This is a live mirror of the Perl 5 development currently hosted at https://github.com/perl/perl5
Exact path to perl for open -|.
[perl5.git] / t / op / taint.t
CommitLineData
1e422769 1#!./perl -T
2#
3# Taint tests by Tom Phoenix <rootbeer@teleport.com>.
4#
5# I don't claim to know all about tainting. If anyone sees
9607fc9c 6# tests that I've missed here, please add them. But this is
1e422769 7# better than having no tests at all, right?
8#
9
10BEGIN {
11 chdir 't' if -d 't';
93430cb4 12 unshift @INC, '../lib' if -d '../lib';
1e422769 13}
14
15use strict;
16use Config;
17
9d116dd7
JH
18# We do not want the whole taint.t to fail
19# just because Errno possibly failing.
20eval { require Errno; import Errno };
21
3eeba6fb
CB
22BEGIN {
23 if ($^O eq 'VMS' && !defined($Config{d_setenv})) {
24 $ENV{PATH} = $ENV{PATH};
25 $ENV{TERM} = $ENV{TERM} ne ''? $ENV{TERM} : 'dummy';
26 }
27}
28
1e422769 29my $Is_VMS = $^O eq 'VMS';
68dc0745 30my $Is_MSWin32 = $^O eq 'MSWin32';
39e571d4 31my $Is_Dos = $^O eq 'dos';
68dc0745 32my $Invoke_Perl = $Is_VMS ? 'MCR Sys$Disk:[]Perl.' :
33 $Is_MSWin32 ? '.\perl' : './perl';
c90c0ff4 34my @MoreEnv = qw/IFS CDPATH ENV BASH_ENV/;
7bac28a0 35
1e422769 36if ($Is_VMS) {
7bac28a0 37 my (%old, $x);
38 for $x ('DCL$PATH', @MoreEnv) {
39 ($old{$x}) = $ENV{$x} =~ /^(.*)$/ if exists $ENV{$x};
40 }
1e422769 41 eval <<EndOfCleanup;
42 END {
3eeba6fb 43 \$ENV{PATH} = '' if $Config{d_setenv};
1e422769 44 warn "# Note: logical name 'PATH' may have been deleted\n";
562a7b0c 45 \@ENV{keys %old} = values %old;
1e422769 46 }
47EndOfCleanup
48}
49
50# Sources of taint:
51# The empty tainted value, for tainting strings
52my $TAINT = substr($^X, 0, 0);
53# A tainted zero, useful for tainting numbers
54my $TAINT0 = 0 + $TAINT;
55
56# This taints each argument passed. All must be lvalues.
57# Side effect: It also stringifies them. :-(
58sub taint_these (@) {
59 for (@_) { $_ .= $TAINT }
60}
61
62# How to identify taint when you see it
63sub any_tainted (@) {
64 not eval { join("",@_), kill 0; 1 };
65}
66sub tainted ($) {
67 any_tainted @_;
68}
69sub all_tainted (@) {
70 for (@_) { return 0 unless tainted $_ }
71 1;
72}
73
74sub test ($$;$) {
75 my($serial, $boolean, $diag) = @_;
76 if ($boolean) {
77 print "ok $serial\n";
78 } else {
79 print "not ok $serial\n";
80 for (split m/^/m, $diag) {
81 print "# $_";
82 }
9607fc9c 83 print "\n" unless
1e422769 84 $diag eq ''
85 or substr($diag, -1) eq "\n";
86 }
87}
88
89# We need an external program to call.
5aabfad6 90my $ECHO = ($Is_MSWin32 ? ".\\echo$$" : "./echo$$");
1e422769 91END { unlink $ECHO }
92open PROG, "> $ECHO" or die "Can't create $ECHO: $!";
93print PROG 'print "@ARGV\n"', "\n";
94close PROG;
95my $echo = "$Invoke_Perl $ECHO";
96
b3eb6a9b 97print "1..149\n";
1e422769 98
99# First, let's make sure that Perl is checking the dangerous
100# environment variables. Maybe they aren't set yet, so we'll
101# taint them ourselves.
102{
103 $ENV{'DCL$PATH'} = '' if $Is_VMS;
104
7bac28a0 105 $ENV{PATH} = '';
c90c0ff4 106 delete @ENV{@MoreEnv};
7bac28a0 107 $ENV{TERM} = 'dumb';
108
109 test 1, eval { `$echo 1` } eq "1\n";
110
39e571d4 111 if ($Is_MSWin32 || $Is_VMS || $Is_Dos) {
7bac28a0 112 print "# Environment tainting tests skipped\n";
c90c0ff4 113 for (2..5) { print "ok $_\n" }
5aabfad6 114 }
115 else {
7bac28a0 116 my @vars = ('PATH', @MoreEnv);
117 while (my $v = $vars[0]) {
118 local $ENV{$v} = $TAINT;
119 last if eval { `$echo 1` };
120 last unless $@ =~ /^Insecure \$ENV{$v}/;
121 shift @vars;
122 }
123 test 2, !@vars, "\$$vars[0]";
c90c0ff4 124
125 # tainted $TERM is unsafe only if it contains metachars
126 local $ENV{TERM};
127 $ENV{TERM} = 'e=mc2';
128 test 3, eval { `$echo 1` } eq "1\n";
129 $ENV{TERM} = 'e=mc2' . $TAINT;
130 test 4, eval { `$echo 1` } eq '';
131 test 5, $@ =~ /^Insecure \$ENV{TERM}/, $@;
5aabfad6 132 }
7bac28a0 133
9607fc9c 134 my $tmp;
48c036b1
GS
135 if ($^O eq 'os2' || $^O eq 'amigaos' || $Is_MSWin32 || $Is_Dos) {
136 print "# all directories are writeable\n";
137 }
138 else {
9607fc9c 139 $tmp = (grep { defined and -d and (stat _)[2] & 2 }
140 qw(/tmp /var/tmp /usr/tmp /sys$scratch),
141 @ENV{qw(TMP TEMP)})[0]
142 or print "# can't find world-writeable directory to test PATH\n";
143 }
144
385588b3 145 if ($tmp) {
7bac28a0 146 local $ENV{PATH} = $tmp;
c90c0ff4 147 test 6, eval { `$echo 1` } eq '';
148 test 7, $@ =~ /^Insecure directory in \$ENV{PATH}/, $@;
1e422769 149 }
150 else {
fac76ed7 151 for (6..7) { print "ok $_ # Skipped: all directories are writeable\n" }
1e422769 152 }
153
1e422769 154 if ($Is_VMS) {
155 $ENV{'DCL$PATH'} = $TAINT;
c90c0ff4 156 test 8, eval { `$echo 1` } eq '';
157 test 9, $@ =~ /^Insecure \$ENV{DCL\$PATH}/, $@;
9607fc9c 158 if ($tmp) {
159 $ENV{'DCL$PATH'} = $tmp;
c90c0ff4 160 test 10, eval { `$echo 1` } eq '';
161 test 11, $@ =~ /^Insecure directory in \$ENV{DCL\$PATH}/, $@;
9607fc9c 162 }
163 else {
fac76ed7 164 for (10..11) { print "ok $_ # Skipped: can't find world-writeable directory to test DCL\$PATH\n" }
9607fc9c 165 }
1e422769 166 $ENV{'DCL$PATH'} = '';
167 }
168 else {
fac76ed7 169 for (8..11) { print "ok $_ # Skipped: This is not VMS\n"; }
1e422769 170 }
171}
172
173# Let's see that we can taint and untaint as needed.
174{
175 my $foo = $TAINT;
c90c0ff4 176 test 12, tainted $foo;
9607fc9c 177
178 # That was a sanity check. If it failed, stop the insanity!
179 die "Taint checks don't seem to be enabled" unless tainted $foo;
1e422769 180
181 $foo = "foo";
c90c0ff4 182 test 13, not tainted $foo;
1e422769 183
184 taint_these($foo);
c90c0ff4 185 test 14, tainted $foo;
1e422769 186
187 my @list = 1..10;
c90c0ff4 188 test 15, not any_tainted @list;
1e422769 189 taint_these @list[1,3,5,7,9];
c90c0ff4 190 test 16, any_tainted @list;
191 test 17, all_tainted @list[1,3,5,7,9];
192 test 18, not any_tainted @list[0,2,4,6,8];
1e422769 193
194 ($foo) = $foo =~ /(.+)/;
c90c0ff4 195 test 19, not tainted $foo;
1e422769 196
197 $foo = $1 if ('bar' . $TAINT) =~ /(.+)/;
c90c0ff4 198 test 20, not tainted $foo;
199 test 21, $foo eq 'bar';
1e422769 200
b3eb6a9b
GS
201 {
202 use re 'taint';
203
204 ($foo) = ('bar' . $TAINT) =~ /(.+)/;
205 test 22, tainted $foo;
206 test 23, $foo eq 'bar';
207
208 $foo = $1 if ('bar' . $TAINT) =~ /(.+)/;
209 test 24, tainted $foo;
210 test 25, $foo eq 'bar';
211 }
212
213 $foo = $1 if 'bar' =~ /(.+)$TAINT/;
214 test 26, tainted $foo;
215 test 27, $foo eq 'bar';
48c036b1 216
1e422769 217 my $pi = 4 * atan2(1,1) + $TAINT0;
b3eb6a9b 218 test 28, tainted $pi;
1e422769 219
220 ($pi) = $pi =~ /(\d+\.\d+)/;
b3eb6a9b
GS
221 test 29, not tainted $pi;
222 test 30, sprintf("%.5f", $pi) eq '3.14159';
1e422769 223}
224
225# How about command-line arguments? The problem is that we don't
226# always get some, so we'll run another process with some.
227{
228 my $arg = "./arg$$";
229 open PROG, "> $arg" or die "Can't create $arg: $!";
230 print PROG q{
231 eval { join('', @ARGV), kill 0 };
232 exit 0 if $@ =~ /^Insecure dependency/;
233 print "# Oops: \$@ was [$@]\n";
234 exit 1;
235 };
236 close PROG;
237 print `$Invoke_Perl "-T" $arg and some suspect arguments`;
b3eb6a9b 238 test 31, !$?, "Exited with status $?";
1e422769 239 unlink $arg;
240}
241
242# Reading from a file should be tainted
243{
9607fc9c 244 my $file = './TEST';
b3eb6a9b 245 test 32, open(FILE, $file), "Couldn't open '$file': $!";
1e422769 246
247 my $block;
248 sysread(FILE, $block, 100);
9607fc9c 249 my $line = <FILE>;
1e422769 250 close FILE;
b3eb6a9b
GS
251 test 33, tainted $block;
252 test 34, tainted $line;
1e422769 253}
254
c90c0ff4 255# Globs should be forbidden, except under VMS,
256# which doesn't spawn an external program.
257if ($Is_VMS) {
b3eb6a9b 258 for (35..36) { print "ok $_\n"; }
c90c0ff4 259}
260else {
7bac28a0 261 my @globs = eval { <*> };
b3eb6a9b 262 test 35, @globs == 0 && $@ =~ /^Insecure dependency/;
1e422769 263
7bac28a0 264 @globs = eval { glob '*' };
b3eb6a9b 265 test 36, @globs == 0 && $@ =~ /^Insecure dependency/;
1e422769 266}
267
268# Output of commands should be tainted
269{
270 my $foo = `$echo abc`;
b3eb6a9b 271 test 37, tainted $foo;
1e422769 272}
273
274# Certain system variables should be tainted
275{
b3eb6a9b 276 test 38, all_tainted $^X, $0;
1e422769 277}
278
279# Results of matching should all be untainted
280{
281 my $foo = "abcdefghi" . $TAINT;
b3eb6a9b 282 test 39, tainted $foo;
1e422769 283
284 $foo =~ /def/;
b3eb6a9b 285 test 40, not any_tainted $`, $&, $';
1e422769 286
287 $foo =~ /(...)(...)(...)/;
b3eb6a9b 288 test 41, not any_tainted $1, $2, $3, $+;
1e422769 289
290 my @bar = $foo =~ /(...)(...)(...)/;
b3eb6a9b 291 test 42, not any_tainted @bar;
1e422769 292
b3eb6a9b
GS
293 test 43, tainted $foo; # $foo should still be tainted!
294 test 44, $foo eq "abcdefghi";
1e422769 295}
296
297# Operations which affect files can't use tainted data.
298{
b3eb6a9b
GS
299 test 45, eval { chmod 0, $TAINT } eq '', 'chmod';
300 test 46, $@ =~ /^Insecure dependency/, $@;
1e422769 301
9607fc9c 302 # There is no feature test in $Config{} for truncate,
303 # so we allow for the possibility that it's missing.
b3eb6a9b
GS
304 test 47, eval { truncate 'NoSuChFiLe', $TAINT0 } eq '', 'truncate';
305 test 48, $@ =~ /^(?:Insecure dependency|truncate not implemented)/, $@;
1e422769 306
b3eb6a9b
GS
307 test 49, eval { rename '', $TAINT } eq '', 'rename';
308 test 50, $@ =~ /^Insecure dependency/, $@;
1e422769 309
b3eb6a9b
GS
310 test 51, eval { unlink $TAINT } eq '', 'unlink';
311 test 52, $@ =~ /^Insecure dependency/, $@;
9607fc9c 312
b3eb6a9b
GS
313 test 53, eval { utime $TAINT } eq '', 'utime';
314 test 54, $@ =~ /^Insecure dependency/, $@;
48c036b1 315
1e422769 316 if ($Config{d_chown}) {
b3eb6a9b
GS
317 test 55, eval { chown -1, -1, $TAINT } eq '', 'chown';
318 test 56, $@ =~ /^Insecure dependency/, $@;
1e422769 319 }
320 else {
b3eb6a9b 321 for (55..56) { print "ok $_ # Skipped: chown() is not available\n" }
1e422769 322 }
323
324 if ($Config{d_link}) {
b3eb6a9b
GS
325 test 57, eval { link $TAINT, '' } eq '', 'link';
326 test 58, $@ =~ /^Insecure dependency/, $@;
1e422769 327 }
328 else {
b3eb6a9b 329 for (57..58) { print "ok $_ # Skipped: link() is not available\n" }
1e422769 330 }
331
332 if ($Config{d_symlink}) {
b3eb6a9b
GS
333 test 59, eval { symlink $TAINT, '' } eq '', 'symlink';
334 test 60, $@ =~ /^Insecure dependency/, $@;
1e422769 335 }
336 else {
b3eb6a9b 337 for (59..60) { print "ok $_ # Skipped: symlink() is not available\n" }
1e422769 338 }
339}
340
341# Operations which affect directories can't use tainted data.
342{
b3eb6a9b
GS
343 test 61, eval { mkdir $TAINT0, $TAINT } eq '', 'mkdir';
344 test 62, $@ =~ /^Insecure dependency/, $@;
1e422769 345
b3eb6a9b
GS
346 test 63, eval { rmdir $TAINT } eq '', 'rmdir';
347 test 64, $@ =~ /^Insecure dependency/, $@;
9607fc9c 348
b3eb6a9b
GS
349 test 65, eval { chdir $TAINT } eq '', 'chdir';
350 test 66, $@ =~ /^Insecure dependency/, $@;
48c036b1 351
1e422769 352 if ($Config{d_chroot}) {
b3eb6a9b
GS
353 test 67, eval { chroot $TAINT } eq '', 'chroot';
354 test 68, $@ =~ /^Insecure dependency/, $@;
1e422769 355 }
356 else {
b3eb6a9b 357 for (67..68) { print "ok $_ # Skipped: chroot() is not available\n" }
1e422769 358 }
359}
360
361# Some operations using files can't use tainted data.
362{
363 my $foo = "imaginary library" . $TAINT;
b3eb6a9b
GS
364 test 69, eval { require $foo } eq '', 'require';
365 test 70, $@ =~ /^Insecure dependency/, $@;
1e422769 366
367 my $filename = "./taintB$$"; # NB: $filename isn't tainted!
368 END { unlink $filename if defined $filename }
369 $foo = $filename . $TAINT;
370 unlink $filename; # in any case
371
b3eb6a9b
GS
372 test 71, eval { open FOO, $foo } eq '', 'open for read';
373 test 72, $@ eq '', $@; # NB: This should be allowed
9d116dd7
JH
374
375 # Try first new style but allow also old style.
61ae2fbf
JH
376 test 73, $!{ENOENT} ||
377 $! == 2 || # File not found
378 ($Is_Dos && $! == 22) ||
379 ($^O eq 'mint' && $! == 33);
1e422769 380
b3eb6a9b
GS
381 test 74, eval { open FOO, "> $foo" } eq '', 'open for write';
382 test 75, $@ =~ /^Insecure dependency/, $@;
1e422769 383}
384
385# Commands to the system can't use tainted data
386{
387 my $foo = $TAINT;
388
389 if ($^O eq 'amigaos') {
b3eb6a9b 390 for (76..79) { print "ok $_ # Skipped: open('|') is not available\n" }
1e422769 391 }
392 else {
06eaf0bc 393 test 76, eval { open FOO, "| x$foo" } eq '', 'popen to';
b3eb6a9b 394 test 77, $@ =~ /^Insecure dependency/, $@;
1e422769 395
06eaf0bc 396 test 78, eval { open FOO, "x$foo |" } eq '', 'popen from';
b3eb6a9b 397 test 79, $@ =~ /^Insecure dependency/, $@;
48c036b1 398 }
1e422769 399
b3eb6a9b
GS
400 test 80, eval { exec $TAINT } eq '', 'exec';
401 test 81, $@ =~ /^Insecure dependency/, $@;
9607fc9c 402
b3eb6a9b
GS
403 test 82, eval { system $TAINT } eq '', 'system';
404 test 83, $@ =~ /^Insecure dependency/, $@;
48c036b1 405
1e422769 406 $foo = "*";
407 taint_these $foo;
408
b3eb6a9b
GS
409 test 84, eval { `$echo 1$foo` } eq '', 'backticks';
410 test 85, $@ =~ /^Insecure dependency/, $@;
1e422769 411
412 if ($Is_VMS) { # wildcard expansion doesn't invoke shell, so is safe
b3eb6a9b
GS
413 test 86, join('', eval { glob $foo } ) ne '', 'globbing';
414 test 87, $@ eq '', $@;
1e422769 415 }
416 else {
b3eb6a9b 417 for (86..87) { print "ok $_ # Skipped: this is not VMS\n"; }
1e422769 418 }
419}
420
421# Operations which affect processes can't use tainted data.
422{
b3eb6a9b
GS
423 test 88, eval { kill 0, $TAINT } eq '', 'kill';
424 test 89, $@ =~ /^Insecure dependency/, $@;
1e422769 425
426 if ($Config{d_setpgrp}) {
b3eb6a9b
GS
427 test 90, eval { setpgrp 0, $TAINT } eq '', 'setpgrp';
428 test 91, $@ =~ /^Insecure dependency/, $@;
1e422769 429 }
430 else {
b3eb6a9b 431 for (90..91) { print "ok $_ # Skipped: setpgrp() is not available\n" }
1e422769 432 }
433
434 if ($Config{d_setprior}) {
b3eb6a9b
GS
435 test 92, eval { setpriority 0, $TAINT, $TAINT } eq '', 'setpriority';
436 test 93, $@ =~ /^Insecure dependency/, $@;
1e422769 437 }
438 else {
b3eb6a9b 439 for (92..93) { print "ok $_ # Skipped: setpriority() is not available\n" }
1e422769 440 }
441}
442
443# Some miscellaneous operations can't use tainted data.
444{
445 if ($Config{d_syscall}) {
b3eb6a9b
GS
446 test 94, eval { syscall $TAINT } eq '', 'syscall';
447 test 95, $@ =~ /^Insecure dependency/, $@;
1e422769 448 }
449 else {
b3eb6a9b 450 for (94..95) { print "ok $_ # Skipped: syscall() is not available\n" }
1e422769 451 }
452
453 {
454 my $foo = "x" x 979;
455 taint_these $foo;
456 local *FOO;
457 my $temp = "./taintC$$";
458 END { unlink $temp }
b3eb6a9b 459 test 96, open(FOO, "> $temp"), "Couldn't open $temp for write: $!";
1e422769 460
b3eb6a9b
GS
461 test 97, eval { ioctl FOO, $TAINT, $foo } eq '', 'ioctl';
462 test 98, $@ =~ /^Insecure dependency/, $@;
1e422769 463
464 if ($Config{d_fcntl}) {
b3eb6a9b
GS
465 test 99, eval { fcntl FOO, $TAINT, $foo } eq '', 'fcntl';
466 test 100, $@ =~ /^Insecure dependency/, $@;
1e422769 467 }
468 else {
b3eb6a9b 469 for (99..100) { print "ok $_ # Skipped: fcntl() is not available\n" }
1e422769 470 }
471
472 close FOO;
473 }
474}
475
9607fc9c 476# Some tests involving references
1e422769 477{
478 my $foo = 'abc' . $TAINT;
479 my $fooref = \$foo;
b3eb6a9b
GS
480 test 101, not tainted $fooref;
481 test 102, tainted $$fooref;
482 test 103, tainted $foo;
1e422769 483}
54310121 484
485# Some tests involving assignment
486{
487 my $foo = $TAINT0;
488 my $bar = $foo;
b3eb6a9b
GS
489 test 104, all_tainted $foo, $bar;
490 test 105, tainted($foo = $bar);
491 test 106, tainted($bar = $bar);
492 test 107, tainted($bar += $bar);
493 test 108, tainted($bar -= $bar);
494 test 109, tainted($bar *= $bar);
495 test 110, tainted($bar++);
496 test 111, tainted($bar /= $bar);
497 test 112, tainted($bar += 0);
498 test 113, tainted($bar -= 2);
499 test 114, tainted($bar *= -1);
500 test 115, tainted($bar /= 1);
501 test 116, tainted($bar--);
502 test 117, $bar == 0;
54310121 503}
a1f49e72
CS
504
505# Test assignment and return of lists
506{
507 my @foo = ("A", "tainted" . $TAINT, "B");
b3eb6a9b
GS
508 test 118, not tainted $foo[0];
509 test 119, tainted $foo[1];
510 test 120, not tainted $foo[2];
a1f49e72 511 my @bar = @foo;
b3eb6a9b
GS
512 test 121, not tainted $bar[0];
513 test 122, tainted $bar[1];
514 test 123, not tainted $bar[2];
a1f49e72 515 my @baz = eval { "A", "tainted" . $TAINT, "B" };
b3eb6a9b
GS
516 test 124, not tainted $baz[0];
517 test 125, tainted $baz[1];
518 test 126, not tainted $baz[2];
a1f49e72 519 my @plugh = eval q[ "A", "tainted" . $TAINT, "B" ];
b3eb6a9b
GS
520 test 127, not tainted $plugh[0];
521 test 128, tainted $plugh[1];
522 test 129, not tainted $plugh[2];
a1f49e72 523 my $nautilus = sub { "A", "tainted" . $TAINT, "B" };
b3eb6a9b
GS
524 test 130, not tainted ((&$nautilus)[0]);
525 test 131, tainted ((&$nautilus)[1]);
526 test 132, not tainted ((&$nautilus)[2]);
a1f49e72 527 my @xyzzy = &$nautilus;
b3eb6a9b
GS
528 test 133, not tainted $xyzzy[0];
529 test 134, tainted $xyzzy[1];
530 test 135, not tainted $xyzzy[2];
a1f49e72 531 my $red_october = sub { return "A", "tainted" . $TAINT, "B" };
b3eb6a9b
GS
532 test 136, not tainted ((&$red_october)[0]);
533 test 137, tainted ((&$red_october)[1]);
534 test 138, not tainted ((&$red_october)[2]);
a1f49e72 535 my @corge = &$red_october;
b3eb6a9b
GS
536 test 139, not tainted $corge[0];
537 test 140, tainted $corge[1];
538 test 141, not tainted $corge[2];
a1f49e72 539}
fb73857a 540
541# Test for system/library calls returning string data of dubious origin.
542{
543 # No reliable %Config check for getpw*
544 if (eval { setpwent(); getpwent(); 1 }) {
545 setpwent();
546 my @getpwent = getpwent();
547 die "getpwent: $!\n" unless (@getpwent);
b3eb6a9b 548 test 142,( not tainted $getpwent[0]
fb73857a 549 and not tainted $getpwent[1]
550 and not tainted $getpwent[2]
551 and not tainted $getpwent[3]
552 and not tainted $getpwent[4]
553 and not tainted $getpwent[5]
554 and tainted $getpwent[6] # gecos
555 and not tainted $getpwent[7]
556 and not tainted $getpwent[8]);
557 endpwent();
558 } else {
b3eb6a9b 559 for (142) { print "ok $_ # Skipped: getpwent() is not available\n" }
fb73857a 560 }
561
562 if ($Config{d_readdir}) { # pretty hard to imagine not
563 local(*D);
564 opendir(D, "op") or die "opendir: $!\n";
565 my $readdir = readdir(D);
b3eb6a9b 566 test 143, tainted $readdir;
fb73857a 567 closedir(OP);
568 } else {
b3eb6a9b 569 for (143) { print "ok $_ # Skipped: readdir() is not available\n" }
fb73857a 570 }
571
572 if ($Config{d_readlink} && $Config{d_symlink}) {
573 my $symlink = "sl$$";
574 unlink($symlink);
575 symlink("/something/naughty", $symlink) or die "symlink: $!\n";
576 my $readlink = readlink($symlink);
b3eb6a9b 577 test 144, tainted $readlink;
fb73857a 578 unlink($symlink);
579 } else {
b3eb6a9b 580 for (144) { print "ok $_ # Skipped: readlink() or symlink() is not available\n"; }
fb73857a 581 }
582}
583
584# test bitwise ops (regression bug)
585{
586 my $why = "y";
587 my $j = "x" | $why;
b3eb6a9b 588 test 145, not tainted $j;
fb73857a 589 $why = $TAINT."y";
590 $j = "x" | $why;
b3eb6a9b 591 test 146, tainted $j;
fb73857a 592}
593
48c036b1
GS
594# test target of substitution (regression bug)
595{
596 my $why = $TAINT."y";
597 $why =~ s/y/z/;
b3eb6a9b 598 test 147, tainted $why;
48c036b1
GS
599
600 my $z = "[z]";
601 $why =~ s/$z/zee/;
b3eb6a9b 602 test 148, tainted $why;
48c036b1
GS
603
604 $why =~ s/e/'-'.$$/ge;
b3eb6a9b 605 test 149, tainted $why;
48c036b1 606}