anti-csrf
anti-csrf copied to clipboard
Full-Featured Anti-CSRF Library
The library's default is to have the HMAC IP check enabled. This gives issues with sites that run through CloudFlare as the remote IP that CloudFlare connects from is different...
If tokenLifeTime is initialized and higher than the current date, the token will be deleted after the validateRequest. I think that reusable->deleteToken() should return false to ensure that the token...
the code looks fine, I have tested it on PHP 7.0 and it looks good. _Originally posted by @SnirSofer in https://github.com/paragonie/anti-csrf/issues/40#issuecomment-776900728_
Add support for UserAgent
Facing intermediate token validation while using the server in the container with kubernetes. I have not made any code change and when I am using bare metal server then things...
1. Using just a standard php file. 2. Required the anticsrf.php file. 3. Do not have/use twig so I tried calling it using A. generateToken('form.php') B. $csrf=$AntiCSRF->generateToken('form.php'); and added the...
**Class 'ParagonIE\AntiCSRF\AntiCSRF' not found** structure: domain.com/index.php ----> require('myincludes/myautoloader.php'); domain.com/my includes/myautoloader.php domain.com/my includes/ParagonIE/AntiCSRF/AntiCSRF.php domain.com/my includes/ParagonIE/yourautoloader.php myautoloader.php calls ParagonIE/yourautoloader.php Which is copy/pasted from here.
New one here: Too few arguments to function {closure}(), 1 passed and exactly 2 expected
For some reason its not working with the above mentioned versions... used to work on 7.0 but it stopped abruptly...