/PHP-7.3/ |
H A D | .appveyor.yml | 24 … #PDO_MYSQL_TEST_DSN: "pgsql:host=127.0.0.1 port=5432 dbname=test user=root password=Password12!" 27 … #PGSQL_TEST_CONNSTR: "host=127.0.0.1 dbname=test port=5432 user=postgres password=Password12!" 28 …#PDO_PGSQL_TEST_DSN: "pgsql:host=127.0.0.1 port=5432 dbname=test user=postgres password=Password12…
|
H A D | README.REDIST.BINS | 158 This code comes from John the Ripper password cracker, with reentrant 159 and crypt(3) interfaces added, but optimizations specific to password 184 ideas. The password hashing algorithm was designed by David Mazieres
|
H A D | UPGRADING | 257 . The --with-password-argon2[=dir] configure argument now provides support for
|
/PHP-7.3/appveyor/ |
H A D | test_task.bat | 30 …QL_TEST_HOST%;port=%PDO_MYSQL_TEST_PORT%;dbname=test;user=%PDO_MYSQL_TEST_USER%;password=%MYSQL_PW% 37 rem set PGSQL_TEST_CONNSTR=host=127.0.0.1 dbname=test port=5432 user=postgres password=Password12! 38 echo ^<?php $conn_str = "host=127.0.0.1 dbname=test port=5432 user=%PGUSER% password=%PGPASSWORD%";… 39 set PDO_PGSQL_TEST_DSN=pgsql:host=127.0.0.1 port=5432 dbname=test user=%PGUSER% password=%PGPASSWOR…
|
/PHP-7.3/ext/com_dotnet/ |
H A D | com_com.c | 37 char *user_name = NULL, *domain_name = NULL, *password = NULL; in PHP_FUNCTION() local 104 password = Z_STRVAL_P(tmp); in PHP_FUNCTION() 139 if (password) { in PHP_FUNCTION() 140 authid.Password = (OLECHAR*)password; in PHP_FUNCTION()
|
/PHP-7.3/ext/curl/tests/ |
H A D | curl_ftp_pasv.phpt | 14 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD'); 18 $url = "ftp://$username:$password@$host/test.phpt" ;
|
H A D | curl_multi_segfault.phpt | 14 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD'); 18 $url = "ftp://$username:$password@$host/" ;
|
/PHP-7.3/ext/fileinfo/tests/ |
H A D | magic | 3587 # ~ 30 byte password field only for *.gho 3588 >>12 ubequad !0 \b, password protected 7252 0 lelong 0x70775631 Cracklib password index, little endian 7256 0 belong 0x70775631 Cracklib password index, big endian 7259 0 search/1 \0\0\0\0pwV1 Cracklib password index, big endian ("64-bit") 16162 >17 byte >0 \b, password protected 16366 0 lelong 0x9AA2D903 Keepass password database 22963 0 string/t /1\ :pserver: cvs password text file 24776 0 string Salted__ openssl enc'd data with salted password 27278 # size of password name (0,1Ch) [all …]
|
H A D | magic私はガラスを食べられます | 3587 # ~ 30 byte password field only for *.gho 3588 >>12 ubequad !0 \b, password protected 7252 0 lelong 0x70775631 Cracklib password index, little endian 7256 0 belong 0x70775631 Cracklib password index, big endian 7259 0 search/1 \0\0\0\0pwV1 Cracklib password index, big endian ("64-bit") 16162 >17 byte >0 \b, password protected 16366 0 lelong 0x9AA2D903 Keepass password database 22963 0 string/t /1\ :pserver: cvs password text file 24776 0 string Salted__ openssl enc'd data with salted password 27278 # size of password name (0,1Ch) [all …]
|
/PHP-7.3/ext/ftp/ |
H A D | php_ftp.c | 59 ZEND_ARG_INFO(0, password)
|
/PHP-7.3/ext/ftp/tests/ |
H A D | server.inc | 154 fputs($s, "331 User name ok, need password\r\n");
|
/PHP-7.3/ext/hash/ |
H A D | hash.c | 1038 char *password, *salt; in PHP_FUNCTION() local 1042 …if (zend_parse_parameters(ZEND_NUM_ARGS(), "lssl", &algorithm, &password, &password_len, &salt, &s… in PHP_FUNCTION() 1087 ops->hash_update(context, (unsigned char *)password, password_len); in PHP_FUNCTION() 1382 ZEND_ARG_INFO(0, password)
|
/PHP-7.3/ext/hash/tests/ |
H A D | bug64745.phpt | 7 $hash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0); 8 $rawHash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0, true);
|
H A D | hash_pbkdf2_basic.phpt | 16 echo "sha1: " . hash_pbkdf2('sha1', 'password', 'salt', 1, 20)."\n"; 17 echo "sha1(no length): " . hash_pbkdf2('sha1', 'password', 'salt', 1)."\n"; 18 echo "sha1(raw): " . bin2hex(hash_pbkdf2('sha1', 'password', 'salt', 1, 20, TRUE))."\n"; 21 echo "sha256: " . hash_pbkdf2('sha256', 'password', 'salt', 1, 20)."\n"; 22 echo "sha256(no length): " . hash_pbkdf2('sha256', 'password', 'salt', 1)."\n"; 23 echo "sha256(raw): " . bin2hex(hash_pbkdf2('sha256', 'password', 'salt', 1, 20, TRUE))."\n";
|
H A D | hash_pbkdf2_error.phpt | 8 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int le… 9 Generate a PBKDF2 hash of the given password and salt 14 $password = 'password'; 20 var_dump(hash_pbkdf2('md5', $password)); 21 var_dump(hash_pbkdf2('md5', $password, $salt)); 24 var_dump(hash_pbkdf2('md5', $password, $salt, 10, 10, true, 'extra arg')); 27 var_dump(hash_pbkdf2('foo', $password, $salt, 1)); 30 var_dump(hash_pbkdf2('crc32', $password, $salt, 1)); 33 var_dump(hash_pbkdf2('md5', $password, $salt, 0)); 34 var_dump(hash_pbkdf2('md5', $password, $salt, -1)); [all …]
|
/PHP-7.3/ext/imap/ |
H A D | php_imap.c | 104 ZEND_ARG_INFO(0, password)
|
/PHP-7.3/ext/imap/tests/ |
H A D | README | 8 … the tests is given below (after -----). The dovecot password file (dovecotpass) requires a passwo…
|
H A D | bug63126.phpt | 9 $in = imap_open($default_mailbox, $username, $password, OP_HALFOPEN, 1); 34 $in = imap_open($default_mailbox, $username, $password, OP_HALFOPEN, 1, $testparams);
|
H A D | bug80226.phpt | 10 $stream = imap_open($default_mailbox, $username, $password);
|
H A D | clean.inc | 4 $imap_stream = imap_open($default_mailbox, $username, $password);
|
H A D | imap_body.phpt | 19 $stream_id = imap_open($default_mailbox, $username, $password) or
|
H A D | imap_close_basic.phpt | 33 $stream_id = imap_open($mailbox, $username, $password);
|
H A D | imap_close_error.phpt | 27 $stream_id = imap_open($server, $username, $password);
|
H A D | imap_close_variation2.phpt | 94 $imap_stream = imap_open($mailbox, $username, $password); 107 $stream_id = imap_open($mailbox, $username, $password);
|
H A D | imap_close_variation4.phpt | 43 $imap_stream = imap_open($mailbox, $username, $password); 56 $stream_id = imap_open($mailbox, $username, $password);
|