Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.112
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
src /
php-7.4.33 /
ext /
com_dotnet /
tests /
Delete
Unzip
Name
Size
Permission
Date
Action
27974.phpt
720
B
-rw-rw-r--
2022-10-31 11:36
bug33386.phpt
921
B
-rw-rw-r--
2022-10-31 11:36
bug34272.phpt
432
B
-rw-rw-r--
2022-10-31 11:36
bug39596.phpt
413
B
-rw-rw-r--
2022-10-31 11:36
bug39606.phpt
446
B
-rw-rw-r--
2022-10-31 11:36
bug45280.phpt
334
B
-rw-rw-r--
2022-10-31 11:36
bug49192.phpt
807
B
-rw-rw-r--
2022-10-31 11:36
bug62474.phpt
344
B
-rw-rw-r--
2022-10-31 11:36
bug63208.phpt
455
B
-rw-rw-r--
2022-10-31 11:36
bug64130.phpt
605
B
-rw-rw-r--
2022-10-31 11:36
bug66322.phpt
627
B
-rw-rw-r--
2022-10-31 11:36
bug66431_0.phpt
785
B
-rw-rw-r--
2022-10-31 11:36
bug66431_1.phpt
1.34
KB
-rw-rw-r--
2022-10-31 11:36
bug69939.phpt
242
B
-rw-rw-r--
2022-10-31 11:36
bug72498.phpt
361
B
-rw-rw-r--
2022-10-31 11:36
bug73679.phpt
687
B
-rw-rw-r--
2022-10-31 11:36
bug77177.phpt
1.65
KB
-rw-rw-r--
2022-10-31 11:36
bug77578.phpt
605
B
-rw-rw-r--
2022-10-31 11:36
bug77621.phpt
512
B
-rw-rw-r--
2022-10-31 11:36
bug78650.phpt
566
B
-rw-rw-r--
2022-10-31 11:36
bug78694.phpt
479
B
-rw-rw-r--
2022-10-31 11:36
bug79242.phpt
449
B
-rw-rw-r--
2022-10-31 11:36
bug79247.phpt
266
B
-rw-rw-r--
2022-10-31 11:36
bug79248.phpt
298
B
-rw-rw-r--
2022-10-31 11:36
bug79299.phpt
444
B
-rw-rw-r--
2022-10-31 11:36
bug79332.phpt
441
B
-rw-rw-r--
2022-10-31 11:36
variants.phpt
8.56
KB
-rw-rw-r--
2022-10-31 11:36
variants_x64.phpt
8.67
KB
-rw-rw-r--
2022-10-31 11:36
Save
Rename
--TEST-- COM: mapping a safearray --SKIPIF-- <?php if (!extension_loaded("com_dotnet")) print "skip COM/.Net support not present"; ?> --FILE-- <?php error_reporting(E_ALL); try { $v = new VARIANT(array("123", "456", "789")); var_dump($v); print $v[0] . "\n"; print $v[1] . "\n"; print $v[2] . "\n"; $v[1] = "hello"; foreach ($v as $item) { var_dump($item); } try { $v[3] = "shouldn't work"; } catch (com_exception $e) { if ($e->getCode() != DISP_E_BADINDEX) { throw $e; } echo "Got BADINDEX exception OK!\n"; } echo "OK!"; } catch (Exception $e) { print $e; } ?> --EXPECT-- object(variant)#1 (0) { } 123 456 789 string(3) "123" string(5) "hello" string(3) "789" Got BADINDEX exception OK! OK!