Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 233) sorted by path

12345678910

/PHP-7.3/
H A D.appveyor.yml24 … #PDO_MYSQL_TEST_DSN: "pgsql:host=127.0.0.1 port=5432 dbname=test user=root password=Password12!"
27 … #PGSQL_TEST_CONNSTR: "host=127.0.0.1 dbname=test port=5432 user=postgres password=Password12!"
28 …#PDO_PGSQL_TEST_DSN: "pgsql:host=127.0.0.1 port=5432 dbname=test user=postgres password=Password12…
H A DREADME.REDIST.BINS158 This code comes from John the Ripper password cracker, with reentrant
159 and crypt(3) interfaces added, but optimizations specific to password
184 ideas. The password hashing algorithm was designed by David Mazieres
H A DUPGRADING257 . The --with-password-argon2[=dir] configure argument now provides support for
/PHP-7.3/appveyor/
H A Dtest_task.bat30 …QL_TEST_HOST%;port=%PDO_MYSQL_TEST_PORT%;dbname=test;user=%PDO_MYSQL_TEST_USER%;password=%MYSQL_PW%
37 rem set PGSQL_TEST_CONNSTR=host=127.0.0.1 dbname=test port=5432 user=postgres password=Password12!
38 echo ^<?php $conn_str = "host=127.0.0.1 dbname=test port=5432 user=%PGUSER% password=%PGPASSWORD%";…
39 set PDO_PGSQL_TEST_DSN=pgsql:host=127.0.0.1 port=5432 dbname=test user=%PGUSER% password=%PGPASSWOR…
/PHP-7.3/ext/com_dotnet/
H A Dcom_com.c37 char *user_name = NULL, *domain_name = NULL, *password = NULL; in PHP_FUNCTION() local
104 password = Z_STRVAL_P(tmp); in PHP_FUNCTION()
139 if (password) { in PHP_FUNCTION()
140 authid.Password = (OLECHAR*)password; in PHP_FUNCTION()
/PHP-7.3/ext/curl/tests/
H A Dcurl_ftp_pasv.phpt14 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD');
18 $url = "ftp://$username:$password@$host/test.phpt" ;
H A Dcurl_multi_segfault.phpt14 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD');
18 $url = "ftp://$username:$password@$host/" ;
/PHP-7.3/ext/fileinfo/tests/
H A Dmagic3587 # ~ 30 byte password field only for *.gho
3588 >>12 ubequad !0 \b, password protected
7252 0 lelong 0x70775631 Cracklib password index, little endian
7256 0 belong 0x70775631 Cracklib password index, big endian
7259 0 search/1 \0\0\0\0pwV1 Cracklib password index, big endian ("64-bit")
16162 >17 byte >0 \b, password protected
16366 0 lelong 0x9AA2D903 Keepass password database
22963 0 string/t /1\ :pserver: cvs password text file
24776 0 string Salted__ openssl enc'd data with salted password
27278 # size of password name (0,1Ch)
[all …]
H A Dmagic私はガラスを食べられます3587 # ~ 30 byte password field only for *.gho
3588 >>12 ubequad !0 \b, password protected
7252 0 lelong 0x70775631 Cracklib password index, little endian
7256 0 belong 0x70775631 Cracklib password index, big endian
7259 0 search/1 \0\0\0\0pwV1 Cracklib password index, big endian ("64-bit")
16162 >17 byte >0 \b, password protected
16366 0 lelong 0x9AA2D903 Keepass password database
22963 0 string/t /1\ :pserver: cvs password text file
24776 0 string Salted__ openssl enc'd data with salted password
27278 # size of password name (0,1Ch)
[all …]
/PHP-7.3/ext/ftp/
H A Dphp_ftp.c59 ZEND_ARG_INFO(0, password)
/PHP-7.3/ext/ftp/tests/
H A Dserver.inc154 fputs($s, "331 User name ok, need password\r\n");
/PHP-7.3/ext/hash/
H A Dhash.c1038 char *password, *salt; in PHP_FUNCTION() local
1042 …if (zend_parse_parameters(ZEND_NUM_ARGS(), "lssl", &algorithm, &password, &password_len, &salt, &s… in PHP_FUNCTION()
1087 ops->hash_update(context, (unsigned char *)password, password_len); in PHP_FUNCTION()
1382 ZEND_ARG_INFO(0, password)
/PHP-7.3/ext/hash/tests/
H A Dbug64745.phpt7 $hash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0);
8 $rawHash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0, true);
H A Dhash_pbkdf2_basic.phpt16 echo "sha1: " . hash_pbkdf2('sha1', 'password', 'salt', 1, 20)."\n";
17 echo "sha1(no length): " . hash_pbkdf2('sha1', 'password', 'salt', 1)."\n";
18 echo "sha1(raw): " . bin2hex(hash_pbkdf2('sha1', 'password', 'salt', 1, 20, TRUE))."\n";
21 echo "sha256: " . hash_pbkdf2('sha256', 'password', 'salt', 1, 20)."\n";
22 echo "sha256(no length): " . hash_pbkdf2('sha256', 'password', 'salt', 1)."\n";
23 echo "sha256(raw): " . bin2hex(hash_pbkdf2('sha256', 'password', 'salt', 1, 20, TRUE))."\n";
H A Dhash_pbkdf2_error.phpt8 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int le…
9 Generate a PBKDF2 hash of the given password and salt
14 $password = 'password';
20 var_dump(hash_pbkdf2('md5', $password));
21 var_dump(hash_pbkdf2('md5', $password, $salt));
24 var_dump(hash_pbkdf2('md5', $password, $salt, 10, 10, true, 'extra arg'));
27 var_dump(hash_pbkdf2('foo', $password, $salt, 1));
30 var_dump(hash_pbkdf2('crc32', $password, $salt, 1));
33 var_dump(hash_pbkdf2('md5', $password, $salt, 0));
34 var_dump(hash_pbkdf2('md5', $password, $salt, -1));
[all …]
/PHP-7.3/ext/imap/
H A Dphp_imap.c104 ZEND_ARG_INFO(0, password)
/PHP-7.3/ext/imap/tests/
H A DREADME8 … the tests is given below (after -----). The dovecot password file (dovecotpass) requires a passwo…
H A Dbug63126.phpt9 $in = imap_open($default_mailbox, $username, $password, OP_HALFOPEN, 1);
34 $in = imap_open($default_mailbox, $username, $password, OP_HALFOPEN, 1, $testparams);
H A Dbug80226.phpt10 $stream = imap_open($default_mailbox, $username, $password);
H A Dclean.inc4 $imap_stream = imap_open($default_mailbox, $username, $password);
H A Dimap_body.phpt19 $stream_id = imap_open($default_mailbox, $username, $password) or
H A Dimap_close_basic.phpt33 $stream_id = imap_open($mailbox, $username, $password);
H A Dimap_close_error.phpt27 $stream_id = imap_open($server, $username, $password);
H A Dimap_close_variation2.phpt94 $imap_stream = imap_open($mailbox, $username, $password);
107 $stream_id = imap_open($mailbox, $username, $password);
H A Dimap_close_variation4.phpt43 $imap_stream = imap_open($mailbox, $username, $password);
56 $stream_id = imap_open($mailbox, $username, $password);

Completed in 205 milliseconds

12345678910