/PHP-8.0/TSRM/ |
H A D | tsrm_win32.c | 452 SECURITY_ATTRIBUTES security; in popen_ex() local 502 security.nLength = sizeof(SECURITY_ATTRIBUTES); in popen_ex() 503 security.bInheritHandle = TRUE; in popen_ex() 504 security.lpSecurityDescriptor = NULL; in popen_ex() 506 if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) { in popen_ex() 540 …DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &t… in popen_ex() 561 …res = CreateProcessAsUserW(token_user, NULL, cmdw, &security, &security, security.bInheritHandle, … in popen_ex() 564 …res = CreateProcessW(NULL, cmdw, &security, &security, security.bInheritHandle, dwCreateFlags, env… in popen_ex()
|
/PHP-8.0/Zend/tests/ |
H A D | errmsg_021.phpt | 16 Warning: test() has been disabled for security reasons in %s on line %d
|
H A D | bug77494.phpt | 13 Warning: CURLFile() has been disabled for security reasons in %sbug77494.php on line 2
|
/PHP-8.0/docs/ |
H A D | input-filter.md | 8 which a company-wide or site-wide security policy can be enforced. It is 10 functions. To implement your own security policy you will need to write a 13 implement your own security policy, read on.
|
H A D | release-process.md | 171 highlight the major important things (security fixes) and when it is 286 * `$PHP_X_Y_TAGS` array should include `security` if this is a security 295 Add `--security` for a security release. 329 highlight the major important things (security fixes) and when it is 332 * Call `php bin/createReleaseEntry -v <version> [ --security ]` in your 370 highlight the major important things (security fixes) and when it is 373 * Call `php bin/createReleaseEntry -v <version> [ --security ]` in your
|
/PHP-8.0/tests/basic/ |
H A D | bug55500.phpt | 2 Bug #55500 (Corrupted $_FILES indices lead to security concern)
|
/PHP-8.0/ext/openssl/tests/ |
H A D | bug65538_002.phpt | 21 Warning: remote cafile streams are disabled for security purposes in %s on line %d
|
H A D | stream_security_level.phpt | 25 // Make sure the server side starts up successfully if the default security level is
|
/PHP-8.0/ext/standard/tests/network/ |
H A D | news.rss | 24 …evelopment team announces the immediate availability of PHP 5.4.37. Six security-related bugs were…
|
/PHP-8.0/ext/phar/ |
H A D | phar_internal.h | 598 …r_get_entry_info(phar_archive_data *phar, char *path, size_t path_len, char **error, int security); 599 …fo_dir(phar_archive_data *phar, char *path, size_t path_len, char dir, char **error, int security); 600 …me_len, char *path, size_t path_len, const char *mode, char allow_dir, char **error, int security); 601 …me_len, char *path, size_t path_len, const char *mode, char allow_dir, char **error, int security);
|
H A D | util.c | 341 …har *path, size_t path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_entry_data() argument 379 … allow_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data() 386 …, path_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data() 507 …har *path, size_t path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_or_create_entry_data() argument 525 …== phar_get_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security)) { in phar_get_or_create_entry_data() 1198 …ry_info(phar_archive_data *phar, char *path, size_t path_len, char **error, int security) /* {{{ */ in phar_get_entry_info() argument 1200 return phar_get_entry_info_dir(phar, path, path_len, 0, error, security); in phar_get_entry_info() 1208 …ar_archive_data *phar, char *path, size_t path_len, char dir, char **error, int security) /* {{{ */ in phar_get_entry_info_dir() argument 1224 if (security && path_len >= sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) { in phar_get_entry_info_dir()
|
/PHP-8.0/ext/exif/tests/ |
H A D | bug50845.phpt | 46 …nd (LSD-41), May 5, 2016. The vehicles were loaded to support a theater security cooperation event…
|
/PHP-8.0/ext/session/tests/ |
H A D | save_handler.inc | 133 // security reasons for production save handler. 156 // NOTE: This handler is mandatory for session security.
|
/PHP-8.0/ext/snmp/tests/ |
H A D | snmp-object.phpt | 95 echo "SNMPv3 (default security settings)\n"; 209 SNMPv3 (default security settings)
|
/PHP-8.0/tests/security/ |
H A D | open_basedir.inc | 14 // recommended for production use as . bypasses all semblances of security..!
|
/PHP-8.0/ |
H A D | CONTRIBUTING.md | 333 … release the PHP 7.2.x series. This is an old stable version and is open for security fixes only. | 347 1. All non-security bugfix changes should first go to the lowest bugfix branch 348 (i.e. 7.3) and then get merged up to all other branches. All security fixes 349 should go to the lowest security fixes branch (i.e 7.2). If a change is not
|
H A D | php.ini-development | 76 ; php.ini-production contains settings which hold security, performance and 78 ; compatibility with older or less security conscience applications. We 394 ; (e.g. by adding its signature to the Web server header). It is no security 754 ; see documentation for security issues. The alternate is to use the 780 ; cgi.force_redirect is necessary to provide security running PHP as a CGI under 794 ; cause security issues, KNOW WHAT YOU ARE DOING FIRST. 808 ; of the web tree and people will not be able to circumvent .htaccess security. 812 ; security tokens of the calling client. This allows IIS to define the 813 ; security context that the request runs under. mod_fastcgi under Apache 1457 ; Use of trans sid may risk your users' security. [all …]
|
H A D | php.ini-production | 76 ; php.ini-production contains settings which hold security, performance and 78 ; compatibility with older or less security conscience applications. We 396 ; (e.g. by adding its signature to the Web server header). It is no security 756 ; see documentation for security issues. The alternate is to use the 782 ; cgi.force_redirect is necessary to provide security running PHP as a CGI under 796 ; cause security issues, KNOW WHAT YOU ARE DOING FIRST. 810 ; of the web tree and people will not be able to circumvent .htaccess security. 814 ; security tokens of the calling client. This allows IIS to define the 815 ; security context that the request runs under. mod_fastcgi under Apache 1459 ; Use of trans sid may risk your users' security. [all …]
|
H A D | README.REDIST.BINS | 173 as part of a software package, or anywhere else to improve security,
|
H A D | UPGRADING | 466 to fix potential security vulnerabilities due to object instantiation, autoloading, etc.
|
/PHP-8.0/win32/build/ |
H A D | config.w32 | 317 ARG_ENABLE("security-flags", "Disable the compiler security flags", "yes");
|
/PHP-8.0/sapi/litespeed/ |
H A D | README.md | 18 security when mod_php is used. Usually, FastCGI PHP is not an option in shared
|
/PHP-8.0/sapi/fpm/ |
H A D | www.conf.in | 381 ; Note: chrooting is a great security feature and should be used whenever 421 ;security.limit_extensions = .php .php3 .php4 .php5 .php7
|
/PHP-8.0/build/ |
H A D | libtool.m4 | 2177 dnl not every word. This closes a longstanding sh security hole. 3726 # For security reasons, it is highly recommended that you always
|
/PHP-8.0/ext/fileinfo/tests/ |
H A D | magic私はガラスを食べられます | 26026 0 beshort 0x9501 PGP key security ring 26028 0 beshort 0x9500 PGP key security ring
|