/PHP-5.4/ext/standard/tests/general_functions/ |
H A D | import_request.phpt | 35 Notice: import_request_variables(): No prefix specified - possible security hazard in %s on line %d 38 Notice: import_request_variables(): No prefix specified - possible security hazard in %s on line %d 42 Warning: import_request_variables(): Numeric key detected - possible security hazard in %s on line …
|
/PHP-5.4/TSRM/ |
H A D | tsrm_win32.c | 463 SECURITY_ATTRIBUTES security; in popen_ex() local 492 security.nLength = sizeof(SECURITY_ATTRIBUTES); in popen_ex() 493 security.bInheritHandle = TRUE; in popen_ex() 494 security.lpSecurityDescriptor = NULL; in popen_ex() 496 if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) { in popen_ex() 527 …DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &t… in popen_ex() 542 …res = CreateProcessAsUser(token_user, NULL, cmd, &security, &security, security.bInheritHandle, dw… in popen_ex() 545 …res = CreateProcess(NULL, cmd, &security, &security, security.bInheritHandle, dwCreateFlags, env, … in popen_ex()
|
/PHP-5.4/ext/standard/ |
H A D | proc_open.c | 401 # define pipe(pair) (CreatePipe(&pair[0], &pair[1], &security, 0) ? 0 : -1) 458 SECURITY_ATTRIBUTES security; in PHP_FUNCTION() local 520 memset(&security, 0, sizeof(security)); in PHP_FUNCTION() 521 security.nLength = sizeof(security); in PHP_FUNCTION() 522 security.bInheritHandle = TRUE; in PHP_FUNCTION() 523 security.lpSecurityDescriptor = NULL; in PHP_FUNCTION() 745 …newprocok = CreateProcess(NULL, command, &security, &security, TRUE, dwCreateFlags, env.envp, cwd,… in PHP_FUNCTION() 749 …newprocok = CreateProcess(NULL, command_with_cmd, &security, &security, TRUE, dwCreateFlags, env.e… in PHP_FUNCTION()
|
/PHP-5.4/ext/snmp/tests/ |
H A D | snmp-object-setSecurity_error.phpt | 40 Warning: SNMP::setSecurity(): Invalid security level '' in %s on line %d 43 Warning: SNMP::setSecurity(): Invalid security level 'bugusPriv' in %s on line %d 55 Warning: SNMP::setSecurity(): Unknown security protocol 'BBB' in %s on line %d
|
H A D | snmp3-error.phpt | 42 Warning: snmp3_get(): Invalid security level '' in %s on line %d 45 Warning: snmp3_get(): Invalid security level 'bugusPriv' in %s on line %d 57 Warning: snmp3_get(): Unknown security protocol 'BBB' in %s on line %d
|
H A D | snmp-object.phpt | 95 echo "SNMPv3 (default security settings)\n"; 209 SNMPv3 (default security settings)
|
/PHP-5.4/Zend/tests/ |
H A D | errmsg_020.phpt | 13 Warning: phpinfo() has been disabled for security reasons in %s on line %d
|
H A D | errmsg_021.phpt | 16 Warning: test() has been disabled for security reasons in %s on line %d
|
/PHP-5.4/sapi/cgi/ |
H A D | CHANGES | 15 CGI: Enable the security check for internal server 25 to circumvent .htaccess security
|
/PHP-5.4/ |
H A D | README.input_filter | 10 through which a company-wide or site-wide security policy can be 12 treat_data and post handler functions. To implement your own security 15 peoples' needs. However, if you want to implement your own security
|
H A D | README.GIT-RULES | 52 stable version and is open for security fixes only. 55 stable version and is open for security fixes only.
|
H A D | php.ini-development | 76 ; php.ini-production contains settings which hold security, performance and 78 ; compatibility with older or less security conscience applications. We 301 ; This directive allows you to disable certain functions for security reasons. 307 ; This directive allows you to disable certain classes for security reasons. 362 ; (e.g. by adding its signature to the Web server header). It is no security 707 ; see documentation for security issues. The alternate is to use the 729 ; cgi.force_redirect is necessary to provide security running PHP as a CGI under 743 ; cause security issues, KNOW WHAT YOU ARE DOING FIRST. 757 ; security tokens of the calling client. This allows IIS to define the 758 ; security context that the request runs under. mod_fastcgi under Apache [all …]
|
H A D | php.ini-production | 76 ; php.ini-production contains settings which hold security, performance and 78 ; compatibility with older or less security conscience applications. We 301 ; This directive allows you to disable certain functions for security reasons. 307 ; This directive allows you to disable certain classes for security reasons. 362 ; (e.g. by adding its signature to the Web server header). It is no security 707 ; see documentation for security issues. The alternate is to use the 729 ; cgi.force_redirect is necessary to provide security running PHP as a CGI under 743 ; cause security issues, KNOW WHAT YOU ARE DOING FIRST. 757 ; security tokens of the calling client. This allows IIS to define the 758 ; security context that the request runs under. mod_fastcgi under Apache [all …]
|
H A D | .gitignore | 215 ext/simplexml/examples/security.new.xml
|
H A D | README.RELEASE_PROCESS | 243 highlight the major important things (security fixes) and when it is important 284 highlight the major important things (security fixes) and when it is important
|
H A D | .gitattributes | 41 /ext/phar/tests/security.phpt -crlf
|
/PHP-5.4/tests/basic/ |
H A D | bug55500.phpt | 2 Bug #55500 (Corrupted $_FILES indices lead to security concern)
|
/PHP-5.4/ext/phar/ |
H A D | phar_internal.h | 697 …ntry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security TSRMLS_DC); 698 …phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security TSRMLS_DC); 699 …e_len, char *path, int path_len, char *mode, char allow_dir, char **error, int security TSRMLS_DC); 700 …e_len, char *path, int path_len, char *mode, char allow_dir, char **error, int security TSRMLS_DC);
|
H A D | util.c | 575 …char *path, int path_len, char *mode, char allow_dir, char **error, int security TSRMLS_DC) /* {{{… in phar_get_entry_data() 613 …_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security TSRMLS_CC)) == NU… in phar_get_entry_data() 620 …_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security TSRMLS_CC)) == NU… in phar_get_entry_data() 736 …char *path, int path_len, char *mode, char allow_dir, char **error, int security TSRMLS_DC) /* {{{… in phar_get_or_create_entry_data() 754 …t_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security TSRMLS_CC)) { in phar_get_or_create_entry_data() 1459 …fo(phar_archive_data *phar, char *path, int path_len, char **error, int security TSRMLS_DC) /* {{{… in phar_get_entry_info() 1461 return phar_get_entry_info_dir(phar, path, path_len, 0, error, security TSRMLS_CC); in phar_get_entry_info() 1469 …chive_data *phar, char *path, int path_len, char dir, char **error, int security TSRMLS_DC) /* {{{… in phar_get_entry_info_dir() 1485 if (security && path_len >= sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) { in phar_get_entry_info_dir()
|
H A D | TODO | 80 to do this for performance and security reasons. [Greg]
|
/PHP-5.4/ext/shmop/ |
H A D | README | 24 …(the n flag is mostly useful for security perpouses, so that you don't end up opening a faked segm…
|
/PHP-5.4/ext/soap/ |
H A D | TODO | 60 - SOAP security extension
|
/PHP-5.4/tests/security/ |
H A D | open_basedir.inc | 14 // recommended for production use as . bypasses all semblence of security..!
|
/PHP-5.4/win32/build/ |
H A D | config.w32 | 437 ARG_ENABLE("security-flags", "Disable the compiler security flags", "yes");
|
/PHP-5.4/sapi/litespeed/ |
H A D | README | 19 server configuration to enhance server security when mod_php is used.
|