Home
last modified time | relevance | path

Searched refs:payload (Results 1 – 9 of 9) sorted by relevance

/PHP-5.6/ext/pdo_pgsql/tests/
H A Dbug68199.phpt35 $db->exec("NOTIFY notifies_phpt, 'payload'");
44 $db->exec("NOTIFY notifies_phpt, 'payload'");
49 var_dump($notify['payload']);
65 var_dump($notify['payload']);
73 var_dump($notify['payload']);
89 string(7) "payload"
93 string(7) "payload"
97 string(7) "payload"
101 string(7) "payload"
105 string(7) "payload"
[all …]
/PHP-5.6/ext/mcrypt/tests/
H A Dbug70625.phpt9 $ciphertext = mcrypt_encrypt(MCRYPT_ARCFOUR, $key, 'payload', MCRYPT_MODE_STREAM);
17 string(7) "payload"
/PHP-5.6/ext/imap/tests/
H A Dbug77153.phpt11 $payload = "echo 'BUG'> " . __DIR__ . '/__bug';
12 $payloadb64 = base64_encode($payload);
/PHP-5.6/ext/json/tests/
H A Dfail001.phpt11 '"A JSON payload should be an object or array, not a string."',
47 Testing: "A JSON payload should be an object or array, not a string."
49 string(58) "A JSON payload should be an object or array, not a string."
51 string(58) "A JSON payload should be an object or array, not a string."
/PHP-5.6/ext/standard/tests/file/
H A Dstream_rfc2397_006.phpt2 Stream: RFC2397 with corrupt? payload
/PHP-5.6/ext/standard/tests/strings/
H A Dbug72433.phpt9 // Create our payload and unserialize it.
H A Dbug72434.phpt11 // Create our payload and unserialize it.
/PHP-5.6/ext/dom/
H A Ddom_iterators.c45 static void itemHashScanner (void *payload, void *data, xmlChar *name) /* {{{ */ in itemHashScanner() argument
53 priv->node = (xmlNode *)payload; in itemHashScanner()
/PHP-5.6/ext/wddx/
H A Dwddx.c1382 char *payload; in PHP_FUNCTION() local
1391 payload = Z_STRVAL_P(packet); in PHP_FUNCTION()
1396 payload_len = php_stream_copy_to_mem(stream, &payload, PHP_STREAM_COPY_ALL, 0); in PHP_FUNCTION()
1407 php_wddx_deserialize_ex(payload, payload_len, return_value); in PHP_FUNCTION()
1410 pefree(payload, 0); in PHP_FUNCTION()

Completed in 24 milliseconds