streams/tests/unit/AntiXSSTest.php
2022-06-17 16:59:11 -07:00

83 lines
2.1 KiB
PHP

<?php
/**
* tests several functions which are used to prevent xss attacks
*
* @package test.util
*/
use PHPUnit\Framework\TestCase;
require_once('include/misc.php');
class AntiXSSTest extends TestCase
{
/**
* test, that tags are escaped
*/
public function testEscapeTags()
{
$invalidstring = '<submit type="button" onclick="alert(\'failed!\');" />';
$validstring = notags($invalidstring);
$escapedString = escape_tags($invalidstring);
$this->assertEquals('[submit type="button" onclick="alert(\'failed!\');" /]', $validstring);
$this->assertEquals("&lt;submit type=&quot;button&quot; onclick=&quot;alert('failed!');&quot; /&gt;", $escapedString);
}
/**
*xmlify and unxmlify
*/
public function testXmlify()
{
$text = "<tag>I want to break\n this!11!<?hard?></tag>";
$xml = xmlify($text);
$retext = unxmlify($text);
$this->assertEquals($text, $retext);
}
/**
* xmlify and put in a document
*/
public function testXmlifyDocument()
{
$tag = "<tag>I want to break</tag>";
$xml = xmlify($tag);
$text = '<text>' . $xml . '</text>';
$xml_parser = xml_parser_create();
//should be possible to parse it
$values = [];
$index = [];
$this->assertEquals(1, xml_parse_into_struct($xml_parser, $text, $values, $index));
$this->assertEquals(
array('TEXT' => array(0)),
$index
);
$this->assertEquals(
array(array('tag' => 'TEXT', 'type' => 'complete', 'level' => 1, 'value' => $tag)),
$values
);
xml_parser_free($xml_parser);
}
/**
* test hex2bin and reverse
*/
public function testHex2Bin()
{
$this->assertEquals(-3, hex2bin(bin2hex(-3)));
$this->assertEquals(0, hex2bin(bin2hex(0)));
$this->assertEquals(12, hex2bin(bin2hex(12)));
$this->assertEquals(PHP_INT_MAX, hex2bin(bin2hex(PHP_INT_MAX)));
}
//function qp, quick and dirty??
//get_mentions
//get_contact_block, bis Zeile 538
}