Home
last modified time | relevance | path

Searched refs:payload (Results 1 – 25 of 26) sorted by relevance

12

/php-src/ext/pdo_pgsql/tests/
H A Dbug68199.phpt37 $db->exec("NOTIFY channel_bug68199, 'payload'");
46 $db->exec("NOTIFY channel_bug68199, 'payload'");
51 var_dump($notify['payload']);
67 var_dump($notify['payload']);
75 var_dump($notify['payload']);
91 string(7) "payload"
95 string(7) "payload"
99 string(7) "payload"
103 string(7) "payload"
107 string(7) "payload"
[all …]
/php-src/ext/standard/tests/serialize/
H A D__serialize_003.phpt27 return "payload";
30 public function unserialize($payload) {
32 var_dump($payload);
40 var_dump(unserialize('C:4:"Test":7:{payload}'));
54 string(7) "payload"
H A Dunserialize_abstract_class.phpt6 $payload = 'O:23:"RecursiveFilterIterator":0:{}';
8 var_dump(unserialize($payload));
H A D__serialize_007.phpt6 $payload = 'O:13:"ArrayIterator":2:{i:0;i:0;s:1:"x";R:2;}';
8 var_dump(unserialize($payload));
H A Dunserialize_leak.phpt6 $payload = 'C:16:"SplObjectStorage":113:{x:i:2;O:8:"stdClass":1:{},a:2:{s:4:"prev";i:2;s:4:"next";O…
8 var_dump(unserialize($payload));
H A D__serialize_005.phpt28 public function __unserialize(array $payload) {
29 [$data2, $data] = $payload;
H A Dunserialize_large.phpt2 Unserializing payload with unrealistically large element counts
/php-src/ext/pdo_firebird/tests/
H A Dpayload_server.php10 $payload = file_get_contents($filename); variable
11 if ($payload === false) {
19 fwrite($conn, $payload);
H A Dpayload_server.inc12 // First, wait for the payload server to declare itself ready.
24 if (preg_match('/FB payload server listening on (.+)/', $line, $matches)) {
41 // note: even when server prints 'FB payload server listening on localhost:12345'
H A Dpayload_test.phpt2 FB payload server satisfies connection attempt
/php-src/ext/date/tests/
H A Dbug79015.phpt5 $payload = 'O:12:"DateInterval":9:{s:1:"y";i:1;s:1:"m";i:0;s:1:"d";i:4;s:1:"h";i:0;s:1:"i";i:0;s:1:…
6 var_dump(unserialize($payload));
/php-src/Zend/
H A Dzend_weakrefs.c97 static void zend_weakref_register(zend_object *object, void *payload) { in zend_weakref_register() argument
103 ZVAL_PTR(zv, payload); in zend_weakref_register()
110 zend_hash_index_add_new_ptr(ht, (zend_ulong) payload, payload); in zend_weakref_register()
118 zend_hash_index_add_new_ptr(ht, (zend_ulong) payload, payload); in zend_weakref_register()
131 ZEND_ASSERT(tagged_ptr == payload); in zend_weakref_unregister()
140 ZEND_ASSERT(ZEND_WEAKREF_GET_TAG(payload) == ZEND_WEAKREF_TAG_MAP); in zend_weakref_unregister()
147 void *old_payload = zend_hash_index_find_ptr(ht, (zend_ulong) payload); in zend_weakref_unregister()
149 ZEND_ASSERT(old_payload == payload); in zend_weakref_unregister()
151 zend_hash_index_del(ht, (zend_ulong) payload); in zend_weakref_unregister()
162 ZEND_WEAKREF_GET_PTR(payload), ZEND_WEAKREF_GET_TAG(payload), object); in zend_weakref_unregister()
[all …]
/php-src/ext/spl/tests/
H A Dbug74669.phpt78 $payload = 'x:i:33554432;O:8:"stdClass":0:{};m:a:0:{}';
79 $str = 'C:11:"ArrayObject":' . strlen($payload) . ':{' . $payload . '}';
/php-src/ext/mysqlnd/
H A Dmysqlnd_commands.c304 …mand, change_user)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload, const bool silen… in MYSQLND_METHOD()
311 …d(conn->payload_decoder_factory, COM_CHANGE_USER, (const zend_uchar*) payload.s, payload.l, silent, in MYSQLND_METHOD()
368 …QLND_METHOD(mysqlnd_command, stmt_execute)(MYSQLND_CONN_DATA * conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD()
376 (const unsigned char *) payload.s, payload.l, FALSE, in MYSQLND_METHOD()
391 …_METHOD(mysqlnd_command, stmt_fetch)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD()
398 …and(conn->payload_decoder_factory, COM_STMT_FETCH, (const zend_uchar*) payload.s, payload.l, FALSE, in MYSQLND_METHOD()
442 …ysqlnd_command, stmt_send_long_data)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD()
449 …>payload_decoder_factory, COM_STMT_SEND_LONG_DATA, (const zend_uchar*) payload.s, payload.l, FALSE, in MYSQLND_METHOD()
H A Dmysqlnd_ps.c45 const MYSQLND_CSTRING payload = {(const char*) buf, sizeof(buf)}; in mysqlnd_stmt_send_cursor_fetch_command() local
50 if (conn->command->stmt_fetch(conn, payload) == FAIL) { in mysqlnd_stmt_send_cursor_fetch_command()
695 const MYSQLND_CSTRING payload = {(const char*) request, request_len}; in MYSQLND_METHOD() local
697 ret = conn->command->stmt_execute(conn, payload); in MYSQLND_METHOD()
1045 const MYSQLND_CSTRING payload = {(const char *) cmd_buf, packet_len}; in MYSQLND_METHOD() local
1047 ret = conn->command->stmt_send_long_data(conn, payload); in MYSQLND_METHOD()
H A Dmysqlnd_structs.h317 …e_com_change_user)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload, const bool silen…
320 … (*func_mysqlnd_execute_com_stmt_execute)(MYSQLND_CONN_DATA * conn, const MYSQLND_CSTRING payload);
321 …unc_mysqlnd_execute_com_stmt_fetch)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload);
323 …nd_execute_com_stmt_send_long_data)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload);
H A Dmysqlnd_wireprotocol.c612 …const MYSQLND_CSTRING payload = {(char*) buffer + MYSQLND_HEADER_SIZE, p - (buffer + MYSQLND_HEADE… in php_mysqlnd_auth_write() local
615 ret = conn->command->change_user(conn, payload, silent); in php_mysqlnd_auth_write()
/php-src/ext/json/tests/
H A Dfail001.phpt7 '"A JSON payload should be an object or array, not a string."',
43 Testing: "A JSON payload should be an object or array, not a string."
45 string(58) "A JSON payload should be an object or array, not a string."
47 string(58) "A JSON payload should be an object or array, not a string."
/php-src/ext/openssl/tests/
H A Ded25519.phpt46 $payload = "somedata";
47 var_dump(openssl_sign($payload, $signature, $key1, 0));
49 var_dump(openssl_verify($payload, $signature, $pubkey1, 0));
H A Ded448.phpt46 $payload = "somedata";
47 var_dump(openssl_sign($payload, $signature, $key1, 0));
49 var_dump(openssl_verify($payload, $signature, $pubkey1, 0));
/php-src/ext/standard/libavifinfo/
H A DREADME.md6 partially parse an AVIF payload and to extract the width, height, bit depth and
/php-src/ext/standard/tests/file/
H A Dstream_rfc2397_006.phpt2 Stream: RFC2397 with corrupt? payload
/php-src/ext/dom/
H A Ddom_iterators.c35 static void itemHashScanner (void *payload, void *data, const xmlChar *name) /* {{{ */ in itemHashScanner() argument
37 static void itemHashScanner (void *payload, void *data, xmlChar *name) in itemHashScanner()
46 priv->node = payload; in itemHashScanner()
/php-src/ext/standard/tests/strings/
H A Dbug72434.phpt7 // Create our payload and unserialize it.
/php-src/ext/fileinfo/tests/
H A Dmagic私はガラスを食べられます22869 >>>>28 ulelong x payload size: %u bytes,
22888 >>>>28 ulelong x payload size: %u bytes,
22908 >>>>20 ulelong x payload size: %u bytes,
22923 >>>>20 ulelong x payload size: %u bytes,
22924 >>>>24 ulelong x payload checksum: %#08X
22946 >>>16 ulelong x payload size: %u bytes,
22947 >>>20 ulelong x payload checksum: %#08X
24263 # payload-offset; start offset of the bulk data
36177 >>21 ubyte !64 \b, maximum payload %u
36179 >>22 ubyte !32 \b, minimum payload %u
[all …]

Completed in 113 milliseconds

12