/PHP-8.3/ext/pdo_pgsql/tests/ |
H A D | bug68199.phpt | 37 $db->exec("NOTIFY notifies_phpt, 'payload'"); 46 $db->exec("NOTIFY notifies_phpt, 'payload'"); 51 var_dump($notify['payload']); 67 var_dump($notify['payload']); 75 var_dump($notify['payload']); 91 string(7) "payload" 95 string(7) "payload" 99 string(7) "payload" 103 string(7) "payload" 107 string(7) "payload" [all …]
|
/PHP-8.3/ext/standard/tests/serialize/ |
H A D | __serialize_003.phpt | 27 return "payload"; 30 public function unserialize($payload) { 32 var_dump($payload); 40 var_dump(unserialize('C:4:"Test":7:{payload}')); 54 string(7) "payload"
|
H A D | unserialize_abstract_class.phpt | 6 $payload = 'O:23:"RecursiveFilterIterator":0:{}'; 8 var_dump(unserialize($payload));
|
H A D | __serialize_007.phpt | 6 $payload = 'O:13:"ArrayIterator":2:{i:0;i:0;s:1:"x";R:2;}'; 8 var_dump(unserialize($payload));
|
H A D | unserialize_leak.phpt | 6 $payload = 'C:16:"SplObjectStorage":113:{x:i:2;O:8:"stdClass":1:{},a:2:{s:4:"prev";i:2;s:4:"next";O… 8 var_dump(unserialize($payload));
|
H A D | __serialize_005.phpt | 28 public function __unserialize(array $payload) { 29 [$data2, $data] = $payload;
|
H A D | unserialize_large.phpt | 2 Unserializing payload with unrealistically large element counts
|
/PHP-8.3/ext/pdo_firebird/tests/ |
H A D | payload_server.php | 10 $payload = file_get_contents($filename); variable 11 if ($payload === false) { 19 fwrite($conn, $payload);
|
H A D | payload_server.inc | 12 // First, wait for the payload server to declare itself ready. 24 if (preg_match('/FB payload server listening on (.+)/', $line, $matches)) { 41 // note: even when server prints 'FB payload server listening on localhost:12345'
|
H A D | payload_test.phpt | 2 FB payload server satisfies connection attempt
|
/PHP-8.3/ext/imap/tests/ |
H A D | bug77153.phpt | 9 $payload = "echo 'BUG'> " . __DIR__ . '/__bug'; 10 $payloadb64 = base64_encode($payload);
|
/PHP-8.3/ext/date/tests/ |
H A D | bug79015.phpt | 5 $payload = 'O:12:"DateInterval":9:{s:1:"y";i:1;s:1:"m";i:0;s:1:"d";i:4;s:1:"h";i:0;s:1:"i";i:0;s:1:… 6 var_dump(unserialize($payload));
|
/PHP-8.3/Zend/ |
H A D | zend_weakrefs.c | 97 static void zend_weakref_register(zend_object *object, void *payload) { in zend_weakref_register() argument 103 ZVAL_PTR(zv, payload); in zend_weakref_register() 110 zend_hash_index_add_new_ptr(ht, (zend_ulong) payload, payload); in zend_weakref_register() 118 zend_hash_index_add_new_ptr(ht, (zend_ulong) payload, payload); in zend_weakref_register() 131 ZEND_ASSERT(tagged_ptr == payload); in zend_weakref_unregister() 140 ZEND_ASSERT(ZEND_WEAKREF_GET_TAG(payload) == ZEND_WEAKREF_TAG_MAP); in zend_weakref_unregister() 147 void *old_payload = zend_hash_index_find_ptr(ht, (zend_ulong) payload); in zend_weakref_unregister() 149 ZEND_ASSERT(old_payload == payload); in zend_weakref_unregister() 151 zend_hash_index_del(ht, (zend_ulong) payload); in zend_weakref_unregister() 162 ZEND_WEAKREF_GET_PTR(payload), ZEND_WEAKREF_GET_TAG(payload), object); in zend_weakref_unregister() [all …]
|
/PHP-8.3/ext/spl/tests/ |
H A D | bug74669.phpt | 78 $payload = 'x:i:33554432;O:8:"stdClass":0:{};m:a:0:{}'; 79 $str = 'C:11:"ArrayObject":' . strlen($payload) . ':{' . $payload . '}';
|
/PHP-8.3/ext/mysqlnd/ |
H A D | mysqlnd_commands.c | 304 …mand, change_user)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload, const bool silen… in MYSQLND_METHOD() 311 …d(conn->payload_decoder_factory, COM_CHANGE_USER, (const zend_uchar*) payload.s, payload.l, silent, in MYSQLND_METHOD() 368 …QLND_METHOD(mysqlnd_command, stmt_execute)(MYSQLND_CONN_DATA * conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD() 376 (const unsigned char *) payload.s, payload.l, FALSE, in MYSQLND_METHOD() 391 …_METHOD(mysqlnd_command, stmt_fetch)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD() 398 …and(conn->payload_decoder_factory, COM_STMT_FETCH, (const zend_uchar*) payload.s, payload.l, FALSE, in MYSQLND_METHOD() 442 …ysqlnd_command, stmt_send_long_data)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD() 449 …>payload_decoder_factory, COM_STMT_SEND_LONG_DATA, (const zend_uchar*) payload.s, payload.l, FALSE, in MYSQLND_METHOD()
|
H A D | mysqlnd_ps.c | 45 const MYSQLND_CSTRING payload = {(const char*) buf, sizeof(buf)}; in mysqlnd_stmt_send_cursor_fetch_command() local 50 if (conn->command->stmt_fetch(conn, payload) == FAIL) { in mysqlnd_stmt_send_cursor_fetch_command() 695 const MYSQLND_CSTRING payload = {(const char*) request, request_len}; in MYSQLND_METHOD() local 697 ret = conn->command->stmt_execute(conn, payload); in MYSQLND_METHOD() 1045 const MYSQLND_CSTRING payload = {(const char *) cmd_buf, packet_len}; in MYSQLND_METHOD() local 1047 ret = conn->command->stmt_send_long_data(conn, payload); in MYSQLND_METHOD()
|
H A D | mysqlnd_structs.h | 316 …e_com_change_user)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload, const bool silen… 319 … (*func_mysqlnd_execute_com_stmt_execute)(MYSQLND_CONN_DATA * conn, const MYSQLND_CSTRING payload); 320 …unc_mysqlnd_execute_com_stmt_fetch)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload); 322 …nd_execute_com_stmt_send_long_data)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload);
|
H A D | mysqlnd_wireprotocol.c | 618 …const MYSQLND_CSTRING payload = {(char*) buffer + MYSQLND_HEADER_SIZE, p - (buffer + MYSQLND_HEADE… in php_mysqlnd_auth_write() local 621 ret = conn->command->change_user(conn, payload, silent); in php_mysqlnd_auth_write()
|
/PHP-8.3/ext/json/tests/ |
H A D | fail001.phpt | 7 '"A JSON payload should be an object or array, not a string."', 43 Testing: "A JSON payload should be an object or array, not a string." 45 string(58) "A JSON payload should be an object or array, not a string." 47 string(58) "A JSON payload should be an object or array, not a string."
|
/PHP-8.3/ext/standard/libavifinfo/ |
H A D | README.md | 6 partially parse an AVIF payload and to extract the width, height, bit depth and
|
/PHP-8.3/ext/standard/tests/file/ |
H A D | stream_rfc2397_006.phpt | 2 Stream: RFC2397 with corrupt? payload
|
/PHP-8.3/ext/standard/tests/strings/ |
H A D | bug72434.phpt | 7 // Create our payload and unserialize it.
|
/PHP-8.3/ext/dom/ |
H A D | dom_iterators.c | 43 static void itemHashScanner (void *payload, void *data, const xmlChar *name) /* {{{ */ in itemHashScanner() argument 45 static void itemHashScanner (void *payload, void *data, xmlChar *name) in itemHashScanner() 54 priv->node = (xmlNode *)payload; in itemHashScanner()
|
/PHP-8.3/ext/fileinfo/tests/ |
H A D | magic | 22869 >>>>28 ulelong x payload size: %u bytes, 22888 >>>>28 ulelong x payload size: %u bytes, 22908 >>>>20 ulelong x payload size: %u bytes, 22923 >>>>20 ulelong x payload size: %u bytes, 22924 >>>>24 ulelong x payload checksum: %#08X 22946 >>>16 ulelong x payload size: %u bytes, 22947 >>>20 ulelong x payload checksum: %#08X 24263 # payload-offset; start offset of the bulk data 36177 >>21 ubyte !64 \b, maximum payload %u 36179 >>22 ubyte !32 \b, minimum payload %u [all …]
|
H A D | magic私はガラスを食べられます | 22869 >>>>28 ulelong x payload size: %u bytes, 22888 >>>>28 ulelong x payload size: %u bytes, 22908 >>>>20 ulelong x payload size: %u bytes, 22923 >>>>20 ulelong x payload size: %u bytes, 22924 >>>>24 ulelong x payload checksum: %#08X 22946 >>>16 ulelong x payload size: %u bytes, 22947 >>>20 ulelong x payload checksum: %#08X 24263 # payload-offset; start offset of the bulk data 36177 >>21 ubyte !64 \b, maximum payload %u 36179 >>22 ubyte !32 \b, minimum payload %u [all …]
|