Searched refs:payload (Results 1 – 9 of 9) sorted by relevance
/PHP-5.6/ext/pdo_pgsql/tests/ |
H A D | bug68199.phpt | 35 $db->exec("NOTIFY notifies_phpt, 'payload'"); 44 $db->exec("NOTIFY notifies_phpt, 'payload'"); 49 var_dump($notify['payload']); 65 var_dump($notify['payload']); 73 var_dump($notify['payload']); 89 string(7) "payload" 93 string(7) "payload" 97 string(7) "payload" 101 string(7) "payload" 105 string(7) "payload" [all …]
|
/PHP-5.6/ext/mcrypt/tests/ |
H A D | bug70625.phpt | 9 $ciphertext = mcrypt_encrypt(MCRYPT_ARCFOUR, $key, 'payload', MCRYPT_MODE_STREAM); 17 string(7) "payload"
|
/PHP-5.6/ext/imap/tests/ |
H A D | bug77153.phpt | 11 $payload = "echo 'BUG'> " . __DIR__ . '/__bug'; 12 $payloadb64 = base64_encode($payload);
|
/PHP-5.6/ext/json/tests/ |
H A D | fail001.phpt | 11 '"A JSON payload should be an object or array, not a string."', 47 Testing: "A JSON payload should be an object or array, not a string." 49 string(58) "A JSON payload should be an object or array, not a string." 51 string(58) "A JSON payload should be an object or array, not a string."
|
/PHP-5.6/ext/standard/tests/file/ |
H A D | stream_rfc2397_006.phpt | 2 Stream: RFC2397 with corrupt? payload
|
/PHP-5.6/ext/standard/tests/strings/ |
H A D | bug72433.phpt | 9 // Create our payload and unserialize it.
|
H A D | bug72434.phpt | 11 // Create our payload and unserialize it.
|
/PHP-5.6/ext/dom/ |
H A D | dom_iterators.c | 45 static void itemHashScanner (void *payload, void *data, xmlChar *name) /* {{{ */ in itemHashScanner() argument 53 priv->node = (xmlNode *)payload; in itemHashScanner()
|
/PHP-5.6/ext/wddx/ |
H A D | wddx.c | 1382 char *payload; in PHP_FUNCTION() local 1391 payload = Z_STRVAL_P(packet); in PHP_FUNCTION() 1396 payload_len = php_stream_copy_to_mem(stream, &payload, PHP_STREAM_COPY_ALL, 0); in PHP_FUNCTION() 1407 php_wddx_deserialize_ex(payload, payload_len, return_value); in PHP_FUNCTION() 1410 pefree(payload, 0); in PHP_FUNCTION()
|
Completed in 24 milliseconds