', | ||||
|         'u2flib_server\\Registration' => __DIR__ . '/..' . '/yubico/u2flib-server/src/u2flib_server/U2F.php', | ||||
|   | ||||
							
								
								
									
										38
									
								
								data/web/inc/lib/vendor/composer/installed.json
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										38
									
								
								data/web/inc/lib/vendor/composer/installed.json
									
									
									
									
										vendored
									
									
								
							| @@ -52,44 +52,6 @@ | ||||
|             "tfa" | ||||
|         ] | ||||
|     }, | ||||
|     { | ||||
|         "name": "owasp/csrf-protector-php", | ||||
|         "version": "dev-master", | ||||
|         "version_normalized": "9999999-dev", | ||||
|         "source": { | ||||
|             "type": "git", | ||||
|             "url": "https://github.com/mebjas/CSRF-Protector-PHP.git", | ||||
|             "reference": "aec0d6966992363a7192b2ae9fb0a9643e8fa26b" | ||||
|         }, | ||||
|         "dist": { | ||||
|             "type": "zip", | ||||
|             "url": "https://api.github.com/repos/mebjas/CSRF-Protector-PHP/zipball/aec0d6966992363a7192b2ae9fb0a9643e8fa26b", | ||||
|             "reference": "aec0d6966992363a7192b2ae9fb0a9643e8fa26b", | ||||
|             "shasum": "" | ||||
|         }, | ||||
|         "require-dev": { | ||||
|             "satooshi/php-coveralls": "~1.0" | ||||
|         }, | ||||
|         "time": "2017-04-12T05:47:07+00:00", | ||||
|         "type": "library", | ||||
|         "installation-source": "source", | ||||
|         "autoload": { | ||||
|             "classmap": [ | ||||
|                 "libs/csrf/" | ||||
|             ] | ||||
|         }, | ||||
|         "notification-url": "https://packagist.org/downloads/", | ||||
|         "license": [ | ||||
|             "APACHE" | ||||
|         ], | ||||
|         "description": "CSRF protector php, a standalone php library for csrf mitigation in web applications. Easy to integrate in any php web app.", | ||||
|         "homepage": "https://github.com/mebjas/CSRF-Protector-PHP", | ||||
|         "keywords": [ | ||||
|             "csrf", | ||||
|             "owasp", | ||||
|             "security" | ||||
|         ] | ||||
|     }, | ||||
|     { | ||||
|         "name": "yubico/u2flib-server", | ||||
|         "version": "1.0.1", | ||||
|   | ||||
| @@ -1,4 +0,0 @@ | ||||
| service_name: travis-ci | ||||
| src_dir: ./libs/ | ||||
| coverage_clover: build/logs/clover.xml | ||||
| json_path: build/logs/coveralls-upload.json | ||||
| @@ -1,46 +0,0 @@ | ||||
| language: php | ||||
| php: | ||||
|   - "5.6" | ||||
|   - "5.5" | ||||
|   - "5.4" | ||||
|   - "5.3" | ||||
|   - "7.0" | ||||
|   - "7.1" | ||||
|   - hhvm | ||||
|   - nightly | ||||
|  | ||||
| matrix: | ||||
|     allow_failures: | ||||
|     - php: nightly | ||||
|     - php: hhvm | ||||
|  | ||||
| os: | ||||
|   - linux | ||||
|  | ||||
| install: | ||||
|   # Install composer packages, will also trigger dump-autoload | ||||
|   - composer install --no-interaction | ||||
|   # Install coveralls.phar | ||||
|   - wget -c -nc --retry-connrefused --tries=0 https://github.com/satooshi/php-coveralls/releases/download/v1.0.1/coveralls.phar | ||||
|   - chmod +x coveralls.phar | ||||
|   - php coveralls.phar --version | ||||
|  | ||||
| before_script: | ||||
|     - mkdir -p build/logs | ||||
|     - ls -al | ||||
|  | ||||
| script: | ||||
|  - mkdir -p build/logs | ||||
|  - if [ $(phpenv version-name) = 'hhvm' ]; then echo 'xdebug.enable=1' >> /etc/hhvm/php.ini; fi | ||||
|  - phpunit --stderr --coverage-clover build/logs/clover.xml | ||||
|  | ||||
| after_script: | ||||
|  - php vendor/bin/coveralls -v | ||||
|  | ||||
| after_success: | ||||
|  - travis_retry php coveralls.phar -v | ||||
|  | ||||
| cache: | ||||
|   directories: | ||||
|   - vendor | ||||
|   - $HOME/.cache/composer | ||||
| @@ -1,14 +0,0 @@ | ||||
| {    | ||||
|     "name": "owasp/csrf-protector-php", | ||||
|     "type": "library", | ||||
|     "description": "CSRF protector php, a standalone php library for csrf mitigation in web applications. Easy to integrate in any php web app.", | ||||
|     "keywords": ["security","csrf", "owasp"], | ||||
|     "homepage": "https://github.com/mebjas/CSRF-Protector-PHP", | ||||
|     "license": "APACHE", | ||||
|     "require-dev": { | ||||
|         "satooshi/php-coveralls": "~1.0" | ||||
|     }, | ||||
|     "autoload": { | ||||
|         "classmap": ["libs/csrf/"] | ||||
|     } | ||||
| } | ||||
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							| @@ -1 +0,0 @@ | ||||
| <html><head><meta http-equiv="Refresh" CONTENT="0; URL=files/libs/csrf/csrfprotector-php.html"></head></html> | ||||
| @@ -1,33 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>File Index</title><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script><script language=JavaScript src="../javascript/searchdata.js"></script></head><body class="IndexPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=IPageTitle>File Index</div><div class=INavigationBar>$#! · 0-9 · A · B · <a href="#C">C</a> · D · E · F · G · H · I · J · K · L · M · N · O · P · Q · R · S · T · U · V · W · X · Y · Z</div><table border=0 cellspacing=0 cellpadding=0><tr><td class=IHeading id=IFirstHeading><a name="C"></a>C</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#csrfprotector.php"  class=ISymbol>csrfprotector.php</a></td></tr></table> | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <!--END_ND_TOOLTIPS--> | ||||
|  | ||||
| </div><!--Index--> | ||||
|  | ||||
|  | ||||
| <div id=Footer><a href="http://www.naturaldocs.org">Generated by Natural Docs</a></div><!--Footer--> | ||||
|  | ||||
|  | ||||
| <div id=Menu><div class=MEntry><div class=MFile><a href="../files/libs/csrf/csrfprotector-php.html">csrfprotector.php</a></div></div><div class=MEntry><div class=MGroup><a href="javascript:ToggleMenu('MGroupContent1')">Index</a><div class=MGroupContent id=MGroupContent1><div class=MEntry><div class=MIndex><a href="General.html">Everything</a></div></div><div class=MEntry><div class=MIndex id=MSelected>Files</div></div><div class=MEntry><div class=MIndex><a href="Functions.html">Functions</a></div></div><div class=MEntry><div class=MIndex><a href="Variables.html">Variables</a></div></div></div></div></div><script type="text/javascript"><!-- | ||||
| var searchPanel = new SearchPanel("searchPanel", "HTML", "../search"); | ||||
| --></script><div id=MSearchPanel class=MSearchPanelInactive><input type=text id=MSearchField value=Search onFocus="searchPanel.OnSearchFieldFocus(true)" onBlur="searchPanel.OnSearchFieldFocus(false)" onKeyUp="searchPanel.OnSearchFieldChange()"><select id=MSearchType onFocus="searchPanel.OnSearchTypeFocus(true)" onBlur="searchPanel.OnSearchTypeFocus(false)" onChange="searchPanel.OnSearchTypeChange()"><option  id=MSearchEverything selected value="General">Everything</option><option value="Files">Files</option><option value="Functions">Functions</option><option value="Variables">Variables</option></select></div></div><!--Menu--> | ||||
|  | ||||
|  | ||||
| <div id=MSearchResultsWindow><iframe src="" frameborder=0 name=MSearchResults id=MSearchResults></iframe><a href="javascript:searchPanel.CloseResultsWindow()" id=MSearchResultsWindowClose>Close</a></div> | ||||
|  | ||||
|  | ||||
| <script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,65 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>Function Index</title><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script><script language=JavaScript src="../javascript/searchdata.js"></script></head><body class="IndexPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=IPageTitle>Function Index</div><div class=INavigationBar>$#! · 0-9 · <a href="#A">A</a> · B · <a href="#C">C</a> · D · E · <a href="#F">F</a> · <a href="#G">G</a> · H · <a href="#I">I</a> · J · K · <a href="#L">L</a> · M · N · <a href="#O">O</a> · P · Q · <a href="#R">R</a> · S · T · <a href="#U">U</a> · V · W · X · Y · Z</div><table border=0 cellspacing=0 cellpadding=0><tr><td class=IHeading id=IFirstHeading><a name="A"></a>A</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#authorisePost" id=link1 onMouseOver="ShowTip(event, 'tt1', 'link1')" onMouseOut="HideTip('tt1')" class=ISymbol>authorisePost</a></td></tr><tr><td class=IHeading><a name="C"></a>C</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#createNewJsCache" id=link2 onMouseOver="ShowTip(event, 'tt2', 'link2')" onMouseOut="HideTip('tt2')" class=ISymbol>createNewJsCache</a></td></tr><tr><td class=IHeading><a name="F"></a>F</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#failedValidationAction" id=link3 onMouseOver="ShowTip(event, 'tt3', 'link3')" onMouseOut="HideTip('tt3')" class=ISymbol>failedValidationAction</a></td></tr><tr><td class=IHeading><a name="G"></a>G</td><td></td></tr><tr><td class=ISymbolPrefix id=IFirstSymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#generateAuthToken" id=link4 onMouseOver="ShowTip(event, 'tt4', 'link4')" onMouseOut="HideTip('tt4')" class=ISymbol>generateAuthToken</a></td></tr><tr><td class=ISymbolPrefix id=ILastSymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#getCurrentUrl" id=link5 onMouseOver="ShowTip(event, 'tt5', 'link5')" onMouseOut="HideTip('tt5')" class=ISymbol>getCurrentUrl</a></td></tr><tr><td class=IHeading><a name="I"></a>I</td><td></td></tr><tr><td class=ISymbolPrefix id=IFirstSymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#init" id=link6 onMouseOver="ShowTip(event, 'tt6', 'link6')" onMouseOut="HideTip('tt6')" class=ISymbol>init</a></td></tr><tr><td class=ISymbolPrefix id=ILastSymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#isURLallowed" id=link7 onMouseOver="ShowTip(event, 'tt7', 'link7')" onMouseOut="HideTip('tt7')" class=ISymbol>isURLallowed</a></td></tr><tr><td class=IHeading><a name="L"></a>L</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#logCSRFattack" id=link8 onMouseOver="ShowTip(event, 'tt8', 'link8')" onMouseOut="HideTip('tt8')" class=ISymbol>logCSRFattack</a></td></tr><tr><td class=IHeading><a name="O"></a>O</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#ob_handler" id=link9 onMouseOver="ShowTip(event, 'tt9', 'link9')" onMouseOut="HideTip('tt9')" class=ISymbol>ob_handler</a></td></tr><tr><td class=IHeading><a name="R"></a>R</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#refreshToken" id=link10 onMouseOver="ShowTip(event, 'tt10', 'link10')" onMouseOut="HideTip('tt10')" class=ISymbol>refreshToken</a></td></tr><tr><td class=IHeading><a name="U"></a>U</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#useCachedVersion" id=link11 onMouseOver="ShowTip(event, 'tt11', 'link11')" onMouseOut="HideTip('tt11')" class=ISymbol>useCachedVersion</a></td></tr></table> | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt1"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function authorisePost()</td></tr></table></blockquote>function to authorise incoming post requests</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
|  | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt2"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function createNewJsCache()</td></tr></table></blockquote>Function to create new cache version of js</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
|  | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt3"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">private static function failedValidationAction()</td></tr></table></blockquote>function to be called in case of failed validation performs logging and take appropriate action</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
|  | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt4"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function generateAuthToken()</td></tr></table></blockquote>function to generate random hash of length as given in parameter max length = 128</div></div><div class=CToolTip id="tt5"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">private static function getCurrentUrl()</td></tr></table></blockquote>Function to return current url of executing page</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
|  | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt6"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td><table border=0 cellspacing=0 cellpadding=0><tr><td class="PBeforeParameters  prettyprint "nowrap>public static function init(</td><td class="PParameter  prettyprint " nowrap>$length</td><td class="PDefaultValuePrefix  prettyprint "> = </td><td class="PDefaultValue  prettyprint " width=100%> null,</td></tr><tr><td></td><td class="PParameter  prettyprint " nowrap>$action</td><td class="PDefaultValuePrefix  prettyprint "> = </td><td class="PDefaultValue  prettyprint " width=100%> null</td><td class="PAfterParameters  prettyprint "nowrap>)</td></tr></table></td></tr></table></blockquote>function to initialise the csrfProtector work flow</div></div><div class=CToolTip id="tt7"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function isURLallowed()</td></tr></table></blockquote>Function to check if a url mataches for any urls Listed in config file</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
|  | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt8"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">private static function logCSRFattack()</td></tr></table></blockquote>Functio to log CSRF Attack</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
|  | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt9"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td><table border=0 cellspacing=0 cellpadding=0><tr><td class="PBeforeParameters  prettyprint "nowrap>public static function ob_handler(</td><td class="PParameter  prettyprint " nowrap>$buffer,</td></tr><tr><td></td><td class="PParameter  prettyprint " nowrap>$flags</td><td class="PAfterParameters  prettyprint "nowrap>)</td></tr></table></td></tr></table></blockquote>Rewrites form on the fly to add CSRF tokens to them. </div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
|  | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt10"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function refreshToken()</td></tr></table></blockquote>Function to set auth cookie</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
|  | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt11"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function useCachedVersion()</td></tr></table></blockquote>function to check weather to use cached version of js file or not</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
| </div><!--Index--> | ||||
|  | ||||
|  | ||||
| <div id=Footer><a href="http://www.naturaldocs.org">Generated by Natural Docs</a></div><!--Footer--> | ||||
|  | ||||
|  | ||||
| <div id=Menu><div class=MEntry><div class=MFile><a href="../files/libs/csrf/csrfprotector-php.html">csrfprotector.php</a></div></div><div class=MEntry><div class=MGroup><a href="javascript:ToggleMenu('MGroupContent1')">Index</a><div class=MGroupContent id=MGroupContent1><div class=MEntry><div class=MIndex><a href="General.html">Everything</a></div></div><div class=MEntry><div class=MIndex><a href="Files.html">Files</a></div></div><div class=MEntry><div class=MIndex id=MSelected>Functions</div></div><div class=MEntry><div class=MIndex><a href="Variables.html">Variables</a></div></div></div></div></div><script type="text/javascript"><!-- | ||||
| var searchPanel = new SearchPanel("searchPanel", "HTML", "../search"); | ||||
| --></script><div id=MSearchPanel class=MSearchPanelInactive><input type=text id=MSearchField value=Search onFocus="searchPanel.OnSearchFieldFocus(true)" onBlur="searchPanel.OnSearchFieldFocus(false)" onKeyUp="searchPanel.OnSearchFieldChange()"><select id=MSearchType onFocus="searchPanel.OnSearchTypeFocus(true)" onBlur="searchPanel.OnSearchTypeFocus(false)" onChange="searchPanel.OnSearchTypeChange()"><option  id=MSearchEverything selected value="General">Everything</option><option value="Files">Files</option><option value="Functions">Functions</option><option value="Variables">Variables</option></select></div></div><!--Menu--> | ||||
|  | ||||
|  | ||||
| <div id=MSearchResultsWindow><iframe src="" frameborder=0 name=MSearchResults id=MSearchResults></iframe><a href="javascript:searchPanel.CloseResultsWindow()" id=MSearchResultsWindowClose>Close</a></div> | ||||
|  | ||||
|  | ||||
| <script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							| @@ -1,41 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>Variable Index</title><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script><script language=JavaScript src="../javascript/searchdata.js"></script></head><body class="IndexPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=IPageTitle>Variable Index</div><div class=INavigationBar>$#! · 0-9 · A · B · <a href="#C">C</a> · D · E · F · G · H · <a href="#I">I</a> · J · K · L · M · N · O · P · Q · <a href="#R">R</a> · S · T · U · V · W · X · Y · Z</div><table border=0 cellspacing=0 cellpadding=0><tr><td class=IHeading id=IFirstHeading><a name="C"></a>C</td><td></td></tr><tr><td class=ISymbolPrefix id=IFirstSymbolPrefix>$</td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#$config" id=link1 onMouseOver="ShowTip(event, 'tt1', 'link1')" onMouseOut="HideTip('tt1')" class=ISymbol>config</a></td></tr><tr><td class=ISymbolPrefix id=ILastSymbolPrefix>$</td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#$cookieExpiryTime" id=link2 onMouseOver="ShowTip(event, 'tt2', 'link2')" onMouseOut="HideTip('tt2')" class=ISymbol>cookieExpiryTime</a></td></tr><tr><td class=IHeading><a name="I"></a>I</td><td></td></tr><tr><td class=ISymbolPrefix id=IFirstSymbolPrefix>$</td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#$isSameOrigin" id=link3 onMouseOver="ShowTip(event, 'tt3', 'link3')" onMouseOut="HideTip('tt3')" class=ISymbol>isSameOrigin</a></td></tr><tr><td class=ISymbolPrefix id=ILastSymbolPrefix>$</td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#$isValidHTML" id=link4 onMouseOver="ShowTip(event, 'tt4', 'link4')" onMouseOut="HideTip('tt4')" class=ISymbol>isValidHTML</a></td></tr><tr><td class=IHeading><a name="R"></a>R</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix>$</td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#$requestType" id=link5 onMouseOver="ShowTip(event, 'tt5', 'link5')" onMouseOut="HideTip('tt5')" class=ISymbol>requestType</a></td></tr></table> | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt1"><div class=CVariable><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static $config</td></tr></table></blockquote>config file for CSRFProtector @var int Array, length = 6 Property: #1: failedAuthAction (int) => action to be taken in case autherisation fails Property: #2: logDirectory (string) => directory in which log will be saved Property: #3: customErrorMessage (string) => custom error message to be sent in case of failed authentication Property: #4: jsFile (string) => location of the CSRFProtector js file Property: #5: tokenLength (int) => default length of hash Property: #6: disabledJavascriptMessage (string) => error message if client’s js is disabled</div></div><div class=CToolTip id="tt2"><div class=CVariable><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static $cookieExpiryTime</td></tr></table></blockquote>expiry time for cookie @var int</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
|  | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt3"><div class=CVariable><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">private static $isSameOrigin</td></tr></table></blockquote>flag for cross origin/same origin request @var bool</div></div><div class=CToolTip id="tt4"><div class=CVariable><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">private static $isValidHTML</td></tr></table></blockquote>flag to check if output file is a valid HTML or not @var bool</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
|  | ||||
| <!--START_ND_TOOLTIPS--> | ||||
| <div class=CToolTip id="tt5"><div class=CVariable><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">protected static $requestType</td></tr></table></blockquote>Varaible to store weather request type is post or get @var string</div></div><!--END_ND_TOOLTIPS--> | ||||
|  | ||||
| </div><!--Index--> | ||||
|  | ||||
|  | ||||
| <div id=Footer><a href="http://www.naturaldocs.org">Generated by Natural Docs</a></div><!--Footer--> | ||||
|  | ||||
|  | ||||
| <div id=Menu><div class=MEntry><div class=MFile><a href="../files/libs/csrf/csrfprotector-php.html">csrfprotector.php</a></div></div><div class=MEntry><div class=MGroup><a href="javascript:ToggleMenu('MGroupContent1')">Index</a><div class=MGroupContent id=MGroupContent1><div class=MEntry><div class=MIndex><a href="General.html">Everything</a></div></div><div class=MEntry><div class=MIndex><a href="Files.html">Files</a></div></div><div class=MEntry><div class=MIndex><a href="Functions.html">Functions</a></div></div><div class=MEntry><div class=MIndex id=MSelected>Variables</div></div></div></div></div><script type="text/javascript"><!-- | ||||
| var searchPanel = new SearchPanel("searchPanel", "HTML", "../search"); | ||||
| --></script><div id=MSearchPanel class=MSearchPanelInactive><input type=text id=MSearchField value=Search onFocus="searchPanel.OnSearchFieldFocus(true)" onBlur="searchPanel.OnSearchFieldFocus(false)" onKeyUp="searchPanel.OnSearchFieldChange()"><select id=MSearchType onFocus="searchPanel.OnSearchTypeFocus(true)" onBlur="searchPanel.OnSearchTypeFocus(false)" onChange="searchPanel.OnSearchTypeChange()"><option  id=MSearchEverything selected value="General">Everything</option><option value="Files">Files</option><option value="Functions">Functions</option><option value="Variables">Variables</option></select></div></div><!--Menu--> | ||||
|  | ||||
|  | ||||
| <div id=MSearchResultsWindow><iframe src="" frameborder=0 name=MSearchResults id=MSearchResults></iframe><a href="javascript:searchPanel.CloseResultsWindow()" id=MSearchResultsWindowClose>Close</a></div> | ||||
|  | ||||
|  | ||||
| <script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,841 +0,0 @@ | ||||
| // This file is part of Natural Docs, which is Copyright <20> 2003-2010 Greg Valure | ||||
| // Natural Docs is licensed under version 3 of the GNU Affero General Public License (AGPL) | ||||
| // Refer to License.txt for the complete details | ||||
|  | ||||
| // This file may be distributed with documentation files generated by Natural Docs. | ||||
| // Such documentation is not covered by Natural Docs' copyright and licensing, | ||||
| // and may have its own copyright and distribution terms as decided by its author. | ||||
|  | ||||
|  | ||||
| // | ||||
| //  Browser Styles | ||||
| // ____________________________________________________________________________ | ||||
|  | ||||
| var agt=navigator.userAgent.toLowerCase(); | ||||
| var browserType; | ||||
| var browserVer; | ||||
|  | ||||
| if (agt.indexOf("opera") != -1) | ||||
|     { | ||||
|     browserType = "Opera"; | ||||
|  | ||||
|     if (agt.indexOf("opera 7") != -1 || agt.indexOf("opera/7") != -1) | ||||
|         {  browserVer = "Opera7";  } | ||||
|     else if (agt.indexOf("opera 8") != -1 || agt.indexOf("opera/8") != -1) | ||||
|         {  browserVer = "Opera8";  } | ||||
|     else if (agt.indexOf("opera 9") != -1 || agt.indexOf("opera/9") != -1) | ||||
|         {  browserVer = "Opera9";  } | ||||
|     } | ||||
|  | ||||
| else if (agt.indexOf("applewebkit") != -1) | ||||
|     { | ||||
|     browserType = "Safari"; | ||||
|  | ||||
|     if (agt.indexOf("version/3") != -1) | ||||
|         {  browserVer = "Safari3";  } | ||||
|     else if (agt.indexOf("safari/4") != -1) | ||||
|         {  browserVer = "Safari2";  } | ||||
|     } | ||||
|  | ||||
| else if (agt.indexOf("khtml") != -1) | ||||
|     { | ||||
|     browserType = "Konqueror"; | ||||
|     } | ||||
|  | ||||
| else if (agt.indexOf("msie") != -1) | ||||
|     { | ||||
|     browserType = "IE"; | ||||
|  | ||||
|     if (agt.indexOf("msie 6") != -1) | ||||
|         {  browserVer = "IE6";  } | ||||
|     else if (agt.indexOf("msie 7") != -1) | ||||
|         {  browserVer = "IE7";  } | ||||
|     } | ||||
|  | ||||
| else if (agt.indexOf("gecko") != -1) | ||||
|     { | ||||
|     browserType = "Firefox"; | ||||
|  | ||||
|     if (agt.indexOf("rv:1.7") != -1) | ||||
|         {  browserVer = "Firefox1";  } | ||||
|     else if (agt.indexOf("rv:1.8)") != -1 || agt.indexOf("rv:1.8.0") != -1) | ||||
|         {  browserVer = "Firefox15";  } | ||||
|     else if (agt.indexOf("rv:1.8.1") != -1) | ||||
|         {  browserVer = "Firefox2";  } | ||||
|     } | ||||
|  | ||||
|  | ||||
| // | ||||
| //  Support Functions | ||||
| // ____________________________________________________________________________ | ||||
|  | ||||
|  | ||||
| function GetXPosition(item) | ||||
|     { | ||||
|     var position = 0; | ||||
|  | ||||
|     if (item.offsetWidth != null) | ||||
|         { | ||||
|         while (item != document.body && item != null) | ||||
|             { | ||||
|             position += item.offsetLeft; | ||||
|             item = item.offsetParent; | ||||
|             }; | ||||
|         }; | ||||
|  | ||||
|     return position; | ||||
|     }; | ||||
|  | ||||
|  | ||||
| function GetYPosition(item) | ||||
|     { | ||||
|     var position = 0; | ||||
|  | ||||
|     if (item.offsetWidth != null) | ||||
|         { | ||||
|         while (item != document.body && item != null) | ||||
|             { | ||||
|             position += item.offsetTop; | ||||
|             item = item.offsetParent; | ||||
|             }; | ||||
|         }; | ||||
|  | ||||
|     return position; | ||||
|     }; | ||||
|  | ||||
|  | ||||
| function MoveToPosition(item, x, y) | ||||
|     { | ||||
|     // Opera 5 chokes on the px extension, so it can use the Microsoft one instead. | ||||
|  | ||||
|     if (item.style.left != null) | ||||
|         { | ||||
|         item.style.left = x + "px"; | ||||
|         item.style.top = y + "px"; | ||||
|         } | ||||
|     else if (item.style.pixelLeft != null) | ||||
|         { | ||||
|         item.style.pixelLeft = x; | ||||
|         item.style.pixelTop = y; | ||||
|         }; | ||||
|     }; | ||||
|  | ||||
|  | ||||
| // | ||||
| //  Menu | ||||
| // ____________________________________________________________________________ | ||||
|  | ||||
|  | ||||
| function ToggleMenu(id) | ||||
|     { | ||||
|     if (!window.document.getElementById) | ||||
|         {  return;  }; | ||||
|  | ||||
|     var display = window.document.getElementById(id).style.display; | ||||
|  | ||||
|     if (display == "none") | ||||
|         {  display = "block";  } | ||||
|     else | ||||
|         {  display = "none";  } | ||||
|  | ||||
|     window.document.getElementById(id).style.display = display; | ||||
|     } | ||||
|  | ||||
| function HideAllBut(ids, max) | ||||
|     { | ||||
|     if (document.getElementById) | ||||
|         { | ||||
|         ids.sort( function(a,b) { return a - b; } ); | ||||
|         var number = 1; | ||||
|  | ||||
|         while (number < max) | ||||
|             { | ||||
|             if (ids.length > 0 && number == ids[0]) | ||||
|                 {  ids.shift();  } | ||||
|             else | ||||
|                 { | ||||
|                 document.getElementById("MGroupContent" + number).style.display = "none"; | ||||
|                 }; | ||||
|  | ||||
|             number++; | ||||
|             }; | ||||
|         }; | ||||
|     } | ||||
|  | ||||
|  | ||||
| // | ||||
| //  Tooltips | ||||
| // ____________________________________________________________________________ | ||||
|  | ||||
|  | ||||
| var tooltipTimer = 0; | ||||
|  | ||||
| function ShowTip(event, tooltipID, linkID) | ||||
|     { | ||||
|     if (tooltipTimer) | ||||
|         {  clearTimeout(tooltipTimer);  }; | ||||
|  | ||||
|     var docX = event.clientX + window.pageXOffset; | ||||
|     var docY = event.clientY + window.pageYOffset; | ||||
|  | ||||
|     var showCommand = "ReallyShowTip('" + tooltipID + "', '" + linkID + "', " + docX + ", " + docY + ")"; | ||||
|  | ||||
|     tooltipTimer = setTimeout(showCommand, 1000); | ||||
|     } | ||||
|  | ||||
| function ReallyShowTip(tooltipID, linkID, docX, docY) | ||||
|     { | ||||
|     tooltipTimer = 0; | ||||
|  | ||||
|     var tooltip; | ||||
|     var link; | ||||
|  | ||||
|     if (document.getElementById) | ||||
|         { | ||||
|         tooltip = document.getElementById(tooltipID); | ||||
|         link = document.getElementById(linkID); | ||||
|         } | ||||
| /*    else if (document.all) | ||||
|         { | ||||
|         tooltip = eval("document.all['" + tooltipID + "']"); | ||||
|         link = eval("document.all['" + linkID + "']"); | ||||
|         } | ||||
| */ | ||||
|     if (tooltip) | ||||
|         { | ||||
|         var left = GetXPosition(link); | ||||
|         var top = GetYPosition(link); | ||||
|         top += link.offsetHeight; | ||||
|  | ||||
|  | ||||
|         // The fallback method is to use the mouse X and Y relative to the document.  We use a separate if and test if its a number | ||||
|         // in case some browser snuck through the above if statement but didn't support everything. | ||||
|  | ||||
|         if (!isFinite(top) || top == 0) | ||||
|             { | ||||
|             left = docX; | ||||
|             top = docY; | ||||
|             } | ||||
|  | ||||
|         // Some spacing to get it out from under the cursor. | ||||
|  | ||||
|         top += 10; | ||||
|  | ||||
|         // Make sure the tooltip doesnt get smushed by being too close to the edge, or in some browsers, go off the edge of the | ||||
|         // page.  We do it here because Konqueror does get offsetWidth right even if it doesnt get the positioning right. | ||||
|  | ||||
|         if (tooltip.offsetWidth != null) | ||||
|             { | ||||
|             var width = tooltip.offsetWidth; | ||||
|             var docWidth = document.body.clientWidth; | ||||
|  | ||||
|             if (left + width > docWidth) | ||||
|                 {  left = docWidth - width - 1;  } | ||||
|  | ||||
|             // If there's a horizontal scroll bar we could go past zero because it's using the page width, not the window width. | ||||
|             if (left < 0) | ||||
|                 {  left = 0;  }; | ||||
|             } | ||||
|  | ||||
|         MoveToPosition(tooltip, left, top); | ||||
|         tooltip.style.visibility = "visible"; | ||||
|         } | ||||
|     } | ||||
|  | ||||
| function HideTip(tooltipID) | ||||
|     { | ||||
|     if (tooltipTimer) | ||||
|         { | ||||
|         clearTimeout(tooltipTimer); | ||||
|         tooltipTimer = 0; | ||||
|         } | ||||
|  | ||||
|     var tooltip; | ||||
|  | ||||
|     if (document.getElementById) | ||||
|         {  tooltip = document.getElementById(tooltipID); } | ||||
|     else if (document.all) | ||||
|         {  tooltip = eval("document.all['" + tooltipID + "']");  } | ||||
|  | ||||
|     if (tooltip) | ||||
|         {  tooltip.style.visibility = "hidden";  } | ||||
|     } | ||||
|  | ||||
|  | ||||
| // | ||||
| //  Blockquote fix for IE | ||||
| // ____________________________________________________________________________ | ||||
|  | ||||
|  | ||||
| function NDOnLoad() | ||||
|     { | ||||
|     if (browserVer == "IE6") | ||||
|         { | ||||
|         var scrollboxes = document.getElementsByTagName('blockquote'); | ||||
|  | ||||
|         if (scrollboxes.item(0)) | ||||
|             { | ||||
|             NDDoResize(); | ||||
|             window.onresize=NDOnResize; | ||||
|             }; | ||||
|         }; | ||||
|     }; | ||||
|  | ||||
|  | ||||
| var resizeTimer = 0; | ||||
|  | ||||
| function NDOnResize() | ||||
|     { | ||||
|     if (resizeTimer != 0) | ||||
|         {  clearTimeout(resizeTimer);  }; | ||||
|  | ||||
|     resizeTimer = setTimeout(NDDoResize, 250); | ||||
|     }; | ||||
|  | ||||
|  | ||||
| function NDDoResize() | ||||
|     { | ||||
|     var scrollboxes = document.getElementsByTagName('blockquote'); | ||||
|  | ||||
|     var i; | ||||
|     var item; | ||||
|  | ||||
|     i = 0; | ||||
|     while (item = scrollboxes.item(i)) | ||||
|         { | ||||
|         item.style.width = 100; | ||||
|         i++; | ||||
|         }; | ||||
|  | ||||
|     i = 0; | ||||
|     while (item = scrollboxes.item(i)) | ||||
|         { | ||||
|         item.style.width = item.parentNode.offsetWidth; | ||||
|         i++; | ||||
|         }; | ||||
|  | ||||
|     clearTimeout(resizeTimer); | ||||
|     resizeTimer = 0; | ||||
|     } | ||||
|  | ||||
|  | ||||
|  | ||||
| /* ________________________________________________________________________________________________________ | ||||
|  | ||||
|     Class: SearchPanel | ||||
|     ________________________________________________________________________________________________________ | ||||
|  | ||||
|     A class handling everything associated with the search panel. | ||||
|  | ||||
|     Parameters: | ||||
|  | ||||
|         name - The name of the global variable that will be storing this instance.  Is needed to be able to set timeouts. | ||||
|         mode - The mode the search is going to work in.  Pass <NaturalDocs::Builder::Base->CommandLineOption()>, so the | ||||
|                    value will be something like "HTML" or "FramedHTML". | ||||
|  | ||||
|     ________________________________________________________________________________________________________ | ||||
| */ | ||||
|  | ||||
|  | ||||
| function SearchPanel(name, mode, resultsPath) | ||||
|     { | ||||
|     if (!name || !mode || !resultsPath) | ||||
|         {  alert("Incorrect parameters to SearchPanel.");  }; | ||||
|  | ||||
|  | ||||
|     // Group: Variables | ||||
|     // ________________________________________________________________________ | ||||
|  | ||||
|     /* | ||||
|         var: name | ||||
|         The name of the global variable that will be storing this instance of the class. | ||||
|     */ | ||||
|     this.name = name; | ||||
|  | ||||
|     /* | ||||
|         var: mode | ||||
|         The mode the search is going to work in, such as "HTML" or "FramedHTML". | ||||
|     */ | ||||
|     this.mode = mode; | ||||
|  | ||||
|     /* | ||||
|         var: resultsPath | ||||
|         The relative path from the current HTML page to the results page directory. | ||||
|     */ | ||||
|     this.resultsPath = resultsPath; | ||||
|  | ||||
|     /* | ||||
|         var: keyTimeout | ||||
|         The timeout used between a keystroke and when a search is performed. | ||||
|     */ | ||||
|     this.keyTimeout = 0; | ||||
|  | ||||
|     /* | ||||
|         var: keyTimeoutLength | ||||
|         The length of <keyTimeout> in thousandths of a second. | ||||
|     */ | ||||
|     this.keyTimeoutLength = 500; | ||||
|  | ||||
|     /* | ||||
|         var: lastSearchValue | ||||
|         The last search string executed, or an empty string if none. | ||||
|     */ | ||||
|     this.lastSearchValue = ""; | ||||
|  | ||||
|     /* | ||||
|         var: lastResultsPage | ||||
|         The last results page.  The value is only relevant if <lastSearchValue> is set. | ||||
|     */ | ||||
|     this.lastResultsPage = ""; | ||||
|  | ||||
|     /* | ||||
|         var: deactivateTimeout | ||||
|  | ||||
|         The timeout used between when a control is deactivated and when the entire panel is deactivated.  Is necessary | ||||
|         because a control may be deactivated in favor of another control in the same panel, in which case it should stay | ||||
|         active. | ||||
|     */ | ||||
|     this.deactivateTimout = 0; | ||||
|  | ||||
|     /* | ||||
|         var: deactivateTimeoutLength | ||||
|         The length of <deactivateTimeout> in thousandths of a second. | ||||
|     */ | ||||
|     this.deactivateTimeoutLength = 200; | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
|     // Group: DOM Elements | ||||
|     // ________________________________________________________________________ | ||||
|  | ||||
|  | ||||
|     // Function: DOMSearchField | ||||
|     this.DOMSearchField = function() | ||||
|         {  return document.getElementById("MSearchField");  }; | ||||
|  | ||||
|     // Function: DOMSearchType | ||||
|     this.DOMSearchType = function() | ||||
|         {  return document.getElementById("MSearchType");  }; | ||||
|  | ||||
|     // Function: DOMPopupSearchResults | ||||
|     this.DOMPopupSearchResults = function() | ||||
|         {  return document.getElementById("MSearchResults");  }; | ||||
|  | ||||
|     // Function: DOMPopupSearchResultsWindow | ||||
|     this.DOMPopupSearchResultsWindow = function() | ||||
|         {  return document.getElementById("MSearchResultsWindow");  }; | ||||
|  | ||||
|     // Function: DOMSearchPanel | ||||
|     this.DOMSearchPanel = function() | ||||
|         {  return document.getElementById("MSearchPanel");  }; | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
|     // Group: Event Handlers | ||||
|     // ________________________________________________________________________ | ||||
|  | ||||
|  | ||||
|     /* | ||||
|         Function: OnSearchFieldFocus | ||||
|         Called when focus is added or removed from the search field. | ||||
|     */ | ||||
|     this.OnSearchFieldFocus = function(isActive) | ||||
|         { | ||||
|         this.Activate(isActive); | ||||
|         }; | ||||
|  | ||||
|  | ||||
|     /* | ||||
|         Function: OnSearchFieldChange | ||||
|         Called when the content of the search field is changed. | ||||
|     */ | ||||
|     this.OnSearchFieldChange = function() | ||||
|         { | ||||
|         if (this.keyTimeout) | ||||
|             { | ||||
|             clearTimeout(this.keyTimeout); | ||||
|             this.keyTimeout = 0; | ||||
|             }; | ||||
|  | ||||
|         var searchValue = this.DOMSearchField().value.replace(/ +/g, ""); | ||||
|  | ||||
|         if (searchValue != this.lastSearchValue) | ||||
|             { | ||||
|             if (searchValue != "") | ||||
|                 { | ||||
|                 this.keyTimeout = setTimeout(this.name + ".Search()", this.keyTimeoutLength); | ||||
|                 } | ||||
|             else | ||||
|                 { | ||||
|                 if (this.mode == "HTML") | ||||
|                     {  this.DOMPopupSearchResultsWindow().style.display = "none";  }; | ||||
|                 this.lastSearchValue = ""; | ||||
|                 }; | ||||
|             }; | ||||
|         }; | ||||
|  | ||||
|  | ||||
|     /* | ||||
|         Function: OnSearchTypeFocus | ||||
|         Called when focus is added or removed from the search type. | ||||
|     */ | ||||
|     this.OnSearchTypeFocus = function(isActive) | ||||
|         { | ||||
|         this.Activate(isActive); | ||||
|         }; | ||||
|  | ||||
|  | ||||
|     /* | ||||
|         Function: OnSearchTypeChange | ||||
|         Called when the search type is changed. | ||||
|     */ | ||||
|     this.OnSearchTypeChange = function() | ||||
|         { | ||||
|         var searchValue = this.DOMSearchField().value.replace(/ +/g, ""); | ||||
|  | ||||
|         if (searchValue != "") | ||||
|             { | ||||
|             this.Search(); | ||||
|             }; | ||||
|         }; | ||||
|  | ||||
|  | ||||
|  | ||||
|     // Group: Action Functions | ||||
|     // ________________________________________________________________________ | ||||
|  | ||||
|  | ||||
|     /* | ||||
|         Function: CloseResultsWindow | ||||
|         Closes the results window. | ||||
|     */ | ||||
|     this.CloseResultsWindow = function() | ||||
|         { | ||||
|         this.DOMPopupSearchResultsWindow().style.display = "none"; | ||||
|         this.Activate(false, true); | ||||
|         }; | ||||
|  | ||||
|  | ||||
|     /* | ||||
|         Function: Search | ||||
|         Performs a search. | ||||
|     */ | ||||
|     this.Search = function() | ||||
|         { | ||||
|         this.keyTimeout = 0; | ||||
|  | ||||
|         var searchValue = this.DOMSearchField().value.replace(/^ +/, ""); | ||||
|         var searchTopic = this.DOMSearchType().value; | ||||
|  | ||||
|         var pageExtension = searchValue.substr(0,1); | ||||
|  | ||||
|         if (pageExtension.match(/^[a-z]/i)) | ||||
|             {  pageExtension = pageExtension.toUpperCase();  } | ||||
|         else if (pageExtension.match(/^[0-9]/)) | ||||
|             {  pageExtension = 'Numbers';  } | ||||
|         else | ||||
|             {  pageExtension = "Symbols";  }; | ||||
|  | ||||
|         var resultsPage; | ||||
|         var resultsPageWithSearch; | ||||
|         var hasResultsPage; | ||||
|  | ||||
|         // indexSectionsWithContent is defined in searchdata.js | ||||
|         if (indexSectionsWithContent[searchTopic][pageExtension] == true) | ||||
|             { | ||||
|             resultsPage = this.resultsPath + '/' + searchTopic + pageExtension + '.html'; | ||||
|             resultsPageWithSearch = resultsPage+'?'+escape(searchValue); | ||||
|             hasResultsPage = true; | ||||
|             } | ||||
|         else | ||||
|             { | ||||
|             resultsPage = this.resultsPath + '/NoResults.html'; | ||||
|             resultsPageWithSearch = resultsPage; | ||||
|             hasResultsPage = false; | ||||
|             }; | ||||
|  | ||||
|         var resultsFrame; | ||||
|         if (this.mode == "HTML") | ||||
|             {  resultsFrame = window.frames.MSearchResults;  } | ||||
|         else if (this.mode == "FramedHTML") | ||||
|             {  resultsFrame = window.top.frames['Content'];  }; | ||||
|  | ||||
|  | ||||
|         if (resultsPage != this.lastResultsPage || | ||||
|  | ||||
|             // Bug in IE.  If everything becomes hidden in a run, none of them will be able to be reshown in the next for some | ||||
|             // reason.  It counts the right number of results, and you can even read the display as "block" after setting it, but it | ||||
|             // just doesn't work in IE 6 or IE 7.  So if we're on the right page but the previous search had no results, reload the | ||||
|             // page anyway to get around the bug. | ||||
|             (browserType == "IE" && hasResultsPage && | ||||
|             	(!resultsFrame.searchResults || resultsFrame.searchResults.lastMatchCount == 0)) ) | ||||
|  | ||||
|             { | ||||
|             resultsFrame.location.href = resultsPageWithSearch; | ||||
|             } | ||||
|  | ||||
|         // So if the results page is right and there's no IE bug, reperform the search on the existing page.  We have to check if there | ||||
|         // are results because NoResults.html doesn't have any JavaScript, and it would be useless to do anything on that page even | ||||
|         // if it did. | ||||
|         else if (hasResultsPage) | ||||
|             { | ||||
|             // We need to check if this exists in case the frame is present but didn't finish loading. | ||||
|             if (resultsFrame.searchResults) | ||||
|                 {  resultsFrame.searchResults.Search(searchValue);  } | ||||
|  | ||||
|             // Otherwise just reload instead of waiting. | ||||
|             else | ||||
|                 {  resultsFrame.location.href = resultsPageWithSearch;  }; | ||||
|             }; | ||||
|  | ||||
|  | ||||
|         var domPopupSearchResultsWindow = this.DOMPopupSearchResultsWindow(); | ||||
|  | ||||
|         if (this.mode == "HTML" && domPopupSearchResultsWindow.style.display != "block") | ||||
|             { | ||||
|             var domSearchType = this.DOMSearchType(); | ||||
|  | ||||
|             var left = GetXPosition(domSearchType); | ||||
|             var top = GetYPosition(domSearchType) + domSearchType.offsetHeight; | ||||
|  | ||||
|             MoveToPosition(domPopupSearchResultsWindow, left, top); | ||||
|             domPopupSearchResultsWindow.style.display = 'block'; | ||||
|             }; | ||||
|  | ||||
|  | ||||
|         this.lastSearchValue = searchValue; | ||||
|         this.lastResultsPage = resultsPage; | ||||
|         }; | ||||
|  | ||||
|  | ||||
|  | ||||
|     // Group: Activation Functions | ||||
|     // Functions that handle whether the entire panel is active or not. | ||||
|     // ________________________________________________________________________ | ||||
|  | ||||
|  | ||||
|     /* | ||||
|         Function: Activate | ||||
|  | ||||
|         Activates or deactivates the search panel, resetting things to their default values if necessary.  You can call this on every | ||||
|         control's OnBlur() and it will handle not deactivating the entire panel when focus is just switching between them transparently. | ||||
|  | ||||
|         Parameters: | ||||
|  | ||||
|             isActive - Whether you're activating or deactivating the panel. | ||||
|             ignoreDeactivateDelay - Set if you're positive the action will deactivate the panel and thus want to skip the delay. | ||||
|     */ | ||||
|     this.Activate = function(isActive, ignoreDeactivateDelay) | ||||
|         { | ||||
|         // We want to ignore isActive being false while the results window is open. | ||||
|         if (isActive || (this.mode == "HTML" && this.DOMPopupSearchResultsWindow().style.display == "block")) | ||||
|             { | ||||
|             if (this.inactivateTimeout) | ||||
|                 { | ||||
|                 clearTimeout(this.inactivateTimeout); | ||||
|                 this.inactivateTimeout = 0; | ||||
|                 }; | ||||
|  | ||||
|             this.DOMSearchPanel().className = 'MSearchPanelActive'; | ||||
|  | ||||
|             var searchField = this.DOMSearchField(); | ||||
|  | ||||
|             if (searchField.value == 'Search') | ||||
|                  {  searchField.value = "";  } | ||||
|             } | ||||
|         else if (!ignoreDeactivateDelay) | ||||
|             { | ||||
|             this.inactivateTimeout = setTimeout(this.name + ".InactivateAfterTimeout()", this.inactivateTimeoutLength); | ||||
|             } | ||||
|         else | ||||
|             { | ||||
|             this.InactivateAfterTimeout(); | ||||
|             }; | ||||
|         }; | ||||
|  | ||||
|  | ||||
|     /* | ||||
|         Function: InactivateAfterTimeout | ||||
|  | ||||
|         Called by <inactivateTimeout>, which is set by <Activate()>.  Inactivation occurs on a timeout because a control may | ||||
|         receive OnBlur() when focus is really transferring to another control in the search panel.  In this case we don't want to | ||||
|         actually deactivate the panel because not only would that cause a visible flicker but it could also reset the search value. | ||||
|         So by doing it on a timeout instead, there's a short period where the second control's OnFocus() can cancel the deactivation. | ||||
|     */ | ||||
|     this.InactivateAfterTimeout = function() | ||||
|         { | ||||
|         this.inactivateTimeout = 0; | ||||
|  | ||||
|         this.DOMSearchPanel().className = 'MSearchPanelInactive'; | ||||
|         this.DOMSearchField().value = "Search"; | ||||
|  | ||||
| 	    this.lastSearchValue = ""; | ||||
| 	    this.lastResultsPage = ""; | ||||
|         }; | ||||
|     }; | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| /* ________________________________________________________________________________________________________ | ||||
|  | ||||
|    Class: SearchResults | ||||
|    _________________________________________________________________________________________________________ | ||||
|  | ||||
|    The class that handles everything on the search results page. | ||||
|    _________________________________________________________________________________________________________ | ||||
| */ | ||||
|  | ||||
|  | ||||
| function SearchResults(name, mode) | ||||
|     { | ||||
|     /* | ||||
|         var: mode | ||||
|         The mode the search is going to work in, such as "HTML" or "FramedHTML". | ||||
|     */ | ||||
|     this.mode = mode; | ||||
|  | ||||
|     /* | ||||
|         var: lastMatchCount | ||||
|         The number of matches from the last run of <Search()>. | ||||
|     */ | ||||
|     this.lastMatchCount = 0; | ||||
|  | ||||
|  | ||||
|     /* | ||||
|         Function: Toggle | ||||
|         Toggles the visibility of the passed element ID. | ||||
|     */ | ||||
|     this.Toggle = function(id) | ||||
|         { | ||||
|         if (this.mode == "FramedHTML") | ||||
|             {  return;  }; | ||||
|  | ||||
|         var parentElement = document.getElementById(id); | ||||
|  | ||||
|         var element = parentElement.firstChild; | ||||
|  | ||||
|         while (element && element != parentElement) | ||||
|             { | ||||
|             if (element.nodeName == 'DIV' && element.className == 'ISubIndex') | ||||
|                 { | ||||
|                 if (element.style.display == 'block') | ||||
|                     {  element.style.display = "none";  } | ||||
|                 else | ||||
|                     {  element.style.display = 'block';  } | ||||
|                 }; | ||||
|  | ||||
|             if (element.nodeName == 'DIV' && element.hasChildNodes()) | ||||
|                 {  element = element.firstChild;  } | ||||
|             else if (element.nextSibling) | ||||
|                 {  element = element.nextSibling;  } | ||||
|             else | ||||
|                 { | ||||
|                 do | ||||
|                     { | ||||
|                     element = element.parentNode; | ||||
|                     } | ||||
|                 while (element && element != parentElement && !element.nextSibling); | ||||
|  | ||||
|                 if (element && element != parentElement) | ||||
|                     {  element = element.nextSibling;  }; | ||||
|                 }; | ||||
|             }; | ||||
|         }; | ||||
|  | ||||
|  | ||||
|     /* | ||||
|         Function: Search | ||||
|  | ||||
|         Searches for the passed string.  If there is no parameter, it takes it from the URL query. | ||||
|  | ||||
|         Always returns true, since other documents may try to call it and that may or may not be possible. | ||||
|     */ | ||||
|     this.Search = function(search) | ||||
|         { | ||||
|         if (!search) | ||||
|             { | ||||
|             search = window.location.search; | ||||
|             search = search.substring(1);  // Remove the leading ? | ||||
|             search = unescape(search); | ||||
|             }; | ||||
|  | ||||
|         search = search.replace(/^ +/, ""); | ||||
|         search = search.replace(/ +$/, ""); | ||||
|         search = search.toLowerCase(); | ||||
|  | ||||
|         if (search.match(/[^a-z0-9]/)) // Just a little speedup so it doesn't have to go through the below unnecessarily. | ||||
|             { | ||||
|             search = search.replace(/\_/g, "_und"); | ||||
|             search = search.replace(/\ +/gi, "_spc"); | ||||
|             search = search.replace(/\~/g, "_til"); | ||||
|             search = search.replace(/\!/g, "_exc"); | ||||
|             search = search.replace(/\@/g, "_att"); | ||||
|             search = search.replace(/\#/g, "_num"); | ||||
|             search = search.replace(/\$/g, "_dol"); | ||||
|             search = search.replace(/\%/g, "_pct"); | ||||
|             search = search.replace(/\^/g, "_car"); | ||||
|             search = search.replace(/\&/g, "_amp"); | ||||
|             search = search.replace(/\*/g, "_ast"); | ||||
|             search = search.replace(/\(/g, "_lpa"); | ||||
|             search = search.replace(/\)/g, "_rpa"); | ||||
|             search = search.replace(/\-/g, "_min"); | ||||
|             search = search.replace(/\+/g, "_plu"); | ||||
|             search = search.replace(/\=/g, "_equ"); | ||||
|             search = search.replace(/\{/g, "_lbc"); | ||||
|             search = search.replace(/\}/g, "_rbc"); | ||||
|             search = search.replace(/\[/g, "_lbk"); | ||||
|             search = search.replace(/\]/g, "_rbk"); | ||||
|             search = search.replace(/\:/g, "_col"); | ||||
|             search = search.replace(/\;/g, "_sco"); | ||||
|             search = search.replace(/\"/g, "_quo"); | ||||
|             search = search.replace(/\'/g, "_apo"); | ||||
|             search = search.replace(/\</g, "_lan"); | ||||
|             search = search.replace(/\>/g, "_ran"); | ||||
|             search = search.replace(/\,/g, "_com"); | ||||
|             search = search.replace(/\./g, "_per"); | ||||
|             search = search.replace(/\?/g, "_que"); | ||||
|             search = search.replace(/\//g, "_sla"); | ||||
|             search = search.replace(/[^a-z0-9\_]i/gi, "_zzz"); | ||||
|             }; | ||||
|  | ||||
|         var resultRows = document.getElementsByTagName("div"); | ||||
|         var matches = 0; | ||||
|  | ||||
|         var i = 0; | ||||
|         while (i < resultRows.length) | ||||
|             { | ||||
|             var row = resultRows.item(i); | ||||
|  | ||||
|             if (row.className == "SRResult") | ||||
|                 { | ||||
|                 var rowMatchName = row.id.toLowerCase(); | ||||
|                 rowMatchName = rowMatchName.replace(/^sr\d*_/, ''); | ||||
|  | ||||
|                 if (search.length <= rowMatchName.length && rowMatchName.substr(0, search.length) == search) | ||||
|                     { | ||||
|                     row.style.display = "block"; | ||||
|                     matches++; | ||||
|                     } | ||||
|                 else | ||||
|                     {  row.style.display = "none";  }; | ||||
|                 }; | ||||
|  | ||||
|             i++; | ||||
|             }; | ||||
|  | ||||
|         document.getElementById("Searching").style.display="none"; | ||||
|  | ||||
|         if (matches == 0) | ||||
|             {  document.getElementById("NoMatches").style.display="block";  } | ||||
|         else | ||||
|             {  document.getElementById("NoMatches").style.display="none";  } | ||||
|  | ||||
|         this.lastMatchCount = matches; | ||||
|  | ||||
|         return true; | ||||
|         }; | ||||
|     }; | ||||
|  | ||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							| @@ -1,122 +0,0 @@ | ||||
| var indexSectionsWithContent = { | ||||
|    "General": { | ||||
|       "Symbols": false, | ||||
|       "Numbers": false, | ||||
|       "A": true, | ||||
|       "B": false, | ||||
|       "C": true, | ||||
|       "D": false, | ||||
|       "E": false, | ||||
|       "F": true, | ||||
|       "G": true, | ||||
|       "H": false, | ||||
|       "I": true, | ||||
|       "J": false, | ||||
|       "K": false, | ||||
|       "L": true, | ||||
|       "M": false, | ||||
|       "N": false, | ||||
|       "O": true, | ||||
|       "P": false, | ||||
|       "Q": false, | ||||
|       "R": true, | ||||
|       "S": false, | ||||
|       "T": false, | ||||
|       "U": true, | ||||
|       "V": true, | ||||
|       "W": false, | ||||
|       "X": false, | ||||
|       "Y": false, | ||||
|       "Z": false | ||||
|       }, | ||||
|    "Variables": { | ||||
|       "Symbols": false, | ||||
|       "Numbers": false, | ||||
|       "A": false, | ||||
|       "B": false, | ||||
|       "C": true, | ||||
|       "D": false, | ||||
|       "E": false, | ||||
|       "F": false, | ||||
|       "G": false, | ||||
|       "H": false, | ||||
|       "I": true, | ||||
|       "J": false, | ||||
|       "K": false, | ||||
|       "L": false, | ||||
|       "M": false, | ||||
|       "N": false, | ||||
|       "O": false, | ||||
|       "P": false, | ||||
|       "Q": false, | ||||
|       "R": true, | ||||
|       "S": false, | ||||
|       "T": false, | ||||
|       "U": false, | ||||
|       "V": false, | ||||
|       "W": false, | ||||
|       "X": false, | ||||
|       "Y": false, | ||||
|       "Z": false | ||||
|       }, | ||||
|    "Functions": { | ||||
|       "Symbols": false, | ||||
|       "Numbers": false, | ||||
|       "A": true, | ||||
|       "B": false, | ||||
|       "C": true, | ||||
|       "D": false, | ||||
|       "E": false, | ||||
|       "F": true, | ||||
|       "G": true, | ||||
|       "H": false, | ||||
|       "I": true, | ||||
|       "J": false, | ||||
|       "K": false, | ||||
|       "L": true, | ||||
|       "M": false, | ||||
|       "N": false, | ||||
|       "O": true, | ||||
|       "P": false, | ||||
|       "Q": false, | ||||
|       "R": true, | ||||
|       "S": false, | ||||
|       "T": false, | ||||
|       "U": true, | ||||
|       "V": false, | ||||
|       "W": false, | ||||
|       "X": false, | ||||
|       "Y": false, | ||||
|       "Z": false | ||||
|       }, | ||||
|    "Files": { | ||||
|       "Symbols": false, | ||||
|       "Numbers": false, | ||||
|       "A": false, | ||||
|       "B": false, | ||||
|       "C": true, | ||||
|       "D": false, | ||||
|       "E": false, | ||||
|       "F": false, | ||||
|       "G": false, | ||||
|       "H": false, | ||||
|       "I": false, | ||||
|       "J": false, | ||||
|       "K": false, | ||||
|       "L": false, | ||||
|       "M": false, | ||||
|       "N": false, | ||||
|       "O": false, | ||||
|       "P": false, | ||||
|       "Q": false, | ||||
|       "R": false, | ||||
|       "S": false, | ||||
|       "T": false, | ||||
|       "U": false, | ||||
|       "V": false, | ||||
|       "W": false, | ||||
|       "X": false, | ||||
|       "Y": false, | ||||
|       "Z": false | ||||
|       } | ||||
|    } | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_csrfprotector_perphp><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#csrfprotector.php" target=_parent class=ISymbol>csrfprotector.php</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_authorisePost><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#authorisePost" target=_parent class=ISymbol>authorisePost</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_createNewJsCache><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#createNewJsCache" target=_parent class=ISymbol>createNewJsCache</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_failedValidationAction><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#failedValidationAction" target=_parent class=ISymbol>failedValidationAction</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_generateAuthToken><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#generateAuthToken" target=_parent class=ISymbol>generateAuthToken</a></div></div><div class=SRResult id=SR_getCurrentUrl><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#getCurrentUrl" target=_parent class=ISymbol>getCurrentUrl</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_init><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#init" target=_parent class=ISymbol>init</a></div></div><div class=SRResult id=SR_isURLallowed><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#isURLallowed" target=_parent class=ISymbol>isURLallowed</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_logCSRFattack><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#logCSRFattack" target=_parent class=ISymbol>logCSRFattack</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_ob_undhandler><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#ob_handler" target=_parent class=ISymbol>ob_handler</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_refreshToken><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#refreshToken" target=_parent class=ISymbol>refreshToken</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_useCachedVersion><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#useCachedVersion" target=_parent class=ISymbol>useCachedVersion</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_authorisePost><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#authorisePost" target=_parent class=ISymbol>authorisePost</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_config><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$config" target=_parent class=ISymbol>config</a></div></div><div class=SRResult id=SR_cookieExpiryTime><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$cookieExpiryTime" target=_parent class=ISymbol>cookieExpiryTime</a></div></div><div class=SRResult id=SR_createNewJsCache><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#createNewJsCache" target=_parent class=ISymbol>createNewJsCache</a></div></div><div class=SRResult id=SR_csrfprotector_perphp><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#csrfprotector.php" target=_parent class=ISymbol>csrfprotector.php</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_failedValidationAction><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#failedValidationAction" target=_parent class=ISymbol>failedValidationAction</a></div></div><div class=SRResult id=SR_Functions><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#Functions" target=_parent class=ISymbol>Functions</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_generateAuthToken><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#generateAuthToken" target=_parent class=ISymbol>generateAuthToken</a></div></div><div class=SRResult id=SR_getCurrentUrl><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#getCurrentUrl" target=_parent class=ISymbol>getCurrentUrl</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_init><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#init" target=_parent class=ISymbol>init</a></div></div><div class=SRResult id=SR_isSameOrigin><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$isSameOrigin" target=_parent class=ISymbol>isSameOrigin</a></div></div><div class=SRResult id=SR_isURLallowed><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#isURLallowed" target=_parent class=ISymbol>isURLallowed</a></div></div><div class=SRResult id=SR_isValidHTML><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$isValidHTML" target=_parent class=ISymbol>isValidHTML</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_logCSRFattack><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#logCSRFattack" target=_parent class=ISymbol>logCSRFattack</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_ob_undhandler><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#ob_handler" target=_parent class=ISymbol>ob_handler</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_refreshToken><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#refreshToken" target=_parent class=ISymbol>refreshToken</a></div></div><div class=SRResult id=SR_requestType><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$requestType" target=_parent class=ISymbol>requestType</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_useCachedVersion><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#useCachedVersion" target=_parent class=ISymbol>useCachedVersion</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_Variables><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#Variables" target=_parent class=ISymbol>Variables</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,15 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=NoMatches>No Matches</div></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_config><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$config" target=_parent class=ISymbol>config</a></div></div><div class=SRResult id=SR_cookieExpiryTime><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$cookieExpiryTime" target=_parent class=ISymbol>cookieExpiryTime</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_isSameOrigin><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$isSameOrigin" target=_parent class=ISymbol>isSameOrigin</a></div></div><div class=SRResult id=SR_isValidHTML><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$isValidHTML" target=_parent class=ISymbol>isValidHTML</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,20 +0,0 @@ | ||||
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> | ||||
|  | ||||
| <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!-- | ||||
| if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script> | ||||
|  | ||||
| <!--  Generated by Natural Docs, version 1.52 --> | ||||
| <!--  http://www.naturaldocs.org  --> | ||||
|  | ||||
| <!-- saved from url=(0026)http://www.naturaldocs.org --> | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| <div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_requestType><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$requestType" target=_parent class=ISymbol>requestType</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!-- | ||||
| document.getElementById("Loading").style.display="none"; | ||||
| document.getElementById("NoMatches").style.display="none"; | ||||
| var searchResults = new SearchResults("searchResults", "HTML"); | ||||
| searchResults.Search(); | ||||
| --></script></div><script language=JavaScript><!-- | ||||
| if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html> | ||||
| @@ -1,824 +0,0 @@ | ||||
| /* | ||||
|    IMPORTANT: If you're editing this file in the output directory of one of | ||||
|    your projects, your changes will be overwritten the next time you run | ||||
|    Natural Docs.  Instead, copy this file to your project directory, make your | ||||
|    changes, and you can use it with -s.  Even better would be to make a CSS | ||||
|    file in your project directory with only your changes, which you can then | ||||
|    use with -s [original style] [your changes]. | ||||
|  | ||||
|    On the other hand, if you're editing this file in the Natural Docs styles | ||||
|    directory, the changes will automatically be applied to all your projects | ||||
|    that use this style the next time Natural Docs is run on them. | ||||
|  | ||||
|    This file is part of Natural Docs, which is Copyright <20> 2003-2010 Greg Valure. | ||||
|    Natural Docs is licensed under version 3 of the GNU Affero General Public | ||||
|    License (AGPL).  Refer to License.txt for the complete details. | ||||
|  | ||||
|    This file may be distributed with documentation files generated by Natural Docs. | ||||
|    Such documentation is not covered by Natural Docs' copyright and licensing, | ||||
|    and may have its own copyright and distribution terms as decided by its author. | ||||
| */ | ||||
|  | ||||
| body { | ||||
|     font: 8pt Verdana, Arial, sans-serif; | ||||
|     color: #000000; | ||||
|     margin: 0; padding: 0; | ||||
|     } | ||||
|  | ||||
| .ContentPage, | ||||
| .IndexPage, | ||||
| .FramedMenuPage { | ||||
|     background-color: #E8E8E8; | ||||
|     } | ||||
| .FramedContentPage, | ||||
| .FramedIndexPage, | ||||
| .FramedSearchResultsPage, | ||||
| .PopupSearchResultsPage { | ||||
|     background-color: #FFFFFF; | ||||
|     } | ||||
|  | ||||
|  | ||||
| a:link, | ||||
| a:visited { color: #900000; text-decoration: none } | ||||
| a:hover { color: #900000; text-decoration: underline } | ||||
| a:active { color: #FF0000; text-decoration: underline } | ||||
|  | ||||
| td { | ||||
|     vertical-align: top } | ||||
|  | ||||
| img { border: 0;  } | ||||
|  | ||||
|  | ||||
| /* | ||||
|     Comment out this line to use web-style paragraphs (blank line between | ||||
|     paragraphs, no indent) instead of print-style paragraphs (no blank line, | ||||
|     indented.) | ||||
| */ | ||||
| p { | ||||
|     text-indent: 5ex; margin: 0 } | ||||
|  | ||||
|  | ||||
| /*  Opera doesn't break with just wbr, but will if you add this.  */ | ||||
| .Opera wbr:after { | ||||
| 	content: "\00200B"; | ||||
| 	} | ||||
|  | ||||
| /*  Blockquotes are used as containers for things that may need to scroll.  */ | ||||
| blockquote { | ||||
|     padding: 0; | ||||
|     margin: 0; | ||||
|     overflow: auto; | ||||
|     } | ||||
|  | ||||
|  | ||||
| .Firefox1 blockquote { | ||||
|     padding-bottom: .5em; | ||||
|     } | ||||
|  | ||||
| /*  Turn off scrolling when printing.  */ | ||||
| @media print { | ||||
|     blockquote { | ||||
|         overflow: visible; | ||||
|         } | ||||
|     .IE blockquote { | ||||
|         width: auto; | ||||
|         } | ||||
|     } | ||||
|  | ||||
|  | ||||
|  | ||||
| #Menu { | ||||
|     font-size: 8pt; | ||||
|     padding: 10px 0 0 0; | ||||
|     } | ||||
| .ContentPage #Menu, | ||||
| .IndexPage #Menu { | ||||
|     position: absolute; | ||||
|     top: 0; | ||||
|     left: 0; | ||||
|     width: 31ex; | ||||
|     overflow: hidden; | ||||
|     } | ||||
| .ContentPage .Firefox #Menu, | ||||
| .IndexPage .Firefox #Menu { | ||||
|     width: 27ex; | ||||
|     } | ||||
|  | ||||
|  | ||||
|     .MTitle { | ||||
|         font-size: 16pt; font-weight: bold; font-variant: small-caps; | ||||
|         text-align: center; | ||||
|         padding: 5px 10px 15px 10px; | ||||
|         border-bottom: 1px dotted #000000; | ||||
|         margin-bottom: 15px } | ||||
|  | ||||
|     .MSubTitle { | ||||
|         font-size: 9pt; font-weight: normal; font-variant: normal; | ||||
|         margin-top: 1ex; margin-bottom: 5px } | ||||
|  | ||||
|  | ||||
|     .MEntry a:link, | ||||
|     .MEntry a:hover, | ||||
|     .MEntry a:visited { color: #606060; margin-right: 0 } | ||||
|     .MEntry a:active { color: #A00000; margin-right: 0 } | ||||
|  | ||||
|  | ||||
|     .MGroup { | ||||
|         font-variant: small-caps; font-weight: bold; | ||||
|         margin: 1em 0 1em 10px; | ||||
|         } | ||||
|  | ||||
|     .MGroupContent { | ||||
|         font-variant: normal; font-weight: normal } | ||||
|  | ||||
|     .MGroup a:link, | ||||
|     .MGroup a:hover, | ||||
|     .MGroup a:visited { color: #545454; margin-right: 10px } | ||||
|     .MGroup a:active { color: #A00000; margin-right: 10px } | ||||
|  | ||||
|  | ||||
|     .MFile, | ||||
|     .MText, | ||||
|     .MLink, | ||||
|     .MIndex { | ||||
|         padding: 1px 17px 2px 10px; | ||||
|         margin: .25em 0 .25em 0; | ||||
|         } | ||||
|  | ||||
|     .MText { | ||||
|         font-size: 8pt; font-style: italic } | ||||
|  | ||||
|     .MLink { | ||||
|         font-style: italic } | ||||
|  | ||||
|     #MSelected { | ||||
|         color: #000000; background-color: #FFFFFF; | ||||
|         /*  Replace padding with border.  */ | ||||
|         padding: 0 10px 0 10px; | ||||
|         border-width: 1px 2px 2px 0; border-style: solid; border-color: #000000; | ||||
|         margin-right: 5px; | ||||
|         } | ||||
|  | ||||
|     /*  Close off the left side when its in a group.  */ | ||||
|     .MGroup #MSelected { | ||||
|         padding-left: 9px; border-left-width: 1px } | ||||
|  | ||||
|     /*  A treat for Mozilla users.  Blatantly non-standard.  Will be replaced with CSS 3 attributes when finalized/supported.  */ | ||||
|     .Firefox #MSelected { | ||||
|         -moz-border-radius-topright: 10px; | ||||
|         -moz-border-radius-bottomright: 10px } | ||||
|     .Firefox .MGroup #MSelected { | ||||
|         -moz-border-radius-topleft: 10px; | ||||
|         -moz-border-radius-bottomleft: 10px } | ||||
|  | ||||
|  | ||||
|     #MSearchPanel { | ||||
|         padding: 0px 6px; | ||||
|         margin: .25em 0; | ||||
|         } | ||||
|  | ||||
|  | ||||
|     #MSearchField { | ||||
|         font: italic 8pt Verdana, sans-serif; | ||||
|         color: #606060; | ||||
|         background-color: #E8E8E8; | ||||
|         border: none; | ||||
|         padding: 2px 4px; | ||||
|         width: 100%; | ||||
|         } | ||||
|     /* Only Opera gets it right. */ | ||||
|     .Firefox #MSearchField, | ||||
|     .IE #MSearchField, | ||||
|     .Safari #MSearchField { | ||||
|         width: 94%; | ||||
|         } | ||||
|     .Opera9 #MSearchField, | ||||
|     .Konqueror #MSearchField { | ||||
|         width: 97%; | ||||
|         } | ||||
|     .FramedMenuPage .Firefox #MSearchField, | ||||
|     .FramedMenuPage .Safari #MSearchField, | ||||
|     .FramedMenuPage .Konqueror #MSearchField { | ||||
|         width: 98%; | ||||
|         } | ||||
|  | ||||
|     /* Firefox doesn't do this right in frames without #MSearchPanel added on. | ||||
|         It's presence doesn't hurt anything other browsers. */ | ||||
|     #MSearchPanel.MSearchPanelInactive:hover #MSearchField { | ||||
|         background-color: #FFFFFF; | ||||
|         border: 1px solid #C0C0C0; | ||||
|         padding: 1px 3px; | ||||
|         } | ||||
|     .MSearchPanelActive #MSearchField { | ||||
|         background-color: #FFFFFF; | ||||
|         border: 1px solid #C0C0C0; | ||||
|         font-style: normal; | ||||
|         padding: 1px 3px; | ||||
|         } | ||||
|  | ||||
|     #MSearchType { | ||||
|         visibility: hidden; | ||||
|         font: 8pt Verdana, sans-serif; | ||||
|         width: 98%; | ||||
|         padding: 0; | ||||
|         border: 1px solid #C0C0C0; | ||||
|         } | ||||
|     .MSearchPanelActive #MSearchType, | ||||
|     /*  As mentioned above, Firefox doesn't do this right in frames without #MSearchPanel added on. */ | ||||
|     #MSearchPanel.MSearchPanelInactive:hover #MSearchType, | ||||
|     #MSearchType:focus { | ||||
|         visibility: visible; | ||||
|         color: #606060; | ||||
|         } | ||||
|     #MSearchType option#MSearchEverything { | ||||
|         font-weight: bold; | ||||
|         } | ||||
|  | ||||
|     .Opera8 .MSearchPanelInactive:hover, | ||||
|     .Opera8 .MSearchPanelActive { | ||||
|         margin-left: -1px; | ||||
|         } | ||||
|  | ||||
|  | ||||
|     iframe#MSearchResults { | ||||
|         width: 60ex; | ||||
|         height: 15em; | ||||
|         } | ||||
|     #MSearchResultsWindow { | ||||
|         display: none; | ||||
|         position: absolute; | ||||
|         left: 0; top: 0; | ||||
|         border: 1px solid #000000; | ||||
|         background-color: #E8E8E8; | ||||
|         } | ||||
|     #MSearchResultsWindowClose { | ||||
|         font-weight: bold; | ||||
|         font-size: 8pt; | ||||
|         display: block; | ||||
|         padding: 2px 5px; | ||||
|         } | ||||
|     #MSearchResultsWindowClose:link, | ||||
|     #MSearchResultsWindowClose:visited { | ||||
|         color: #000000; | ||||
|         text-decoration: none; | ||||
|         } | ||||
|     #MSearchResultsWindowClose:active, | ||||
|     #MSearchResultsWindowClose:hover { | ||||
|         color: #800000; | ||||
|         text-decoration: none; | ||||
|         background-color: #F4F4F4; | ||||
|         } | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| #Content { | ||||
|     padding-bottom: 15px; | ||||
|     } | ||||
|  | ||||
| .ContentPage #Content { | ||||
|     border-width: 0 0 1px 1px; | ||||
|     border-style: solid; | ||||
|     border-color: #000000; | ||||
|     background-color: #FFFFFF; | ||||
|     font-size: 8pt;  /* To make 31ex match the menu's 31ex. */ | ||||
|     margin-left: 31ex; | ||||
|     } | ||||
| .ContentPage .Firefox #Content { | ||||
|     margin-left: 27ex; | ||||
|     } | ||||
|  | ||||
|  | ||||
|  | ||||
|     .CTopic { | ||||
|         font-size: 8pt; | ||||
|         margin-bottom: 3em; | ||||
|         } | ||||
|  | ||||
|  | ||||
|     .CTitle { | ||||
|         font-size: 11pt; font-weight: bold; | ||||
|         border-width: 0 0 1px 0; border-style: solid; border-color: #A0A0A0; | ||||
|         margin: 0 15px .5em 15px } | ||||
|  | ||||
|     .CGroup .CTitle { | ||||
|         font-size: 16pt; font-variant: small-caps; | ||||
|         padding-left: 15px; padding-right: 15px; | ||||
|         border-width: 0 0 2px 0; border-color: #000000; | ||||
|         margin-left: 0; margin-right: 0 } | ||||
|  | ||||
|     .CClass .CTitle, | ||||
|     .CInterface .CTitle, | ||||
|     .CDatabase .CTitle, | ||||
|     .CDatabaseTable .CTitle, | ||||
|     .CSection .CTitle { | ||||
|         font-size: 18pt; | ||||
|         color: #FFFFFF; background-color: #A0A0A0; | ||||
|         padding: 10px 15px 10px 15px; | ||||
|         border-width: 2px 0; border-color: #000000; | ||||
|         margin-left: 0; margin-right: 0 } | ||||
|  | ||||
|     #MainTopic .CTitle { | ||||
|         font-size: 20pt; | ||||
|         color: #FFFFFF; background-color: #7070C0; | ||||
|         padding: 10px 15px 10px 15px; | ||||
|         border-width: 0 0 3px 0; border-color: #000000; | ||||
|         margin-left: 0; margin-right: 0 } | ||||
|  | ||||
|     .CBody { | ||||
|         margin-left: 15px; margin-right: 15px } | ||||
|  | ||||
|  | ||||
|     .CToolTip { | ||||
|         position: absolute; visibility: hidden; | ||||
|         left: 0; top: 0; | ||||
|         background-color: #FFFFE0; | ||||
|         padding: 5px; | ||||
|         border-width: 1px 2px 2px 1px; border-style: solid; border-color: #000000; | ||||
|         font-size: 8pt; | ||||
|         } | ||||
|  | ||||
|     .Opera .CToolTip { | ||||
|         max-width: 98%; | ||||
|         } | ||||
|  | ||||
|     /*  Scrollbars would be useless.  */ | ||||
|     .CToolTip blockquote { | ||||
|         overflow: hidden; | ||||
|         } | ||||
|     .IE6 .CToolTip blockquote { | ||||
|         overflow: visible; | ||||
|         } | ||||
|  | ||||
|     .CHeading { | ||||
|         font-weight: bold; font-size: 9pt; | ||||
|         margin: 1.5em 0 .5em 0; | ||||
|         } | ||||
|  | ||||
|     .CBody pre { | ||||
|         font: 8pt "Courier New", Courier, monospace; | ||||
| 	    background-color: #FCFCFC; | ||||
| 	    margin: 1em 35px; | ||||
| 	    padding: 10px 15px 10px 10px; | ||||
| 	    border-color: #E0E0E0 #E0E0E0 #E0E0E0 #E4E4E4; | ||||
| 	    border-width: 1px 1px 1px 6px; | ||||
| 	    border-style: dashed dashed dashed solid; | ||||
|         } | ||||
|  | ||||
|     .CBody ul { | ||||
|         /*  I don't know why CBody's margin doesn't apply, but it's consistent across browsers so whatever. | ||||
|              Reapply it here as padding.  */ | ||||
|         padding-left: 15px; padding-right: 15px; | ||||
|         margin: .5em 5ex .5em 5ex; | ||||
|         } | ||||
|  | ||||
|     .CDescriptionList { | ||||
|         margin: .5em 5ex 0 5ex } | ||||
|  | ||||
|         .CDLEntry { | ||||
|             font: 8pt "Courier New", Courier, monospace; color: #808080; | ||||
|             padding-bottom: .25em; | ||||
|             white-space: nowrap } | ||||
|  | ||||
|         .CDLDescription { | ||||
|             font-size: 8pt;  /*  For browsers that don't inherit correctly, like Opera 5.  */ | ||||
|             padding-bottom: .5em; padding-left: 5ex } | ||||
|  | ||||
|  | ||||
|     .CTopic img { | ||||
|         text-align: center; | ||||
|         display: block; | ||||
|         margin: 1em auto; | ||||
|         } | ||||
|     .CImageCaption { | ||||
|         font-variant: small-caps; | ||||
|         font-size: 8pt; | ||||
|         color: #808080; | ||||
|         text-align: center; | ||||
|         position: relative; | ||||
|         top: 1em; | ||||
|         } | ||||
|  | ||||
|     .CImageLink { | ||||
|         color: #808080; | ||||
|         font-style: italic; | ||||
|         } | ||||
|     a.CImageLink:link, | ||||
|     a.CImageLink:visited, | ||||
|     a.CImageLink:hover { color: #808080 } | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| .Prototype { | ||||
|     font: 8pt "Courier New", Courier, monospace; | ||||
|     padding: 5px 3ex; | ||||
|     border-width: 1px; border-style: solid; | ||||
|     margin: 0 5ex 1.5em 5ex; | ||||
|     } | ||||
|  | ||||
|     .Prototype td { | ||||
|         font-size: 8pt; | ||||
|         } | ||||
|  | ||||
|     .PDefaultValue, | ||||
|     .PDefaultValuePrefix, | ||||
|     .PTypePrefix { | ||||
|         color: #8F8F8F; | ||||
|         } | ||||
|     .PTypePrefix { | ||||
|         text-align: right; | ||||
|         } | ||||
|     .PAfterParameters { | ||||
|         vertical-align: bottom; | ||||
|         } | ||||
|  | ||||
|     .IE .Prototype table { | ||||
|         padding: 0; | ||||
|         } | ||||
|  | ||||
|     .CFunction .Prototype { | ||||
|         background-color: #F4F4F4; border-color: #D0D0D0 } | ||||
|     .CProperty .Prototype { | ||||
|         background-color: #F4F4FF; border-color: #C0C0E8 } | ||||
|     .CVariable .Prototype { | ||||
|         background-color: #FFFFF0; border-color: #E0E0A0 } | ||||
|  | ||||
|     .CClass .Prototype { | ||||
|         border-width: 1px 2px 2px 1px; border-style: solid; border-color: #A0A0A0; | ||||
|         background-color: #F4F4F4; | ||||
|         } | ||||
|     .CInterface .Prototype { | ||||
|         border-width: 1px 2px 2px 1px; border-style: solid; border-color: #A0A0D0; | ||||
|         background-color: #F4F4FF; | ||||
|         } | ||||
|  | ||||
|     .CDatabaseIndex .Prototype, | ||||
|     .CConstant .Prototype { | ||||
|         background-color: #D0D0D0; border-color: #000000 } | ||||
|     .CType .Prototype, | ||||
|     .CEnumeration .Prototype { | ||||
|         background-color: #FAF0F0; border-color: #E0B0B0; | ||||
|         } | ||||
|     .CDatabaseTrigger .Prototype, | ||||
|     .CEvent .Prototype, | ||||
|     .CDelegate .Prototype { | ||||
|         background-color: #F0FCF0; border-color: #B8E4B8 } | ||||
|  | ||||
|     .CToolTip .Prototype { | ||||
|         margin: 0 0 .5em 0; | ||||
|         white-space: nowrap; | ||||
|         } | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| .Summary { | ||||
|     margin: 1.5em 5ex 0 5ex } | ||||
|  | ||||
|     .STitle { | ||||
|         font-size: 11pt; font-weight: bold; | ||||
|         margin-bottom: .5em } | ||||
|  | ||||
|  | ||||
|     .SBorder { | ||||
|         background-color: #FFFFF0; | ||||
|         padding: 15px; | ||||
|         border: 1px solid #C0C060 } | ||||
|  | ||||
|     /* In a frame IE 6 will make them too long unless you set the width to 100%.  Without frames it will be correct without a width | ||||
|         or slightly too long (but not enough to scroll) with a width.  This arbitrary weirdness simply astounds me.  IE 7 has the same | ||||
|         problem with frames, haven't tested it without.  */ | ||||
|     .FramedContentPage .IE .SBorder { | ||||
|         width: 100% } | ||||
|  | ||||
|     /*  A treat for Mozilla users.  Blatantly non-standard.  Will be replaced with CSS 3 attributes when finalized/supported.  */ | ||||
|     .Firefox .SBorder { | ||||
|         -moz-border-radius: 20px } | ||||
|  | ||||
|  | ||||
|     .STable { | ||||
|         font-size: 8pt; width: 100% } | ||||
|  | ||||
|     .SEntry { | ||||
|         width: 30% } | ||||
|     .SDescription { | ||||
|         width: 70% } | ||||
|  | ||||
|  | ||||
|     .SMarked { | ||||
|         background-color: #F8F8D8 } | ||||
|  | ||||
|     .SDescription { padding-left: 2ex } | ||||
|     .SIndent1 .SEntry { padding-left: 1.5ex }   .SIndent1 .SDescription { padding-left: 3.5ex } | ||||
|     .SIndent2 .SEntry { padding-left: 3.0ex }   .SIndent2 .SDescription { padding-left: 5.0ex } | ||||
|     .SIndent3 .SEntry { padding-left: 4.5ex }   .SIndent3 .SDescription { padding-left: 6.5ex } | ||||
|     .SIndent4 .SEntry { padding-left: 6.0ex }   .SIndent4 .SDescription { padding-left: 8.0ex } | ||||
|     .SIndent5 .SEntry { padding-left: 7.5ex }   .SIndent5 .SDescription { padding-left: 9.5ex } | ||||
|  | ||||
|     .SDescription a { color: #800000} | ||||
|     .SDescription a:active { color: #A00000 } | ||||
|  | ||||
|     .SGroup td { | ||||
|         padding-top: .5em; padding-bottom: .25em } | ||||
|  | ||||
|     .SGroup .SEntry { | ||||
|         font-weight: bold; font-variant: small-caps } | ||||
|  | ||||
|     .SGroup .SEntry a { color: #800000 } | ||||
|     .SGroup .SEntry a:active { color: #F00000 } | ||||
|  | ||||
|  | ||||
|     .SMain td, | ||||
|     .SClass td, | ||||
|     .SDatabase td, | ||||
|     .SDatabaseTable td, | ||||
|     .SSection td { | ||||
|         font-size: 10pt; | ||||
|         padding-bottom: .25em } | ||||
|  | ||||
|     .SClass td, | ||||
|     .SDatabase td, | ||||
|     .SDatabaseTable td, | ||||
|     .SSection td { | ||||
|         padding-top: 1em } | ||||
|  | ||||
|     .SMain .SEntry, | ||||
|     .SClass .SEntry, | ||||
|     .SDatabase .SEntry, | ||||
|     .SDatabaseTable .SEntry, | ||||
|     .SSection .SEntry { | ||||
|         font-weight: bold; | ||||
|         } | ||||
|  | ||||
|     .SMain .SEntry a, | ||||
|     .SClass .SEntry a, | ||||
|     .SDatabase .SEntry a, | ||||
|     .SDatabaseTable .SEntry a, | ||||
|     .SSection .SEntry a { color: #000000 } | ||||
|  | ||||
|     .SMain .SEntry a:active, | ||||
|     .SClass .SEntry a:active, | ||||
|     .SDatabase .SEntry a:active, | ||||
|     .SDatabaseTable .SEntry a:active, | ||||
|     .SSection .SEntry a:active { color: #A00000 } | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| .ClassHierarchy { | ||||
|     margin: 0 15px 1em 15px } | ||||
|  | ||||
|     .CHEntry { | ||||
|         border-width: 1px 2px 2px 1px; border-style: solid; border-color: #A0A0A0; | ||||
|         margin-bottom: 3px; | ||||
|         padding: 2px 2ex; | ||||
|         font-size: 8pt; | ||||
|         background-color: #F4F4F4; color: #606060; | ||||
|         } | ||||
|  | ||||
|     .Firefox .CHEntry { | ||||
|         -moz-border-radius: 4px; | ||||
|         } | ||||
|  | ||||
|     .CHCurrent .CHEntry { | ||||
|         font-weight: bold; | ||||
|         border-color: #000000; | ||||
|         color: #000000; | ||||
|         } | ||||
|  | ||||
|     .CHChildNote .CHEntry { | ||||
|         font-style: italic; | ||||
|         font-size: 8pt; | ||||
|         } | ||||
|  | ||||
|     .CHIndent { | ||||
|         margin-left: 3ex; | ||||
|         } | ||||
|  | ||||
|     .CHEntry a:link, | ||||
|     .CHEntry a:visited, | ||||
|     .CHEntry a:hover { | ||||
|         color: #606060; | ||||
|         } | ||||
|     .CHEntry a:active { | ||||
|         color: #800000; | ||||
|         } | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
| #Index { | ||||
|     background-color: #FFFFFF; | ||||
|     } | ||||
|  | ||||
| /*  As opposed to .PopupSearchResultsPage #Index  */ | ||||
| .IndexPage #Index, | ||||
| .FramedIndexPage #Index, | ||||
| .FramedSearchResultsPage #Index { | ||||
|     padding: 15px; | ||||
|     } | ||||
|  | ||||
| .IndexPage #Index { | ||||
|     border-width: 0 0 1px 1px; | ||||
|     border-style: solid; | ||||
|     border-color: #000000; | ||||
|     font-size: 8pt;  /* To make 27ex match the menu's 27ex. */ | ||||
|     margin-left: 27ex; | ||||
|     } | ||||
|  | ||||
|  | ||||
|     .IPageTitle { | ||||
|         font-size: 20pt; font-weight: bold; | ||||
|         color: #FFFFFF; background-color: #7070C0; | ||||
|         padding: 10px 15px 10px 15px; | ||||
|         border-width: 0 0 3px 0; border-color: #000000; border-style: solid; | ||||
|         margin: -15px -15px 0 -15px } | ||||
|  | ||||
|     .FramedSearchResultsPage .IPageTitle { | ||||
|         margin-bottom: 15px; | ||||
|         } | ||||
|  | ||||
|     .INavigationBar { | ||||
|         text-align: center; | ||||
|         background-color: #FFFFF0; | ||||
|         padding: 5px; | ||||
|         border-bottom: solid 1px black; | ||||
|         margin: 0 -15px 15px -15px; | ||||
|         } | ||||
|  | ||||
|     .INavigationBar a { | ||||
|         font-weight: bold } | ||||
|  | ||||
|     .IHeading { | ||||
|         font-size: 14pt; font-weight: bold; | ||||
|         padding: 2.5em 0 .5em 0; | ||||
|         text-align: center; | ||||
|         width: 3.5ex; | ||||
|         } | ||||
|     #IFirstHeading { | ||||
|         padding-top: 0; | ||||
|         } | ||||
|  | ||||
|     .IEntry { | ||||
|         padding-left: 1ex; | ||||
|         } | ||||
|     .PopupSearchResultsPage .IEntry { | ||||
|         font-size: 8pt; | ||||
|         padding: 1px 5px; | ||||
|         } | ||||
|     .PopupSearchResultsPage .Opera9 .IEntry, | ||||
|     .FramedSearchResultsPage .Opera9 .IEntry { | ||||
|         text-align: left; | ||||
|         } | ||||
|     .FramedSearchResultsPage .IEntry { | ||||
|         padding: 0; | ||||
|         } | ||||
|  | ||||
|     .ISubIndex { | ||||
|         padding-left: 3ex; padding-bottom: .5em } | ||||
|     .PopupSearchResultsPage .ISubIndex { | ||||
|         display: none; | ||||
|         } | ||||
|  | ||||
|     /*  While it may cause some entries to look like links when they aren't, I found it's much easier to read the | ||||
|          index if everything's the same color.  */ | ||||
|     .ISymbol { | ||||
|         font-weight: bold; color: #900000  } | ||||
|  | ||||
|     .IndexPage .ISymbolPrefix, | ||||
|     .FramedIndexPage .ISymbolPrefix { | ||||
|         text-align: right; | ||||
|         color: #C47C7C; | ||||
|         background-color: #F8F8F8; | ||||
|         border-right: 3px solid #E0E0E0; | ||||
|         border-left: 1px solid #E0E0E0; | ||||
|         padding: 0 1px 0 2px; | ||||
|         } | ||||
|     .PopupSearchResultsPage .ISymbolPrefix, | ||||
|     .FramedSearchResultsPage .ISymbolPrefix { | ||||
|         color: #900000; | ||||
|         } | ||||
|     .PopupSearchResultsPage .ISymbolPrefix { | ||||
|         font-size: 8pt; | ||||
|         } | ||||
|  | ||||
|     .IndexPage #IFirstSymbolPrefix, | ||||
|     .FramedIndexPage #IFirstSymbolPrefix { | ||||
|         border-top: 1px solid #E0E0E0; | ||||
|         } | ||||
|     .IndexPage #ILastSymbolPrefix, | ||||
|     .FramedIndexPage #ILastSymbolPrefix { | ||||
|         border-bottom: 1px solid #E0E0E0; | ||||
|         } | ||||
|     .IndexPage #IOnlySymbolPrefix, | ||||
|     .FramedIndexPage #IOnlySymbolPrefix { | ||||
|         border-top: 1px solid #E0E0E0; | ||||
|         border-bottom: 1px solid #E0E0E0; | ||||
|         } | ||||
|  | ||||
|     a.IParent, | ||||
|     a.IFile { | ||||
|         display: block; | ||||
|         } | ||||
|  | ||||
|     .PopupSearchResultsPage .SRStatus { | ||||
|         padding: 2px 5px; | ||||
|         font-size: 8pt; | ||||
|         font-style: italic; | ||||
|         } | ||||
|     .FramedSearchResultsPage .SRStatus { | ||||
|         font-size: 8pt; | ||||
|         font-style: italic; | ||||
|         } | ||||
|  | ||||
|     .SRResult { | ||||
|         display: none; | ||||
|         } | ||||
|  | ||||
|  | ||||
|  | ||||
| #Footer { | ||||
|     font-size: 8pt; | ||||
|     color: #989898; | ||||
|     text-align: right; | ||||
|     } | ||||
|  | ||||
| #Footer p { | ||||
|     text-indent: 0; | ||||
|     margin-bottom: .5em; | ||||
|     } | ||||
|  | ||||
| .ContentPage #Footer, | ||||
| .IndexPage #Footer { | ||||
|     text-align: right; | ||||
|     margin: 2px; | ||||
|     } | ||||
|  | ||||
| .FramedMenuPage #Footer { | ||||
|     text-align: center; | ||||
|     margin: 5em 10px 10px 10px; | ||||
|     padding-top: 1em; | ||||
|     border-top: 1px solid #C8C8C8; | ||||
|     } | ||||
|  | ||||
|     #Footer a:link, | ||||
|     #Footer a:hover, | ||||
|     #Footer a:visited { color: #989898 } | ||||
|     #Footer a:active { color: #A00000 } | ||||
|  | ||||
|  | ||||
|  | ||||
| .prettyprint .kwd { color: #800000; }  /* keywords */ | ||||
|  | ||||
|     .prettyprint.PDefaultValue .kwd, | ||||
|     .prettyprint.PDefaultValuePrefix .kwd, | ||||
|     .prettyprint.PTypePrefix .kwd { | ||||
|         color: #C88F8F; | ||||
|         } | ||||
|  | ||||
| .prettyprint .com { color: #008000; }  /* comments */ | ||||
|  | ||||
|     .prettyprint.PDefaultValue .com, | ||||
|     .prettyprint.PDefaultValuePrefix .com, | ||||
|     .prettyprint.PTypePrefix .com { | ||||
|         color: #8FC88F; | ||||
|         } | ||||
|  | ||||
| .prettyprint .str { color: #0000B0; }  /* strings */ | ||||
| .prettyprint .lit { color: #0000B0; }  /* literals */ | ||||
|  | ||||
|     .prettyprint.PDefaultValue .str, | ||||
|     .prettyprint.PDefaultValuePrefix .str, | ||||
|     .prettyprint.PTypePrefix .str, | ||||
|     .prettyprint.PDefaultValue .lit, | ||||
|     .prettyprint.PDefaultValuePrefix .lit, | ||||
|     .prettyprint.PTypePrefix .lit { | ||||
|         color: #8F8FC0; | ||||
|         } | ||||
|  | ||||
| .prettyprint .typ { color: #000000; }  /* types */ | ||||
| .prettyprint .pun { color: #000000; }  /* punctuation */ | ||||
| .prettyprint .pln { color: #000000; }  /* punctuation */ | ||||
|  | ||||
|     .prettyprint.PDefaultValue .typ, | ||||
|     .prettyprint.PDefaultValuePrefix .typ, | ||||
|     .prettyprint.PTypePrefix .typ, | ||||
|     .prettyprint.PDefaultValue .pun, | ||||
|     .prettyprint.PDefaultValuePrefix .pun, | ||||
|     .prettyprint.PTypePrefix .pun, | ||||
|     .prettyprint.PDefaultValue .pln, | ||||
|     .prettyprint.PDefaultValuePrefix .pln, | ||||
|     .prettyprint.PTypePrefix .pln { | ||||
|         color: #8F8F8F; | ||||
|         } | ||||
|  | ||||
| .prettyprint .tag { color: #008; } | ||||
| .prettyprint .atn { color: #606; } | ||||
| .prettyprint .atv { color: #080; } | ||||
| .prettyprint .dec { color: #606; } | ||||
|  | ||||
| @@ -1,15 +0,0 @@ | ||||
| Compatiblity with different browsers | ||||
| =================================== | ||||
| **OS: `windows`**<br> | ||||
|  | ||||
|  | ||||
|  Cases               | IE (Win)   | Opera | Chrome | Mozilla | Safari  | ||||
|  ------------------  | ------- | ----- | ------ | ------- | ------  | ||||
|  XHR wrapping        |      |       |        |         |  | ||||
|  HTML dom-0 wrapping |      |       |        |         |  | ||||
|  HTML dom-2 wrapping |       |       |        |         |   | ||||
|  URL rewriting       |      |       |        |         | | ||||
|  | ||||
| <pre>Note: Missing tick means, this has not yet been implemented or tested</pre> | ||||
|  | ||||
|  | ||||
| @@ -1,366 +0,0 @@ | ||||
| /**  | ||||
|  * ================================================================= | ||||
|  * Javascript code for OWASP CSRF Protector | ||||
|  * Task it does: Fetch csrftoken from cookie, and attach it to every | ||||
|  * 		POST request | ||||
|  *		Allowed GET url | ||||
|  *			-- XHR | ||||
|  *			-- Static Forms | ||||
|  *			-- URLS (GET only) | ||||
|  *			-- dynamic forms | ||||
|  * ================================================================= | ||||
|  */ | ||||
|  | ||||
| var CSRFP_FIELD_TOKEN_NAME = 'csrfp_hidden_data_token'; | ||||
| var CSRFP_FIELD_URLS = 'csrfp_hidden_data_urls'; | ||||
|  | ||||
| var CSRFP = { | ||||
| 	CSRFP_TOKEN: 'csrfp_token', | ||||
| 	/** | ||||
| 	 * Array of patterns of url, for which csrftoken need to be added | ||||
| 	 * In case of GET request also, provided from server | ||||
| 	 * | ||||
| 	 * @var string array | ||||
| 	 */ | ||||
| 	checkForUrls: [], | ||||
| 	/** | ||||
| 	 * Function to check if a certain url is allowed to perform the request | ||||
| 	 * With or without csrf token | ||||
| 	 * | ||||
| 	 * @param: string, url | ||||
| 	 * | ||||
| 	 * @return: boolean, 	true if csrftoken is not needed | ||||
| 	 * 						false if csrftoken is needed | ||||
| 	 */ | ||||
| 	_isValidGetRequest: function(url) { | ||||
| 		for (var i = 0; i < CSRFP.checkForUrls.length; i++) { | ||||
| 			var match = CSRFP.checkForUrls[i].exec(url); | ||||
| 			if (match !== null && match.length > 0) { | ||||
| 				return false; | ||||
| 			} | ||||
| 		} | ||||
| 		return true; | ||||
| 	}, | ||||
| 	/**  | ||||
| 	 * function to get Auth key from cookie Andreturn it to requesting function | ||||
| 	 * | ||||
| 	 * @param: void | ||||
| 	 * | ||||
| 	 * @return: string, csrftoken retrieved from cookie | ||||
| 	 */ | ||||
| 	_getAuthKey: function() { | ||||
| 		var re = new RegExp(CSRFP.CSRFP_TOKEN +"=([^;]+)(;|$)"); | ||||
| 		var RegExpArray = re.exec(document.cookie); | ||||
| 		 | ||||
| 		if (RegExpArray === null) { | ||||
| 			return false; | ||||
| 		} | ||||
| 		return RegExpArray[1]; | ||||
| 	}, | ||||
| 	/**  | ||||
| 	 * Function to get domain of any url | ||||
| 	 * | ||||
| 	 * @param: string, url | ||||
| 	 * | ||||
| 	 * @return: string, domain of url | ||||
| 	 */ | ||||
| 	_getDomain: function(url) { | ||||
| 		if (url.indexOf("http://") !== 0  | ||||
| 			&& url.indexOf("https://") !== 0) | ||||
| 			return document.domain; | ||||
| 		return /http(s)?:\/\/([^\/]+)/.exec(url)[2]; | ||||
| 	}, | ||||
| 	/** | ||||
| 	 * Function to create and return a hidden input element | ||||
| 	 * For stroing the CSRFP_TOKEN | ||||
| 	 * | ||||
| 	 * @param void | ||||
| 	 * | ||||
| 	 * @return input element | ||||
| 	 */ | ||||
| 	_getInputElt: function() { | ||||
| 		var hiddenObj = document.createElement("input"); | ||||
| 		hiddenObj.setAttribute('name', CSRFP.CSRFP_TOKEN); | ||||
| 		hiddenObj.setAttribute('class', CSRFP.CSRFP_TOKEN); | ||||
| 		hiddenObj.type = 'hidden'; | ||||
| 		hiddenObj.value = CSRFP._getAuthKey(); | ||||
| 		return hiddenObj; | ||||
| 	}, | ||||
| 	/** | ||||
| 	 * Returns absolute path for relative path | ||||
| 	 *  | ||||
| 	 * @param base, base url | ||||
| 	 * @param relative, relative url | ||||
| 	 * | ||||
| 	 * @return absolute path (string) | ||||
| 	 */ | ||||
| 	_getAbsolutePath: function(base, relative) { | ||||
| 		var stack = base.split("/"); | ||||
| 		var parts = relative.split("/"); | ||||
| 		// remove current file name (or empty string) | ||||
| 		// (omit if "base" is the current folder without trailing slash) | ||||
| 		stack.pop();  | ||||
| 			  | ||||
| 		for (var i = 0; i < parts.length; i++) { | ||||
| 			if (parts[i] == ".") | ||||
| 				continue; | ||||
| 			if (parts[i] == "..") | ||||
| 				stack.pop(); | ||||
| 			else | ||||
| 				stack.push(parts[i]); | ||||
| 		} | ||||
| 		return stack.join("/"); | ||||
| 	}, | ||||
| 	/**  | ||||
| 	 * Remove jcsrfp-token run fun and then put them back  | ||||
| 	 * | ||||
| 	 * @param function | ||||
| 	 * @param reference form obj | ||||
| 	 * | ||||
| 	 * @retrun function | ||||
| 	 */ | ||||
| 	_csrfpWrap: function(fun, obj) { | ||||
| 		return function(event) { | ||||
| 			// Remove CSRf token if exists | ||||
| 			if (typeof obj[CSRFP.CSRFP_TOKEN] !== 'undefined') { | ||||
| 				var target = obj[CSRFP.CSRFP_TOKEN]; | ||||
| 				target.parentNode.removeChild(target); | ||||
| 			} | ||||
| 			 | ||||
| 			// Trigger the functions | ||||
| 			var result = fun.apply(this, [event]); | ||||
| 			 | ||||
| 			// Now append the csrfp_token back | ||||
| 			obj.appendChild(CSRFP._getInputElt()); | ||||
| 			 | ||||
| 			return result; | ||||
| 		}; | ||||
| 	}, | ||||
| 	/** | ||||
| 	 * Initialises the CSRFProtector js script | ||||
| 	 * | ||||
| 	 * @param void | ||||
| 	 * | ||||
| 	 * @return void | ||||
| 	 */ | ||||
| 	_init: function() { | ||||
| 		CSRFP.CSRFP_TOKEN = document.getElementById(CSRFP_FIELD_TOKEN_NAME).value; | ||||
| 		try { | ||||
| 			CSRFP.checkForUrls = JSON.parse(document.getElementById(CSRFP_FIELD_URLS).value); | ||||
| 		} catch (err) { | ||||
| 			console.error(err); | ||||
| 			console.error('[ERROR] [CSRF Protector] unable to parse blacklisted url fields.'); | ||||
| 		} | ||||
|  | ||||
| 		//convert these rules received from php lib to regex objects | ||||
| 		for (var i = 0; i < CSRFP.checkForUrls.length; i++) { | ||||
| 			CSRFP.checkForUrls[i] = CSRFP.checkForUrls[i].replace(/\*/g, '(.*)') | ||||
| 								.replace(/\//g, "\\/"); | ||||
| 			CSRFP.checkForUrls[i] = new RegExp(CSRFP.checkForUrls[i]); | ||||
| 		} | ||||
| 	 | ||||
| 	} | ||||
| 	 | ||||
| };  | ||||
|  | ||||
| //========================================================== | ||||
| // Adding tokens, wrappers on window onload | ||||
| //========================================================== | ||||
|  | ||||
| function csrfprotector_init() { | ||||
| 	 | ||||
| 	// Call the init funcion | ||||
| 	CSRFP._init(); | ||||
|  | ||||
| 	// definition of basic FORM submit event handler to intercept the form request | ||||
| 	// and attach a CSRFP TOKEN if it's not already available | ||||
| 	var BasicSubmitInterceptor = function(event) { | ||||
| 		if (typeof event.target[CSRFP.CSRFP_TOKEN] === 'undefined') { | ||||
| 			event.target.appendChild(CSRFP._getInputElt()); | ||||
| 		} else { | ||||
| 			//modify token to latest value | ||||
| 			event.target[CSRFP.CSRFP_TOKEN].value = CSRFP._getAuthKey(); | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	//================================================================== | ||||
| 	// Adding csrftoken to request resulting from <form> submissions | ||||
| 	// Add for each POST, while for mentioned GET request | ||||
| 	// TODO - check for method | ||||
| 	//================================================================== | ||||
| 	// run time binding | ||||
| 	document.querySelector('body').addEventListener('submit', function(event) { | ||||
| 		if (event.target.tagName.toLowerCase() === 'form') { | ||||
| 			BasicSubmitInterceptor(event); | ||||
| 		}; | ||||
| 	}); | ||||
|  | ||||
| 	// intial binding | ||||
| 	// for(var i = 0; i < document.forms.length; i++) { | ||||
| 	// 	document.forms[i].addEventListener("submit", BasicSubmitInterceptor); | ||||
| 	// } | ||||
|  | ||||
| 	//================================================================== | ||||
| 	// Adding csrftoken to request resulting from direct form.submit() call | ||||
| 	// Add for each POST, while for mentioned GET request | ||||
| 	// TODO - check for form method | ||||
| 	//================================================================== | ||||
| 	HTMLFormElement.prototype.submit_ = HTMLFormElement.prototype.submit; | ||||
| 	HTMLFormElement.prototype.submit = function() { | ||||
| 		// check if the FORM already contains the token element | ||||
| 		if (!this.getElementsByClassName(CSRFP.CSRFP_TOKEN).length) | ||||
| 			this.appendChild(CSRFP._getInputElt()); | ||||
| 		this.submit_(); | ||||
| 	} | ||||
|  | ||||
|  | ||||
| 	/** | ||||
| 	 * Add wrapper for HTMLFormElements addEventListener so that any further  | ||||
| 	 * addEventListens won't have trouble with CSRF token | ||||
| 	 * todo - check for method | ||||
| 	 */ | ||||
| 	HTMLFormElement.prototype.addEventListener_ = HTMLFormElement.prototype.addEventListener; | ||||
| 	HTMLFormElement.prototype.addEventListener = function(eventType, fun, bubble) { | ||||
| 		if (eventType === 'submit') { | ||||
| 			var wrapped = CSRFP._csrfpWrap(fun, this); | ||||
| 			this.addEventListener_(eventType, wrapped, bubble); | ||||
| 		} else { | ||||
| 			this.addEventListener_(eventType, fun, bubble); | ||||
| 		}	 | ||||
| 	} | ||||
|  | ||||
| 	/** | ||||
| 	 * Add wrapper for IE's attachEvent | ||||
| 	 * todo - check for method | ||||
| 	 * todo - typeof is now obselete for IE 11, use some other method. | ||||
| 	 */ | ||||
| 	if (typeof HTMLFormElement.prototype.attachEvent !== 'undefined') { | ||||
| 		HTMLFormElement.prototype.attachEvent_ = HTMLFormElement.prototype.attachEvent; | ||||
| 		HTMLFormElement.prototype.attachEvent = function(eventType, fun) { | ||||
| 			if (eventType === 'onsubmit') { | ||||
| 				var wrapped = CSRFP._csrfpWrap(fun, this); | ||||
| 				this.attachEvent_(eventType, wrapped); | ||||
| 			} else { | ||||
| 				this.attachEvent_(eventType, fun); | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
|  | ||||
| 	//================================================================== | ||||
| 	// Wrapper for XMLHttpRequest & ActiveXObject (for IE 6 & below) | ||||
| 	// Set X-No-CSRF to true before sending if request method is  | ||||
| 	//================================================================== | ||||
|  | ||||
| 	/**  | ||||
| 	 * Wrapper to XHR open method | ||||
| 	 * Add a property method to XMLHttpRequst class | ||||
| 	 * @param: all parameters to XHR open method | ||||
| 	 * @return: object returned by default, XHR open method | ||||
| 	 */ | ||||
| 	function new_open(method, url, async, username, password) { | ||||
| 		this.method = method; | ||||
| 		var isAbsolute = (url.indexOf("./") === -1) ? true : false; | ||||
| 		if (!isAbsolute) { | ||||
| 			var base = location.protocol +'//' +location.host  | ||||
| 							+ location.pathname; | ||||
| 			url = CSRFP._getAbsolutePath(base, url); | ||||
| 		} | ||||
| 		if (method.toLowerCase() === 'get'  | ||||
| 			&& !CSRFP._isValidGetRequest(url)) { | ||||
| 			//modify the url | ||||
| 			if (url.indexOf('?') === -1) { | ||||
| 				url += "?" +CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey(); | ||||
| 			} else { | ||||
| 				url += "&" +CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey(); | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return this.old_open(method, url, async, username, password); | ||||
| 	} | ||||
|  | ||||
| 	/**  | ||||
| 	 * Wrapper to XHR send method | ||||
| 	 * Add query paramter to XHR object | ||||
| 	 * | ||||
| 	 * @param: all parameters to XHR send method | ||||
| 	 * | ||||
| 	 * @return: object returned by default, XHR send method | ||||
| 	 */ | ||||
| 	function new_send(data) { | ||||
| 		if (this.method.toLowerCase() === 'post') { | ||||
| 			if (data !== null && typeof data === 'object') { | ||||
| 				data.append(CSRFP.CSRFP_TOKEN, CSRFP._getAuthKey()); | ||||
| 			} else { | ||||
| 				if (typeof data != "undefined") { | ||||
| 					data += "&"; | ||||
| 				} else { | ||||
| 					data = ""; | ||||
| 				} | ||||
| 				data += CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey(); | ||||
| 			} | ||||
| 		} | ||||
| 		return this.old_send(data); | ||||
| 	} | ||||
|  | ||||
| 	if (window.XMLHttpRequest) { | ||||
| 		// Wrapping | ||||
| 		XMLHttpRequest.prototype.old_send = XMLHttpRequest.prototype.send; | ||||
| 		XMLHttpRequest.prototype.old_open = XMLHttpRequest.prototype.open; | ||||
| 		XMLHttpRequest.prototype.open = new_open; | ||||
| 		XMLHttpRequest.prototype.send = new_send; | ||||
| 	} | ||||
| 	if (typeof ActiveXObject !== 'undefined') { | ||||
| 		ActiveXObject.prototype.old_send = ActiveXObject.prototype.send; | ||||
| 		ActiveXObject.prototype.old_open = ActiveXObject.prototype.open; | ||||
| 		ActiveXObject.prototype.open = new_open; | ||||
| 		ActiveXObject.prototype.send = new_send;	 | ||||
| 	} | ||||
| 	//================================================================== | ||||
| 	// Rewrite existing urls ( Attach CSRF token ) | ||||
| 	// Rules: | ||||
| 	// Rewrite those urls which matches the regex sent by Server | ||||
| 	// Ignore cross origin urls & internal links (one with hashtags) | ||||
| 	// Append the token to those url already containig GET query parameter(s) | ||||
| 	// Add the token to those which does not contain GET query parameter(s) | ||||
| 	//================================================================== | ||||
|  | ||||
| 	for (var i = 0; i < document.links.length; i++) { | ||||
| 		document.links[i].addEventListener("mousedown", function(event) { | ||||
| 			var href = event.target.href; | ||||
| 			if(typeof href === "string") | ||||
| 			{ | ||||
| 				var urlDisect = href.split('#'); | ||||
| 				var url = urlDisect[0]; | ||||
| 				var hash = urlDisect[1]; | ||||
|  | ||||
| 				if(CSRFP._getDomain(url).indexOf(document.domain) === -1 | ||||
| 					|| CSRFP._isValidGetRequest(url)) { | ||||
| 					//cross origin or not to be protected by rules -- ignore | ||||
| 					return; | ||||
| 				} | ||||
|  | ||||
| 				if (url.indexOf('?') !== -1) { | ||||
| 					if(url.indexOf(CSRFP.CSRFP_TOKEN) === -1) { | ||||
| 						url += "&" +CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey(); | ||||
| 					} else { | ||||
| 						url = url.replace(new RegExp(CSRFP.CSRFP_TOKEN +"=.*?(&|$)", 'g'), | ||||
| 							CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey() + "$1"); | ||||
| 					} | ||||
| 				} else { | ||||
| 					url += "?" +CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey(); | ||||
| 				} | ||||
|  | ||||
| 				event.target.href = url; | ||||
| 				if (typeof hash !== 'undefined') { | ||||
| 					event.target.href += '#' +hash; | ||||
| 				} | ||||
| 			} | ||||
| 		}); | ||||
| 	} | ||||
|  | ||||
| } | ||||
|  | ||||
| window.addEventListener("DOMContentLoaded", function() { | ||||
| 	csrfprotector_init(); | ||||
| }, false); | ||||
| @@ -1,7 +0,0 @@ | ||||
| <?php | ||||
| /** | ||||
|  * OWASP CSRF Protector Project | ||||
|  * Code to redirect the user to previosus directory | ||||
|  * In case a user try to access this directory directly | ||||
|  */ | ||||
| header('location: ../index.php'); | ||||
| @@ -1,21 +0,0 @@ | ||||
| CSRFProtector configuration | ||||
| ========================================== | ||||
|  | ||||
|  - `CSRFP_TOKEN`: name of the csrf nonce, used for cookie or posting as argument. default: `csrfp_token` (if left blank) | ||||
|  - `logDirectory`: location of the directory at which log files will be saved **relative** to `config.php` file. This is required for file based logging (default), Not needed, in case you override logging function to implement your logging logic. (View [Overriding logging function](https://github.com/mebjas/CSRF-Protector-PHP/wiki/Overriding-logging-function)) | ||||
|  <br>**Default value:** `../log/` | ||||
|  - `failedAuthAction`: Action code (integer) for action to be taken in case of failed validation. Has two different values for bot `GET` and `POST`. Different action codes are specified as follows, (<br>**Default:** `0` for both `GET` & `POST`): | ||||
| *  `0` Send **403, Forbidden** Header | ||||
| *  `1` **Strip the POST/GET query** and forward the request! unset($_POST) | ||||
| *  `2` **Redirect to custom error page** mentioned in `errorRedirectionPage`  | ||||
| *  `3` **Show custom error message** to user, mentioned in `customErrorMessage`  | ||||
| *  `4` Send **500, Internal Server Error** header | ||||
|  | ||||
|  - `errorRedirectionPage`: **Absolute url** of the file to which user should be redirected. <br>**Default: null** | ||||
|  - `customErrorMessage`: **Error Message** to be shown to user. Only this text will be shown!<br>**Default: null** | ||||
|  - `jsPath`: location of the js file **relative** to `config.php`. <br>**Default:** `../js/csrfprotector.js` | ||||
|  - `jsUrl`: **Absolute url** of the js file. (See [Setting up](https://github.com/mebjas/CSRF-Protector-PHP/wiki/Setting-up-CSRF-Protector-PHP-in-your-web-application) for more information) | ||||
|  - `tokenLength`: length of csrfp token, Default `10` | ||||
|  - `secureCookie`: sets the "secure" HTTPS flag on the cookie. <br>**Default: `false`** | ||||
|  - `disabledJavascriptMessage`: messaged to be shown if js is disabled (string) | ||||
|  - `verifyGetFor`: regex rules for those urls for which csrfp validation should be enabled for `GET` requests also. (View [verifyGetFor rules](https://github.com/mebjas/CSRF-Protector-PHP/wiki/verifyGetFor-rules) for more information) | ||||
| @@ -1,47 +0,0 @@ | ||||
| <?php | ||||
| /** | ||||
|  * Configuration file for CSRF Protector | ||||
|  * Necessary configurations are (library would throw exception otherwise) | ||||
|  * ---- logDirectory | ||||
|  * ---- failedAuthAction | ||||
|  * ---- jsPath | ||||
|  * ---- jsUrl | ||||
|  * ---- tokenLength | ||||
|  */ | ||||
|  | ||||
| function get_trusted_hostname() { | ||||
|   $js_path = "/inc/lib/vendor/owasp/csrf-protector-php/js/csrfprotector.js"; | ||||
|   if ((isset($_SERVER['HTTP_X_FORWARDED_PROTO']) && strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == "https") || isset($_SERVER['HTTPS'])) { | ||||
|     $is_scheme = "https://"; | ||||
|   } | ||||
|   else { | ||||
|     $is_scheme = "http://"; | ||||
|   } | ||||
|   if (isset(explode(':', $_SERVER['HTTP_HOST'])[1])) { | ||||
|     $is_port = intval(explode(':', $_SERVER['HTTP_HOST'])[1]); | ||||
|     if (filter_var($is_port, FILTER_VALIDATE_INT, array("options" => array("min_range" =>1, "max_range" => 65535))) === false) { | ||||
|       return false; | ||||
|     } | ||||
|   } | ||||
|   if (!isset($is_port) || $is_port == 0) { | ||||
|     $is_port = ($is_scheme == "https://") ? 443 : 80; | ||||
|   } | ||||
|   return $is_scheme . $GLOBALS['mailcow_hostname'] . ':' . $is_port . $js_path; | ||||
| } | ||||
|  | ||||
| return array( | ||||
| 	"CSRFP_TOKEN" => "MAILCOW_CSRF", | ||||
| 	"logDirectory" => "../log", | ||||
| 	"failedAuthAction" => array( | ||||
| 		"GET" => 1, | ||||
| 		"POST" => 1), | ||||
| 	"errorRedirectionPage" => "", | ||||
| 	"customErrorMessage" => "", | ||||
| 	"jsPath" => "../js/csrfprotector.js", | ||||
|   // Fetching IS_HTTPS from sessions handler | ||||
| 	"jsUrl" => "/inc/lib/vendor/owasp/csrf-protector-php/js/csrfprotector.js", | ||||
| 	"tokenLength" => 10, | ||||
| 	"secureCookie" => false, | ||||
| 	"disabledJavascriptMessage" => "", | ||||
| 	 "verifyGetFor" => array() | ||||
| ); | ||||
| @@ -1,6 +0,0 @@ | ||||
| Placeholder for **CSRF Protector - php library** | ||||
| ===================================================== | ||||
|  | ||||
| **Dependency:** `None`<br> | ||||
| **Configuration-File:** `../config.php`<br> | ||||
| **Configuration-Format:** `PHP ARRAY`<br> | ||||
| @@ -1,536 +0,0 @@ | ||||
| <?php | ||||
|  | ||||
| if (!defined('__CSRF_PROTECTOR__')) { | ||||
| 	define('__CSRF_PROTECTOR__', true); 	// to avoid multiple declaration errors | ||||
|  | ||||
| 	// name of HTTP POST variable for authentication | ||||
| 	define("CSRFP_TOKEN","csrfp_token"); | ||||
|  | ||||
| 	// We insert token name and list of url patterns for which | ||||
| 	// GET requests are validated against CSRF as hidden input fields | ||||
| 	// these are the names of the input fields | ||||
| 	define("CSRFP_FIELD_TOKEN_NAME", "csrfp_hidden_data_token"); | ||||
| 	define("CSRFP_FIELD_URLS", "csrfp_hidden_data_urls"); | ||||
|  | ||||
| 	/** | ||||
| 	 * child exception classes | ||||
| 	 */ | ||||
| 	class configFileNotFoundException extends \exception {}; | ||||
| 	class logDirectoryNotFoundException extends \exception {}; | ||||
| 	class jsFileNotFoundException extends \exception {}; | ||||
| 	class logFileWriteError extends \exception {}; | ||||
| 	class baseJSFileNotFoundExceptio extends \exception {}; | ||||
| 	class incompleteConfigurationException extends \exception {}; | ||||
| 	class alreadyInitializedException extends \exception {}; | ||||
|  | ||||
| 	class csrfProtector | ||||
| 	{ | ||||
| 		/* | ||||
| 		 * Variable: $cookieExpiryTime | ||||
| 		 * expiry time for cookie | ||||
| 		 * @var int | ||||
| 		 */ | ||||
| 		public static $cookieExpiryTime = 1800;	//30 minutes | ||||
|  | ||||
| 		/* | ||||
| 		 * Variable: $isSameOrigin | ||||
| 		 * flag for cross origin/same origin request | ||||
| 		 * @var bool | ||||
| 		 */ | ||||
| 		private static $isSameOrigin = true; | ||||
|  | ||||
| 		/* | ||||
| 		 * Variable: $isValidHTML | ||||
| 		 * flag to check if output file is a valid HTML or not | ||||
| 		 * @var bool | ||||
| 		 */ | ||||
| 		private static $isValidHTML = false; | ||||
|  | ||||
| 		/* | ||||
| 		 * Variable: $requestType | ||||
| 		 * Varaible to store weather request type is post or get | ||||
| 		 * @var string | ||||
| 		 */ | ||||
| 		protected static $requestType = "GET"; | ||||
|  | ||||
| 		/* | ||||
| 		 * Variable: $config | ||||
| 		 * config file for CSRFProtector | ||||
| 		 * @var int Array, length = 6 | ||||
| 		 * Property: #1: failedAuthAction (int) => action to be taken in case autherisation fails | ||||
| 		 * Property: #2: logDirectory (string) => directory in which log will be saved | ||||
| 		 * Property: #3: customErrorMessage (string) => custom error message to be sent in case | ||||
| 		 *						of failed authentication | ||||
| 		 * Property: #4: jsFile (string) => location of the CSRFProtector js file | ||||
| 		 * Property: #5: tokenLength (int) => default length of hash | ||||
| 		 * Property: #6: disabledJavascriptMessage (string) => error message if client's js is disabled | ||||
| 		 */ | ||||
| 		public static $config = array(); | ||||
|  | ||||
| 		/* | ||||
| 		 * Variable: $requiredConfigurations | ||||
| 		 * Contains list of those parameters that are required to be there | ||||
| 		 * 	in config file for csrfp to work | ||||
| 		 */ | ||||
| 		public static $requiredConfigurations  = array('logDirectory', 'failedAuthAction', 'jsPath', 'jsUrl', 'tokenLength'); | ||||
| 		 | ||||
| 		/* | ||||
| 		 *	Function: init | ||||
| 	 	 * | ||||
| 		 *	function to initialise the csrfProtector work flow | ||||
| 		 * | ||||
| 		 *	Parameters: | ||||
| 		 *	$length - length of CSRF_AUTH_TOKEN to be generated | ||||
| 		 *	$action - int array, for different actions to be taken in case of failed validation | ||||
| 		 * | ||||
| 		 *	Returns: | ||||
| 		 *		void | ||||
| 		 * | ||||
| 		 *	Throws: | ||||
| 		 *		configFileNotFoundException - when configuration file is not found | ||||
| 		 * 		incompleteConfigurationException - when all required fields in config | ||||
| 		 *											file are not available | ||||
| 		 * | ||||
| 		 */ | ||||
| 		public static function init($length = null, $action = null) | ||||
| 		{ | ||||
| 			/* | ||||
| 			 * Check if init has already been called. | ||||
| 			 */ | ||||
| 			 if (count(self::$config) > 0) { | ||||
| 				 throw new alreadyInitializedException("OWASP CSRFProtector: library was already initialized."); | ||||
| 			 } | ||||
|  | ||||
| 			/* | ||||
| 			 * if mod_csrfp already enabled, no verification, no filtering | ||||
| 			 * Already done by mod_csrfp | ||||
| 			 */ | ||||
| 			if (getenv('mod_csrfp_enabled')) | ||||
| 				return; | ||||
|  | ||||
| 			//start session in case its not | ||||
| 			if (session_id() == '') | ||||
| 			    session_start(); | ||||
|  | ||||
| 			/* | ||||
| 			 * load configuration file and properties | ||||
| 			 * Check locally for a config.php then check for  | ||||
| 			 * a config/csrf_config.php file in the root folder | ||||
| 			 * for composer installations | ||||
| 			 */ | ||||
| 			$standard_config_location = __DIR__ ."/../config.php"; | ||||
| 			$composer_config_location = __DIR__ ."/../../../../../config/csrf_config.php"; | ||||
|  | ||||
| 			if (file_exists($standard_config_location)) { | ||||
| 				self::$config = include($standard_config_location); | ||||
| 			} elseif(file_exists($composer_config_location)) { | ||||
| 				self::$config = include($composer_config_location); | ||||
| 			} else { | ||||
| 				throw new configFileNotFoundException("OWASP CSRFProtector: configuration file not found for CSRFProtector!"); | ||||
| 			} | ||||
|  | ||||
| 			//overriding length property if passed in parameters | ||||
| 			if ($length != null) | ||||
| 				self::$config['tokenLength'] = intval($length); | ||||
| 			 | ||||
| 			//action that is needed to be taken in case of failed authorisation | ||||
| 			if ($action != null) | ||||
| 				self::$config['failedAuthAction'] = $action; | ||||
|  | ||||
| 			if (self::$config['CSRFP_TOKEN'] == '') | ||||
| 				self::$config['CSRFP_TOKEN'] = CSRFP_TOKEN; | ||||
|  | ||||
| 			// Validate the config if everythings filled out | ||||
| 			// TODO: collect all missing values and throw exception together | ||||
| 			foreach (self::$requiredConfigurations as $value) { | ||||
| 				if (!isset(self::$config[$value]) || self::$config[$value] == '') { | ||||
| 					throw new incompleteConfigurationException( | ||||
| 						sprintf( | ||||
| 							"OWASP CSRFProtector: Incomplete configuration file, Value: %s missing ", | ||||
| 							$value | ||||
| 						) | ||||
| 					); | ||||
| 					exit; | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			// Authorise the incoming request | ||||
| 			self::authorizePost(); | ||||
|  | ||||
| 			// Initialize output buffering handler | ||||
| 			if (!defined('__TESTING_CSRFP__')) | ||||
| 				ob_start('csrfProtector::ob_handler'); | ||||
|  | ||||
| 			if (!isset($_COOKIE[self::$config['CSRFP_TOKEN']]) | ||||
| 				|| !isset($_SESSION[self::$config['CSRFP_TOKEN']]) | ||||
| 				|| !is_array($_SESSION[self::$config['CSRFP_TOKEN']]) | ||||
| 				|| !in_array($_COOKIE[self::$config['CSRFP_TOKEN']], | ||||
| 					$_SESSION[self::$config['CSRFP_TOKEN']])) | ||||
| 				self::refreshToken(); | ||||
|  | ||||
| 			// Set protected by CSRF Protector header | ||||
| 			header('X-CSRF-Protection: OWASP CSRFP 1.0.0'); | ||||
| 		} | ||||
|  | ||||
| 		/* | ||||
| 		 * Function: authorizePost | ||||
| 		 * function to authorise incoming post requests | ||||
| 		 * | ||||
| 		 * Parameters:  | ||||
| 		 * void | ||||
| 		 * | ||||
| 		 * Returns:  | ||||
| 		 * void | ||||
| 		 * | ||||
| 		 * Throws:  | ||||
| 		 * logDirectoryNotFoundException - if log directory is not found | ||||
| 		 */ | ||||
| 		public static function authorizePost() | ||||
| 		{ | ||||
| 			//#todo this method is valid for same origin request only,  | ||||
| 			//enable it for cross origin also sometime | ||||
| 			//for cross origin the functionality is different | ||||
| 			if ($_SERVER['REQUEST_METHOD'] === 'POST') { | ||||
|  | ||||
| 				//set request type to POST | ||||
| 				self::$requestType = "POST"; | ||||
|  | ||||
| 				//currently for same origin only | ||||
| 				if (!(isset($_POST[self::$config['CSRFP_TOKEN']])  | ||||
| 					&& isset($_SESSION[self::$config['CSRFP_TOKEN']]) | ||||
| 					&& (self::isValidToken($_POST[self::$config['CSRFP_TOKEN']])) | ||||
| 					)) { | ||||
|  | ||||
| 					//action in case of failed validation | ||||
| 					self::failedValidationAction();			 | ||||
| 				} else { | ||||
| 					self::refreshToken();	//refresh token for successfull validation | ||||
| 				} | ||||
| 			} else if (!static::isURLallowed()) { | ||||
| 				 | ||||
| 				//currently for same origin only | ||||
| 				if (!(isset($_GET[self::$config['CSRFP_TOKEN']])  | ||||
| 					&& isset($_SESSION[self::$config['CSRFP_TOKEN']]) | ||||
| 					&& (self::isValidToken($_GET[self::$config['CSRFP_TOKEN']])) | ||||
| 					)) { | ||||
|  | ||||
| 					//action in case of failed validation | ||||
| 					self::failedValidationAction();			 | ||||
| 				} else { | ||||
| 					self::refreshToken();	//refresh token for successfull validation | ||||
| 				} | ||||
| 			}	 | ||||
| 		} | ||||
|  | ||||
| 		/* | ||||
| 		 * Function: isValidToken | ||||
| 		 * function to check the validity of token in session array | ||||
| 		 * Function also clears all tokens older than latest one | ||||
| 		 * | ||||
| 		 * Parameters:  | ||||
| 		 * $token - the token sent with GET or POST payload | ||||
| 		 * | ||||
| 		 * Returns:  | ||||
| 		 * bool - true if its valid else false | ||||
| 		 */ | ||||
| 		private static function isValidToken($token) { | ||||
| 			if (!isset($_SESSION[self::$config['CSRFP_TOKEN']])) return false; | ||||
| 			if (!is_array($_SESSION[self::$config['CSRFP_TOKEN']])) return false; | ||||
| 			foreach ($_SESSION[self::$config['CSRFP_TOKEN']] as $key => $value) { | ||||
| 				if ($value == $token) { | ||||
|  | ||||
| 					// Clear all older tokens assuming they have been consumed | ||||
| 					foreach ($_SESSION[self::$config['CSRFP_TOKEN']] as $_key => $_value) { | ||||
| 						if ($_value == $token) break; | ||||
| 						array_shift($_SESSION[self::$config['CSRFP_TOKEN']]); | ||||
| 					} | ||||
| 					return true; | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			return false; | ||||
| 		} | ||||
|  | ||||
| 		/* | ||||
| 		 * Function: failedValidationAction | ||||
| 		 * function to be called in case of failed validation | ||||
| 		 * performs logging and take appropriate action | ||||
| 		 * | ||||
| 		 * Parameters:  | ||||
| 		 * void | ||||
| 		 * | ||||
| 		 * Returns:  | ||||
| 		 * void | ||||
| 		 */ | ||||
| 		private static function failedValidationAction() | ||||
| 		{ | ||||
| 			if (!file_exists(__DIR__ ."/../" .self::$config['logDirectory'])) | ||||
| 				throw new logDirectoryNotFoundException("OWASP CSRFProtector: Log Directory Not Found!"); | ||||
| 		 | ||||
| 			//call the logging function | ||||
| 			static::logCSRFattack(); | ||||
|  | ||||
| 			//#todo: ask mentors if $failedAuthAction is better as an int or string | ||||
| 			//default case is case 0 | ||||
| 			switch (self::$config['failedAuthAction'][self::$requestType]) { | ||||
| 				case 0: | ||||
| 					//send 403 header | ||||
| 					header('HTTP/1.0 403 Forbidden'); | ||||
| 					exit("<h2>403 Access Forbidden by CSRFProtector!</h2>"); | ||||
| 					break; | ||||
| 				case 1: | ||||
| 					//unset the query parameters and forward | ||||
| 					if (self::$requestType === 'GET') { | ||||
| 						$_GET = array(); | ||||
| 					} else { | ||||
| 						$_POST = array(); | ||||
| 					} | ||||
| 					break; | ||||
| 				case 2: | ||||
| 					//redirect to custom error page | ||||
| 					$location  = self::$config['errorRedirectionPage']; | ||||
| 					header("location: $location"); | ||||
| 				case 3: | ||||
| 					//send custom error message | ||||
| 					exit(self::$config['customErrorMessage']); | ||||
| 					break; | ||||
| 				case 4: | ||||
| 					//send 500 header -- internal server error | ||||
| 					header($_SERVER['SERVER_PROTOCOL'] . ' 500 Internal Server Error', true, 500); | ||||
| 					exit("<h2>500 Internal Server Error!</h2>"); | ||||
| 					break; | ||||
| 				default: | ||||
| 					//unset the query parameters and forward | ||||
| 					if (self::$requestType === 'GET') { | ||||
| 						$_GET = array(); | ||||
| 					} else { | ||||
| 						$_POST = array(); | ||||
| 					} | ||||
| 					break; | ||||
| 			}		 | ||||
| 		} | ||||
|  | ||||
| 		/* | ||||
| 		 * Function: refreshToken | ||||
| 		 * Function to set auth cookie | ||||
| 		 * | ||||
| 		 * Parameters:  | ||||
| 		 * void | ||||
| 		 * | ||||
| 		 * Returns:  | ||||
| 		 * void | ||||
| 		 */ | ||||
| 		public static function refreshToken() | ||||
| 		{ | ||||
| 			$token = self::generateAuthToken(); | ||||
|  | ||||
| 			if (!isset($_SESSION[self::$config['CSRFP_TOKEN']]) | ||||
| 				|| !is_array($_SESSION[self::$config['CSRFP_TOKEN']])) | ||||
| 				$_SESSION[self::$config['CSRFP_TOKEN']] = array(); | ||||
|  | ||||
| 			//set token to session for server side validation | ||||
| 			array_push($_SESSION[self::$config['CSRFP_TOKEN']], $token); | ||||
|  | ||||
| 			//set token to cookie for client side processing | ||||
| 			setcookie(self::$config['CSRFP_TOKEN'],  | ||||
| 				$token,  | ||||
| 				time() + self::$cookieExpiryTime, | ||||
| 				'', | ||||
| 				'', | ||||
| 				(array_key_exists('secureCookie', self::$config) ? (bool)self::$config['secureCookie'] : false)); | ||||
| 		} | ||||
|  | ||||
| 		/* | ||||
| 		 * Function: generateAuthToken | ||||
| 		 * function to generate random hash of length as given in parameter | ||||
| 		 * max length = 128 | ||||
| 		 * | ||||
| 		 * Parameters:  | ||||
| 		 * length to hash required, int | ||||
| 		 * | ||||
| 		 * Returns: | ||||
| 		 * string, token | ||||
| 		 */ | ||||
| 		public static function generateAuthToken() | ||||
| 		{ | ||||
| 			// todo - make this a member method / configurable | ||||
| 			$randLength = 64; | ||||
| 			 | ||||
| 			//if config tokenLength value is 0 or some non int | ||||
| 			if (intval(self::$config['tokenLength']) == 0) { | ||||
| 				self::$config['tokenLength'] = 32;	//set as default | ||||
| 			} | ||||
|  | ||||
| 			//#todo - if $length > 128 throw exception  | ||||
|  | ||||
| 			if (function_exists("random_bytes")) { | ||||
| 				$token = bin2hex(random_bytes($randLength)); | ||||
| 			} elseif (function_exists("openssl_random_pseudo_bytes")) { | ||||
| 				$token = bin2hex(openssl_random_pseudo_bytes($randLength)); | ||||
| 			} else { | ||||
| 				$token = ''; | ||||
| 				for ($i = 0; $i < 128; ++$i) { | ||||
| 					$r = mt_rand (0, 35); | ||||
| 					if ($r < 26) { | ||||
| 						$c = chr(ord('a') + $r); | ||||
| 					} else {  | ||||
| 						$c = chr(ord('0') + $r - 26); | ||||
| 					} | ||||
| 					$token .= $c; | ||||
| 				} | ||||
| 			} | ||||
| 			return substr($token, 0, self::$config['tokenLength']); | ||||
| 		} | ||||
|  | ||||
| 		/* | ||||
| 		 * Function: ob_handler | ||||
| 		 * Rewrites <form> on the fly to add CSRF tokens to them. This can also | ||||
| 		 * inject our JavaScript library. | ||||
| 		 * | ||||
| 		 * Parameters:  | ||||
| 		 * $buffer - output buffer to which all output are stored | ||||
| 		 * $flag - INT | ||||
| 		 * | ||||
| 		 * Return: | ||||
| 		 * string, complete output buffer | ||||
| 		 */ | ||||
| 		public static function ob_handler($buffer, $flags) | ||||
| 		{ | ||||
| 			// Even though the user told us to rewrite, we should do a quick heuristic | ||||
| 		    // to check if the page is *actually* HTML. We don't begin rewriting until | ||||
| 		    // we hit the first <html tag. | ||||
| 		    if (!self::$isValidHTML) { | ||||
| 		        // not HTML until proven otherwise | ||||
| 		        if (stripos($buffer, '<html') !== false) { | ||||
| 		            self::$isValidHTML = true;  | ||||
| 		        } else { | ||||
| 		            return $buffer; | ||||
| 		        } | ||||
| 		    } | ||||
| 		     | ||||
| 		    // TODO: statically rewrite all forms as well so that if a form is submitted | ||||
| 		    // before the js has worked on, it will still have token to send | ||||
| 		    // @priority: medium @labels: important @assign: mebjas | ||||
| 		    // @deadline: 1 week | ||||
|  | ||||
| 		    //add a <noscript> message to outgoing HTML output, | ||||
| 		    //informing the user to enable js for CSRFProtector to work | ||||
| 		    //best section to add, after <body> tag | ||||
| 		    $buffer = preg_replace("/<body[^>]*>/", "$0 <noscript>" .self::$config['disabledJavascriptMessage'] . | ||||
| 		    	"</noscript>", $buffer); | ||||
|  | ||||
| 		    $hiddenInput = '<input type="hidden" id="' . CSRFP_FIELD_TOKEN_NAME.'" value="'  | ||||
| 		    				.self::$config['CSRFP_TOKEN'] .'">' .PHP_EOL; | ||||
|  | ||||
| 		    $hiddenInput .= '<input type="hidden" id="' .CSRFP_FIELD_URLS .'" value=\'' | ||||
| 		    				.json_encode(self::$config['verifyGetFor']) .'\'>'; | ||||
|  | ||||
| 		    //implant hidden fields with check url information for reading in javascript | ||||
| 	        $buffer = str_ireplace('</body>', $hiddenInput . '</body>', $buffer); | ||||
|  | ||||
| 		    //implant the CSRFGuard js file to outgoing script | ||||
| 		    $script = '<script type="text/javascript" src="' . self::$config['jsUrl'] . '"></script>' . PHP_EOL; | ||||
| 		    $buffer = str_ireplace('</body>', $script . '</body>', $buffer, $count); | ||||
|  | ||||
| 		    if (!$count) | ||||
| 		        $buffer .= $script; | ||||
|  | ||||
| 		    return $buffer; | ||||
| 		} | ||||
|  | ||||
| 		/* | ||||
| 		 * Function: logCSRFattack | ||||
| 		 * Function to log CSRF Attack | ||||
| 		 *  | ||||
| 		 * Parameters:  | ||||
| 		 * void | ||||
| 		 * | ||||
| 		 * Retruns:  | ||||
| 		 * void | ||||
| 		 * | ||||
| 		 * Throws:  | ||||
| 		 * logFileWriteError - if unable to log an attack | ||||
| 		 */ | ||||
| 		protected static function logCSRFattack() | ||||
| 		{ | ||||
| 			//if file doesnot exist for, create it | ||||
| 			$logFile = fopen(__DIR__ ."/../" .self::$config['logDirectory'] | ||||
| 			."/" .date("m-20y") .".log", "a+"); | ||||
| 			 | ||||
| 			//throw exception if above fopen fails | ||||
| 			if (!$logFile) | ||||
| 				throw new logFileWriteError("OWASP CSRFProtector: Unable to write to the log file");	 | ||||
|  | ||||
| 			//miniature version of the log | ||||
| 			$log = array(); | ||||
| 			$log['timestamp'] = time(); | ||||
| 			$log['HOST'] = $_SERVER['HTTP_HOST']; | ||||
| 			$log['REQUEST_URI'] = $_SERVER['REQUEST_URI']; | ||||
| 			$log['requestType'] = self::$requestType; | ||||
|  | ||||
| 			if (self::$requestType === "GET") | ||||
| 				$log['query'] = $_GET; | ||||
| 			else | ||||
| 				$log['query'] = $_POST; | ||||
|  | ||||
| 			$log['cookie'] = $_COOKIE; | ||||
|  | ||||
| 			//convert log array to JSON format to be logged | ||||
| 			$log = json_encode($log) .PHP_EOL; | ||||
|  | ||||
| 			//append log to the file | ||||
| 			fwrite($logFile, $log); | ||||
|  | ||||
| 			//close the file handler | ||||
| 			fclose($logFile); | ||||
| 		} | ||||
|  | ||||
| 		/* | ||||
| 		 * Function: getCurrentUrl | ||||
| 		 * Function to return current url of executing page | ||||
| 		 *  | ||||
| 		 * Parameters:  | ||||
| 		 * void | ||||
| 		 * | ||||
| 		 * Returns:  | ||||
| 		 * string - current url | ||||
| 		 */ | ||||
| 		private static function getCurrentUrl() | ||||
| 		{ | ||||
| 			$request_scheme = 'https'; | ||||
|  | ||||
| 			if (isset($_SERVER['REQUEST_SCHEME'])) { | ||||
| 				$request_scheme = $_SERVER['REQUEST_SCHEME']; | ||||
| 			} else { | ||||
| 				if (isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] === 'on') { | ||||
| 					$request_scheme = 'https'; | ||||
| 				} else { | ||||
| 					$request_scheme = 'http'; | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			return $request_scheme . '://' . $_SERVER['HTTP_HOST'] . $_SERVER['PHP_SELF']; | ||||
| 		} | ||||
|  | ||||
| 		/* | ||||
| 		 * Function: isURLallowed | ||||
| 		 * Function to check if a url mataches for any urls | ||||
| 		 * Listed in config file | ||||
| 		 * | ||||
| 		 * Parameters:  | ||||
| 		 * void | ||||
| 		 * | ||||
| 		 * Returns:  | ||||
| 		 * boolean - true is url need no validation, false if validation needed | ||||
| 		 */   | ||||
| 		public static function isURLallowed() { | ||||
| 			foreach (self::$config['verifyGetFor'] as $key => $value) { | ||||
| 				$value = str_replace(array('/','*'), array('\/','(.*)'), $value); | ||||
| 				preg_match('/' .$value .'/', self::getCurrentUrl(), $output); | ||||
| 				if (count($output) > 0) | ||||
| 					return false; | ||||
| 			} | ||||
| 			return true; | ||||
| 		} | ||||
| 	}; | ||||
| } | ||||
| @@ -1,7 +0,0 @@ | ||||
| <?php | ||||
| /** | ||||
|  * OWASP CSRF Protector Project | ||||
|  * Code to redirect the user to previosus directory | ||||
|  * In case a user try to access this directory directly | ||||
|  */ | ||||
| header('location: ../index.php'); | ||||
| @@ -1,7 +0,0 @@ | ||||
| <?php | ||||
| /** | ||||
|  * OWASP CSRF Protector Project | ||||
|  * Code to redirect the user to previosus directory | ||||
|  * In case a user try to access this directory directly | ||||
|  */ | ||||
| header('location: ../index.php'); | ||||
| @@ -1,13 +0,0 @@ | ||||
| Copyright 2014 OWASP Foundation | ||||
|  | ||||
| Licensed under the Apache License, Version 2.0 (the "License"); | ||||
| you may not use this file except in compliance with the License. | ||||
| You may obtain a copy of the License at | ||||
|  | ||||
|     http://www.apache.org/licenses/LICENSE-2.0 | ||||
|  | ||||
| Unless required by applicable law or agreed to in writing, software | ||||
| distributed under the License is distributed on an "AS IS" BASIS, | ||||
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||||
| See the License for the specific language governing permissions and | ||||
| limitations under the License. | ||||
| @@ -1 +0,0 @@ | ||||
| deny from all | ||||
| @@ -1,7 +0,0 @@ | ||||
| <?php | ||||
| /** | ||||
|  * OWASP CSRF Protector Project | ||||
|  * Code to redirect the user to previosus directory | ||||
|  * In case a user try to access this directory directly | ||||
|  */ | ||||
| header('location: ../index.php'); | ||||
| @@ -1,15 +0,0 @@ | ||||
| <?xml version="1.0" encoding="UTF-8"?> | ||||
| <phpunit verbose="true"> | ||||
|     <php> | ||||
|         <ini name="memory_limit" value="1024M" /> | ||||
|         <ini name="error_reporting" value="E_ALL"/> | ||||
|     </php> | ||||
|     <testsuite name="OWASP CSRF Protector php"> | ||||
|         <directory>./test/csrfprotector_test.php</directory> | ||||
|     </testsuite> | ||||
|     <filter> | ||||
|         <whitelist processUncoveredFilesFromWhitelist="true"> | ||||
|         <file>libs/csrf/csrfprotector.php</file> | ||||
|         </whitelist> | ||||
|     </filter> | ||||
| </phpunit> | ||||
| @@ -1,65 +0,0 @@ | ||||
| CSRF Protector | ||||
| ========================== | ||||
| [](http://todofy.org/r/mebjas/CSRF-Protector-PHP) [](https://travis-ci.org/mebjas/CSRF-Protector-PHP)  [](https://codecov.io/gh/mebjas/CSRF-Protector-PHP) | ||||
| <br>CSRF protector php, a standalone php library for csrf mitigation in web applications. Easy to integrate in any php web app.  | ||||
|  | ||||
| Add to your project using packagist | ||||
| ========== | ||||
|  Add a `composer.json` file to your project directory | ||||
|  ```json | ||||
|  { | ||||
|     "require": { | ||||
|         "owasp/csrf-protector-php": "dev-master" | ||||
|     } | ||||
| } | ||||
| ``` | ||||
| Then open terminal (or command prompt), move to project directory and run | ||||
| ```shell | ||||
| composer install | ||||
| ``` | ||||
| OR | ||||
| ``` | ||||
| php composer.phar install | ||||
| ``` | ||||
| This will add CSRFP (library will be downloaded at ./vendor/owasp/csrf-protector-php) to your project directory. View [packagist.org](https://packagist.org/) for more help with composer! | ||||
|  | ||||
| Configuration | ||||
| ========== | ||||
| For composer installations: Copy the config.sample.php file into your root folder at config/csrf_config.php | ||||
| For non-composer installations: Copy the libs/csrf/config.sample.php file into libs/csrc/config.php | ||||
| Edit config accordingly. See Detailed Information link below. | ||||
|  | ||||
| How to use | ||||
| ========== | ||||
| ```php | ||||
| <?php | ||||
| include_once __DIR__ .'/vendor/owasp/csrf-protector-php/libs/csrf/csrfprotector.php'; | ||||
|  | ||||
| //Initialise CSRFGuard library | ||||
| csrfProtector::init(); | ||||
| ``` | ||||
| simply include the library and call the `init()` function! | ||||
|  | ||||
| ### Detailed information @[Project wiki on github](https://github.com/mebjas/CSRF-Protector-PHP/wiki) | ||||
|  | ||||
| ### More information @[OWASP wiki](https://www.owasp.org/index.php/CSRFProtector_Project) | ||||
|  | ||||
| ### Contribute | ||||
|  | ||||
| * Fork the repo | ||||
| * Create your branch | ||||
| * Commit your changes | ||||
| * Create a pull request | ||||
|  | ||||
| ### Note | ||||
| This version (`master`) requires the clients to have Javascript enabled. However if your application can work without javascript & you require a nojs version of this library, check our [nojs version](https://github.com/mebjas/CSRF-Protector-PHP/tree/nojs-support) | ||||
|  | ||||
| ## Discussion | ||||
| Join Discussions on the [mailing list](https://lists.owasp.org/mailman/listinfo/owasp-csrfprotector) | ||||
|  | ||||
| For any other queries contact me at: **minhaz@owasp.org** | ||||
|  | ||||
| ### FAQ: | ||||
| 1. What happens if token expires? - https://github.com/mebjas/CSRF-Protector-PHP/wiki/what-if-token-expires | ||||
| 2. Secure flag in cookie? - https://github.com/mebjas/CSRF-Protector-PHP/issues/54 | ||||
| 3. NoJS support? - https://github.com/mebjas/CSRF-Protector-PHP/tree/nojs-support | ||||
| @@ -1,27 +0,0 @@ | ||||
| <?php | ||||
| /** | ||||
|  * Configuration file for CSRF Protector | ||||
|  * Necessary configurations are (library would throw exception otherwise) | ||||
|  * ---- logDirectory | ||||
|  * ---- failedAuthAction | ||||
|  * ---- jsPath | ||||
|  * ---- jsUrl | ||||
|  * ---- tokenLength | ||||
|  */ | ||||
| return array( | ||||
| 	"CSRFP_TOKEN" => "csrfp_token", | ||||
| 	"logDirectory" => "../log", | ||||
| 	"failedAuthAction" => array( | ||||
| 		"GET" => 0, | ||||
| 		"POST" => 0), | ||||
| 	"errorRedirectionPage" => "", | ||||
| 	"customErrorMessage" => "", | ||||
| 	"jsPath" => "../js/csrfprotector.js", | ||||
| 	"jsUrl" => "http://localhost/csrfp/js/csrfprotector.js", | ||||
| 	"tokenLength" => 10, | ||||
| 	"secureCookie" => false, | ||||
| 	"disabledJavascriptMessage" => "This site attempts to protect users against <a href=\"https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29\"> | ||||
| 	Cross-Site Request Forgeries </a> attacks. In order to do so, you must have JavaScript enabled in your web browser otherwise this site will fail to work correctly for you. | ||||
| 	 See details of your web browser for how to enable JavaScript.", | ||||
| 	 "verifyGetFor" => array() | ||||
| ); | ||||
| @@ -1,534 +0,0 @@ | ||||
| <?php | ||||
| date_default_timezone_set('UTC'); | ||||
| require_once __DIR__ .'/../libs/csrf/csrfprotector.php'; | ||||
|  | ||||
| if (intval(phpversion('tidy')) >= 7 && !class_exists('\PHPUnit_Framework_TestCase', true)) { | ||||
|     class_alias('\PHPUnit\Framework\TestCase', '\PHPUnit_Framework_TestCase'); | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * Wrapper class for testing purpose | ||||
|  */ | ||||
| class csrfp_wrapper extends csrfprotector | ||||
| { | ||||
|     /** | ||||
|      * Function to provide wrapper methode to set the protected var, requestType | ||||
|      */ | ||||
|     public static function changeRequestType($type) | ||||
|     { | ||||
|         self::$requestType = $type; | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * Function to check for a string value anywhere within HTTP response headers | ||||
|      * Returns true on first match of $needle in header names or values | ||||
|      */ | ||||
|     public static function checkHeader($needle) | ||||
|     { | ||||
|         $haystack = xdebug_get_headers(); | ||||
|         foreach ($haystack as $key => $value) { | ||||
|             if (strpos($value, $needle) !== false) | ||||
|                 return true; | ||||
|         } | ||||
|         return false; | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * Function to return the string value of the last response header | ||||
|      * identified by name $needle | ||||
|      */ | ||||
|     public static function getHeaderValue($needle) | ||||
|     { | ||||
|         $haystack = xdebug_get_headers(); | ||||
|         foreach ($haystack as $key => $value) { | ||||
|             if (strpos($value, $needle) === 0) { | ||||
|                 // Deliberately overwrite to accept the last rather than first match | ||||
|                 // as xdebug_get_headers() will accumulate all set headers | ||||
|                 list(,$hvalue) = explode(':', $value, 2); | ||||
|             } | ||||
|         } | ||||
|         return $hvalue; | ||||
|     }  | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * helper methods | ||||
|  */ | ||||
| class Helper { | ||||
|     /** | ||||
|      * Function to recusively delete a dir | ||||
|      */ | ||||
|     public static function delTree($dir) {  | ||||
|         $files = array_diff(scandir($dir), array('.','..'));  | ||||
|         foreach ($files as $file) {  | ||||
|             (is_dir("$dir/$file")) ? delTree("$dir/$file") : unlink("$dir/$file");  | ||||
|         }  | ||||
|         return rmdir($dir);  | ||||
|     } | ||||
| } | ||||
|  | ||||
|  | ||||
| /** | ||||
|  * main test class | ||||
|  */ | ||||
| class csrfp_test extends PHPUnit_Framework_TestCase | ||||
| { | ||||
|     /** | ||||
|      * @var to hold current configurations | ||||
|      */ | ||||
|     protected $config = array(); | ||||
|  | ||||
|     /** | ||||
|      * @var log directory for testing | ||||
|      */ | ||||
|     private $logDir; | ||||
|  | ||||
|     /** | ||||
|      * Function to be run before every test*() functions. | ||||
|      */ | ||||
|     public function setUp() | ||||
|     { | ||||
|         $this->logDir = __DIR__ .'/logs'; | ||||
|  | ||||
|         csrfprotector::$config['jsPath'] = '../js/csrfprotector.js'; | ||||
|         csrfprotector::$config['CSRFP_TOKEN'] = 'csrfp_token'; | ||||
|         csrfprotector::$config['secureCookie'] = false; | ||||
|         csrfprotector::$config['logDirectory'] = '../test/logs'; | ||||
|  | ||||
|         $_SERVER['REQUEST_URI'] = 'temp';       // For logging | ||||
|         $_SERVER['REQUEST_SCHEME'] = 'http';    // For authorizePost | ||||
|         $_SERVER['HTTP_HOST'] = 'test';         // For isUrlAllowed | ||||
|         $_SERVER['PHP_SELF'] = '/index.php';     // For authorizePost | ||||
|         $_POST[csrfprotector::$config['CSRFP_TOKEN']] | ||||
|           = $_GET[csrfprotector::$config['CSRFP_TOKEN']] = '123'; | ||||
|  | ||||
|         //token mismatch - leading to failed validation | ||||
|         $_SESSION[csrfprotector::$config['CSRFP_TOKEN']] = array('abc'); | ||||
|         $_SERVER['SERVER_PROTOCOL'] = 'HTTP/1.1'; | ||||
|         $_SERVER['HTTPS'] = null; | ||||
|  | ||||
|         $this->config = include(__DIR__ .'/config.test.php'); | ||||
|  | ||||
|         // Create an instance of config file -- for testing | ||||
|         $data = file_get_contents(__DIR__ .'/config.test.php'); | ||||
|         file_put_contents(__DIR__ .'/../libs/config.php', $data); | ||||
|  | ||||
|         if (!defined('__TESTING_CSRFP__')) define('__TESTING_CSRFP__', true); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * tearDown() | ||||
|      */ | ||||
|     public function tearDown() | ||||
|     { | ||||
|         unlink(__DIR__ .'/../libs/config.php'); | ||||
|         if (is_dir(__DIR__ .'/logs')) | ||||
|             Helper::delTree(__DIR__ .'/logs'); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * Function to check refreshToken() functionality | ||||
|      */ | ||||
|     public function testRefreshToken() | ||||
|     { | ||||
|         $val = $_COOKIE[csrfprotector::$config['CSRFP_TOKEN']] = '123abcd'; | ||||
|         $_SESSION[csrfprotector::$config['CSRFP_TOKEN']] = array('123abcd'); | ||||
|         csrfProtector::$config['tokenLength'] = 20; | ||||
|         csrfProtector::refreshToken(); | ||||
|  | ||||
|         $this->assertTrue(strcmp($val, $_SESSION[csrfprotector::$config['CSRFP_TOKEN']][1]) != 0); | ||||
|  | ||||
|         $this->assertTrue(csrfP_wrapper::checkHeader('Set-Cookie')); | ||||
|         $this->assertTrue(csrfP_wrapper::checkHeader('csrfp_token')); | ||||
|         $this->assertTrue(csrfp_wrapper::checkHeader($_SESSION[csrfprotector::$config['CSRFP_TOKEN']][1])); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test secure flag is set in the token cookie when requested | ||||
|      */ | ||||
|     public function testSecureCookie() | ||||
|     { | ||||
|         $_SERVER['REQUEST_METHOD'] = 'POST'; | ||||
|         $_SESSION[csrfprotector::$config['CSRFP_TOKEN']] = array('123abcd'); | ||||
|  | ||||
|         csrfprotector::$config['secureCookie'] = false; | ||||
|         csrfprotector::refreshToken(); | ||||
|         $this->assertNotRegExp('/; secure/', csrfp_wrapper::getHeaderValue('Set-Cookie')); | ||||
|  | ||||
|         csrfprotector::$config['secureCookie'] = true; | ||||
|         csrfprotector::refreshToken(); | ||||
|         $this->assertRegExp('/; secure/', csrfp_wrapper::getHeaderValue('Set-Cookie')); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test authorise post -> log directory exception | ||||
|      */ | ||||
|     public function testAuthorisePost_logdirException() | ||||
|     { | ||||
|         $_SERVER['REQUEST_METHOD'] = 'POST'; | ||||
|         csrfprotector::$config['logDirectory'] = 'unknown_location'; | ||||
|  | ||||
|         try { | ||||
|             csrfprotector::authorizePost(); | ||||
|         } catch (logDirectoryNotFoundException $ex) { | ||||
|             $this->assertTrue(true); | ||||
|             return;; | ||||
|         } | ||||
|         $this->fail('logDirectoryNotFoundException has not been raised.'); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test authorise post -> action = 403, forbidden | ||||
|      */ | ||||
|     public function testAuthorisePost_failedAction_1() | ||||
|     { | ||||
|         $_SERVER['REQUEST_METHOD'] = 'POST'; | ||||
|         csrfprotector::$config['verifyGetFor'] = array('http://test/index*'); | ||||
|         csrfprotector::$config['logDirectory'] = '../log'; | ||||
|         csrfprotector::$config['failedAuthAction']['POST'] = 0; | ||||
|         csrfprotector::$config['failedAuthAction']['GET'] = 0; | ||||
|  | ||||
|         //csrfprotector::authorizePost(); | ||||
|         $this->markTestSkipped('Cannot add tests as code exit here'); | ||||
|  | ||||
|         $_SERVER['REQUEST_METHOD'] = 'GET'; | ||||
|         csrfp_wrapper::changeRequestType('GET'); | ||||
|         //csrfprotector::authorizePost(); | ||||
|  | ||||
|         $this->markTestSkipped('Cannot add tests as code exit here'); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test authorise post -> strip $_GET, $_POST | ||||
|      */ | ||||
|     public function testAuthorisePost_failedAction_2() | ||||
|     { | ||||
|         $_SERVER['REQUEST_METHOD'] = 'POST'; | ||||
|  | ||||
|         csrfprotector::$config['logDirectory'] = '../log'; | ||||
|         csrfprotector::$config['verifyGetFor'] = array('http://test/index*'); | ||||
|         csrfprotector::$config['failedAuthAction']['POST'] = 1; | ||||
|         csrfprotector::$config['failedAuthAction']['GET'] = 1; | ||||
|  | ||||
|         $_POST = array('param1' => 1, 'param2' => 2); | ||||
|         csrfprotector::authorizePost(); | ||||
|         $this->assertEmpty($_POST); | ||||
|  | ||||
|         $_SERVER['REQUEST_METHOD'] = 'GET'; | ||||
|         csrfp_wrapper::changeRequestType('GET'); | ||||
|         $_GET = array('param1' => 1, 'param2' => 2); | ||||
|  | ||||
|         csrfprotector::authorizePost(); | ||||
|         $this->assertEmpty($_GET); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test authorise post -> redirect | ||||
|      */ | ||||
|     public function testAuthorisePost_failedAction_3() | ||||
|     { | ||||
|         $_SERVER['REQUEST_METHOD'] = 'POST'; | ||||
|  | ||||
|         csrfprotector::$config['logDirectory'] = '../log'; | ||||
|         csrfprotector::$config['verifyGetFor'] = array('http://test/index*'); | ||||
|         csrfprotector::$config['errorRedirectionPage'] = 'http://test'; | ||||
|         csrfprotector::$config['failedAuthAction']['POST'] = 2; | ||||
|         csrfprotector::$config['failedAuthAction']['GET'] = 2; | ||||
|  | ||||
|         //csrfprotector::authorizePost(); | ||||
|         $this->markTestSkipped('Cannot add tests as code exit here'); | ||||
|  | ||||
|         $_SERVER['REQUEST_METHOD'] = 'GET'; | ||||
|         csrfp_wrapper::changeRequestType('GET'); | ||||
|         //csrfprotector::authorizePost(); | ||||
|         $this->markTestSkipped('Cannot add tests as code exit here'); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test authorise post -> error message & exit | ||||
|      */ | ||||
|     public function testAuthorisePost_failedAction_4() | ||||
|     { | ||||
|         $_SERVER['REQUEST_METHOD'] = 'POST'; | ||||
|  | ||||
|         csrfprotector::$config['logDirectory'] = '../log'; | ||||
|         csrfprotector::$config['verifyGetFor'] = array('http://test/index*'); | ||||
|         csrfprotector::$config['customErrorMessage'] = 'custom error message'; | ||||
|         csrfprotector::$config['failedAuthAction']['POST'] = 3; | ||||
|         csrfprotector::$config['failedAuthAction']['POST'] = 3; | ||||
|  | ||||
|         //csrfprotector::authorizePost(); | ||||
|         $this->markTestSkipped('Cannot add tests as code exit here'); | ||||
|  | ||||
|         $_SERVER['REQUEST_METHOD'] = 'GET'; | ||||
|         csrfp_wrapper::changeRequestType('GET'); | ||||
|         //csrfprotector::authorizePost(); | ||||
|         $this->markTestSkipped('Cannot add tests as code exit here'); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test authorise post -> 500 internal server error | ||||
|      */ | ||||
|     public function testAuthorisePost_failedAction_5() | ||||
|     { | ||||
|         $_SERVER['REQUEST_METHOD'] = 'POST'; | ||||
|  | ||||
|         csrfprotector::$config['logDirectory'] = '../log'; | ||||
|         csrfprotector::$config['verifyGetFor'] = array('http://test/index*'); | ||||
|         csrfprotector::$config['failedAuthAction']['POST'] = 4; | ||||
|         csrfprotector::$config['failedAuthAction']['GET'] = 4; | ||||
|  | ||||
|         //csrfprotector::authorizePost(); | ||||
|         //$this->markTestSkipped('Cannot add tests as code exit here'); | ||||
|  | ||||
|         $_SERVER['REQUEST_METHOD'] = 'GET'; | ||||
|         csrfp_wrapper::changeRequestType('GET'); | ||||
|         //csrfprotector::authorizePost(); | ||||
|         //csrfp_wrapper::checkHeader('500'); | ||||
|         //$this->markTestSkipped('Cannot add tests as code exit here'); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test authorise post -> default action: strip $_GET, $_POST | ||||
|      */ | ||||
|     public function testAuthorisePost_failedAction_6() | ||||
|     { | ||||
|         $_SERVER['REQUEST_METHOD'] = 'POST'; | ||||
|  | ||||
|         csrfprotector::$config['logDirectory'] = '../log'; | ||||
|         csrfprotector::$config['verifyGetFor'] = array('http://test/index*'); | ||||
|         csrfprotector::$config['failedAuthAction']['POST'] = 10; | ||||
|         csrfprotector::$config['failedAuthAction']['GET'] = 10; | ||||
|  | ||||
|         $_POST = array('param1' => 1, 'param2' => 2); | ||||
|         csrfprotector::authorizePost(); | ||||
|         $this->assertEmpty($_POST); | ||||
|  | ||||
|         $_SERVER['REQUEST_METHOD'] = 'GET'; | ||||
|         csrfp_wrapper::changeRequestType('GET'); | ||||
|         $_GET = array('param1' => 1, 'param2' => 2); | ||||
|  | ||||
|         csrfprotector::authorizePost(); | ||||
|         $this->assertEmpty($_GET); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test authorise success | ||||
|      */ | ||||
|     public function testAuthorisePost_success() | ||||
|     { | ||||
|  | ||||
|         $_SERVER['REQUEST_METHOD'] = 'POST'; | ||||
|         $_POST[csrfprotector::$config['CSRFP_TOKEN']] | ||||
|             = $_GET[csrfprotector::$config['CSRFP_TOKEN']] | ||||
|             = $_SESSION[csrfprotector::$config['CSRFP_TOKEN']][0]; | ||||
|         $temp = $_SESSION[csrfprotector::$config['CSRFP_TOKEN']]; | ||||
|  | ||||
|         csrfprotector::authorizePost(); //will create new session and cookies | ||||
|         $this->assertFalse($temp == $_SESSION[csrfprotector::$config['CSRFP_TOKEN']][0]); | ||||
|         $this->assertTrue(csrfp_wrapper::checkHeader('Set-Cookie')); | ||||
|         $this->assertTrue(csrfp_wrapper::checkHeader('csrfp_token')); | ||||
|         // $this->assertTrue(csrfp_wrapper::checkHeader($_SESSION[csrfprotector::$config['CSRFP_TOKEN']][0]));  // Combine these 3 later | ||||
|  | ||||
|         // For get method | ||||
|         $_SERVER['REQUEST_METHOD'] = 'GET'; | ||||
|         csrfp_wrapper::changeRequestType('GET'); | ||||
|         $_POST[csrfprotector::$config['CSRFP_TOKEN']] | ||||
|             = $_GET[csrfprotector::$config['CSRFP_TOKEN']] | ||||
|             = $_SESSION[csrfprotector::$config['CSRFP_TOKEN']][0]; | ||||
|         $temp = $_SESSION[csrfprotector::$config['CSRFP_TOKEN']]; | ||||
|  | ||||
|         csrfprotector::authorizePost(); //will create new session and cookies | ||||
|         $this->assertFalse($temp == $_SESSION[csrfprotector::$config['CSRFP_TOKEN']]); | ||||
|         $this->assertTrue(csrfp_wrapper::checkHeader('Set-Cookie')); | ||||
|         $this->assertTrue(csrfp_wrapper::checkHeader('csrfp_token')); | ||||
|         // $this->assertTrue(csrfp_wrapper::checkHeader($_SESSION[csrfprotector::$config['CSRFP_TOKEN']][0]));  // Combine these 3 later | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test for generateAuthToken() | ||||
|      */ | ||||
|     public function testGenerateAuthToken() | ||||
|     { | ||||
|         csrfprotector::$config['tokenLength'] = 20; | ||||
|         $token1 = csrfprotector::generateAuthToken(); | ||||
|         $token2 = csrfprotector::generateAuthToken(); | ||||
|  | ||||
|         $this->assertFalse($token1 == $token2); | ||||
|         $this->assertEquals(strlen($token1), 20); | ||||
|         $this->assertRegExp('/^[a-z0-9]{20}$/', $token1); | ||||
|  | ||||
|         csrfprotector::$config['tokenLength'] = 128; | ||||
|         $token = csrfprotector::generateAuthToken(); | ||||
|         $this->assertEquals(strlen($token), 128); | ||||
|         $this->assertRegExp('/^[a-z0-9]{128}$/', $token); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test ob_handler_function | ||||
|      */ | ||||
|     public function testob_handler() | ||||
|     { | ||||
|         csrfprotector::$config['disabledJavascriptMessage'] = 'test message'; | ||||
|         csrfprotector::$config['jsUrl'] = 'http://localhost/test/csrf/js/csrfprotector.js'; | ||||
|  | ||||
|         $testHTML = '<html>'; | ||||
|         $testHTML .= '<head><title>1</title>'; | ||||
|         $testHTML .= '<body onload="test()">'; | ||||
|         $testHTML .= '-- some static content --'; | ||||
|         $testHTML .= '-- some static content --'; | ||||
|         $testHTML .= '</body>'; | ||||
|         $testHTML .= '</head></html>'; | ||||
|  | ||||
|         $modifiedHTML = csrfprotector::ob_handler($testHTML, 0); | ||||
|         $inpLength = strlen($testHTML); | ||||
|         $outLength = strlen($modifiedHTML); | ||||
|  | ||||
|         //Check if file has been modified | ||||
|         $this->assertFalse($outLength == $inpLength); | ||||
|         $this->assertTrue(strpos($modifiedHTML, '<noscript>') !== false); | ||||
|         $this->assertTrue(strpos($modifiedHTML, '<script') !== false); | ||||
|  | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * test ob_handler_function for output filter | ||||
|      */ | ||||
|     public function testob_handler_positioning() | ||||
|     { | ||||
|         csrfprotector::$config['disabledJavascriptMessage'] = 'test message'; | ||||
|         csrfprotector::$config['jsUrl'] = 'http://localhost/test/csrf/js/csrfprotector.js'; | ||||
|  | ||||
|         $testHTML = '<html>'; | ||||
|         $testHTML .= '<head><title>1</title>'; | ||||
|         $testHTML .= '<body onload="test()">'; | ||||
|         $testHTML .= '-- some static content --'; | ||||
|         $testHTML .= '-- some static content --'; | ||||
|         $testHTML .= '</body>'; | ||||
|         $testHTML .= '</head></html>'; | ||||
|  | ||||
|         $modifiedHTML = csrfprotector::ob_handler($testHTML, 0); | ||||
|  | ||||
|         $this->assertEquals(strpos($modifiedHTML, '<body') + 23, strpos($modifiedHTML, '<noscript')); | ||||
|         // Check if content before </body> is </script> #todo | ||||
|         //$this->markTestSkipped('todo, add appropriate test here'); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * testing exception in logging function | ||||
|      */ | ||||
|     public function testgetCurrentUrl() | ||||
|     { | ||||
|         $stub = new ReflectionClass('csrfprotector'); | ||||
|         $method = $stub->getMethod('getCurrentUrl'); | ||||
|         $method->setAccessible(true); | ||||
|         $this->assertEquals($method->invoke(null, array()), "http://test/index.php"); | ||||
|  | ||||
|         $tmp_request_scheme = $_SERVER['REQUEST_SCHEME']; | ||||
|         unset($_SERVER['REQUEST_SCHEME']); | ||||
|  | ||||
|         // server-https is not set | ||||
|         $this->assertEquals($method->invoke(null, array()), "http://test/index.php"); | ||||
|  | ||||
|         $_SERVER['HTTPS'] = 'on'; | ||||
|         $this->assertEquals($method->invoke(null, array()), "https://test/index.php"); | ||||
|         unset($_SERVER['HTTPS']); | ||||
|  | ||||
|         $_SERVER['REQUEST_SCHEME'] = "https"; | ||||
|         $this->assertEquals($method->invoke(null, array()), "https://test/index.php"); | ||||
|  | ||||
|         $_SERVER['REQUEST_SCHEME'] = $tmp_request_scheme; | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * testing exception in logging function | ||||
|      */ | ||||
|     public function testLoggingException() | ||||
|     { | ||||
|         $stub = new ReflectionClass('csrfprotector'); | ||||
|         $method = $stub->getMethod('logCSRFattack'); | ||||
|         $method->setAccessible(true); | ||||
|  | ||||
|         try { | ||||
|             $method->invoke(null, array()); | ||||
|             $this->fail("logFileWriteError was not caught"); | ||||
|         } catch (Exception $ex) { | ||||
|             // pass | ||||
|             $this->assertTrue(true); | ||||
|         } | ||||
|  | ||||
|         if (!is_dir($this->logDir)) | ||||
|             mkdir($this->logDir); | ||||
|         $method->invoke(null, array()); | ||||
|         $this->assertTrue(file_exists($this->logDir ."/" .date("m-20y") .".log")); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * Tests isUrlAllowed() function for various urls and configuration | ||||
|      */ | ||||
|     public function testisURLallowed() | ||||
|     { | ||||
|         csrfprotector::$config['verifyGetFor'] = array('http://test/delete*', 'https://test/*'); | ||||
|  | ||||
|         $_SERVER['PHP_SELF'] = '/nodelete.php'; | ||||
|         $this->assertTrue(csrfprotector::isURLallowed()); | ||||
|  | ||||
|         $_SERVER['PHP_SELF'] = '/index.php'; | ||||
|         $this->assertTrue(csrfprotector::isURLallowed('http://test/index.php')); | ||||
|  | ||||
|         $_SERVER['PHP_SELF'] = '/delete.php'; | ||||
|         $this->assertFalse(csrfprotector::isURLallowed('http://test/delete.php')); | ||||
|  | ||||
|         $_SERVER['PHP_SELF'] = '/delete_user.php'; | ||||
|         $this->assertFalse(csrfprotector::isURLallowed('http://test/delete_users.php')); | ||||
|  | ||||
|         $_SERVER['REQUEST_SCHEME'] = 'https'; | ||||
|         $_SERVER['PHP_SELF'] = '/index.php'; | ||||
|         $this->assertFalse(csrfprotector::isURLallowed('https://test/index.php')); | ||||
|  | ||||
|         $_SERVER['PHP_SELF'] = '/delete_user.php'; | ||||
|         $this->assertFalse(csrfprotector::isURLallowed('https://test/delete_users.php')); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * Test for exception thrown when env variable is set by mod_csrfprotector | ||||
|      */ | ||||
|     public function testModCSRFPEnabledException() | ||||
|     { | ||||
|         putenv('mod_csrfp_enabled=true'); | ||||
|         $temp = $_COOKIE[csrfprotector::$config['CSRFP_TOKEN']] = 'abc'; | ||||
|         $_SESSION[csrfprotector::$config['CSRFP_TOKEN']] = array('abc'); | ||||
|  | ||||
|         csrfProtector::$config = array(); | ||||
|         csrfProtector::init(); | ||||
|  | ||||
|         // Assuming no config was added | ||||
|         $this->assertTrue(count(csrfProtector::$config) == 0); | ||||
|          | ||||
|         // unset the env variable | ||||
|         putenv('mod_csrfp_enabled'); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * Test for exception thrown when init() method is called multiple times | ||||
|      */ | ||||
|     public function testMultipleInitializeException() | ||||
|     { | ||||
|         csrfProtector::$config = array(); | ||||
|         $this->assertTrue(count(csrfProtector::$config) == 0); | ||||
|  | ||||
|         $_SERVER['REQUEST_METHOD'] = 'GET'; | ||||
|         csrfProtector::init(); | ||||
|  | ||||
|         $this->assertTrue(count(csrfProtector::$config) == 11); | ||||
|         try { | ||||
|             csrfProtector::init(); | ||||
|             $this->fail("alreadyInitializedException not raised"); | ||||
|         }  catch (alreadyInitializedException $ex) { | ||||
|             // pass | ||||
|             $this->assertTrue(true); | ||||
|         } catch (Exception $ex) { | ||||
|             $this->fail("exception other than alreadyInitializedException failed");             | ||||
|         } | ||||
|     } | ||||
| } | ||||
| @@ -16,18 +16,6 @@ require_once $_SERVER['DOCUMENT_ROOT'] . '/inc/lib/vendor/autoload.php'; | ||||
| $u2f = new u2flib_server\U2F('https://' . $_SERVER['HTTP_HOST']); | ||||
| $tfa = new RobThree\Auth\TwoFactorAuth('mailcow UI'); | ||||
|  | ||||
| // OWASP CSRF Protector | ||||
| $csrfProtector = new csrfProtector; | ||||
| class mailcowCsrfProtector extends csrfprotector { | ||||
|   public static function logCSRFattack() { | ||||
|     $_SESSION['return'] = array( | ||||
|       'type' => 'danger', | ||||
|       'msg' => 'CSRF violation' | ||||
|     ); | ||||
|   } | ||||
| } | ||||
| mailcowCsrfProtector::init(); | ||||
|  | ||||
| // Redis | ||||
| $redis = new Redis(); | ||||
| $redis->connect('redis-mailcow', 6379); | ||||
|   | ||||
		Reference in New Issue
	
	Block a user