/php-src/.github/actions/setup-x64/ |
H A D | action.yml | 14 ….1 -U SA -P "<YourStrong@Passw0rd>" -Q "create login pdo_test with password='password', check_poli… 15 …1 -U SA -P "<YourStrong@Passw0rd>" -Q "create login odbc_test with password='password', check_poli…
|
/php-src/ext/zip/tests/ |
H A D | bug70752.phpt | 2 Bug #70752 (Depacking with wrong password leaves 0 length files) 14 $zip->setPassword('bar'); // correct password would be 'foo'
|
/php-src/ext/mysqli/tests/ |
H A D | README.md | 22 # Database user password 23 # The default password is empty (no password).
|
H A D | mysqli_report_new.phpt | 26 …20-456789-30-456789-40-456789-50-456789-60-456789-70-456789-80-456789-90-456789", "password", $db); 34 …change_user($link, "This might work if you accept anonymous users in your setup", "password", $db); 43 Warning: mysqli_change_user(): (%d/%d): Access denied for user '%s'@'%s' (using password: %s) in %s…
|
/php-src/ext/mysqli/tests/test_setup/ |
H A D | test_helpers.inc | 25 static $password = null; 26 if ($password === null) { 27 $password = getenv('MYSQL_TEST_PASSWD') ?: ''; 29 return $password; 74 string $password, 89 mysqli_real_connect($link, $host, $user, $password, $db, $port, $socket, $flags); 94 $link = @mysqli_connect($host, $user, $password, $db, $port, $socket);
|
/php-src/.github/actions/test-linux/ |
H A D | action.yml | 30 export PDO_DBLIB_TEST_PASS="password" 31 … export PGSQL_TEST_CONNSTR="host=localhost dbname=test port=5432 user=postgres password=postgres" 33 …ort PDO_PGSQL_TEST_DSN="pgsql:host=localhost port=5432 dbname=test user=postgres password=postgres" 40 export ODBC_TEST_PASS="password"
|
/php-src/ext/standard/tests/password/ |
H A D | password_bcrypt_errors.phpt | 19 var_dump(password_hash("null\0password", PASSWORD_BCRYPT)); 27 Bcrypt password must not contain null character
|
H A D | password_hash_sensitive_parameter.phpt | 2 Test that the password parameter is marked sensitive. 21 ValueError: password_hash(): Argument #2 ($algo) must be a valid password hashing algorithm in%spas…
|
/php-src/ext/openssl/tests/ |
H A D | openssl_encrypt_chacha20_poly1305.phpt | 25 var_dump(openssl_encrypt('data', $method, 'password', 0, '', $tag, '')); 28 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 12), $tag, '', 20)); 31 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 12)));
|
H A D | openssl_encrypt_ccm.phpt | 27 var_dump(openssl_encrypt('data', $method, 'password', 0, '', $tag, '')); 30 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 10), $tag, '', 14)); 34 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 16), $tag, '', 1024));
|
H A D | openssl_encrypt_gcm.phpt | 25 var_dump(openssl_encrypt('data', $method, 'password', 0, '', $tag, '')); 28 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 32), $tag, '', 20)); 31 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 32)));
|
H A D | openssl_encrypt_ocb.phpt | 25 var_dump(openssl_encrypt('data', $method, 'password', 0, '', $tag, '')); 28 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 12), $tag, '', 20)); 31 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 12)));
|
/php-src/ext/pdo_sqlite/tests/ |
H A D | bug48773.phpt | 15 function __construct($dsn, $username, $password, $driver_options = array()) { 17 parent::__construct($dsn, $username, $password, $driver_options);
|
/php-src/ext/pdo_firebird/tests/ |
H A D | payload_test.phpt | 18 $password = 'masterkey'; 20 new PDO($dsn, $username, $password, [
|
H A D | bug_76448.phpt | 18 $password = 'masterkey'; 20 $dbh = new PDO($dsn, $username, $password, [PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION]);
|
H A D | bug_76449.phpt | 18 $password = 'masterkey'; 20 $dbh = new PDO($dsn, $username, $password, [PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION]);
|
H A D | bug_76450.phpt | 18 $password = 'masterkey'; 20 $dbh = new PDO($dsn, $username, $password, [PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION]);
|
H A D | bug_76452.phpt | 19 $password = 'masterkey'; 21 $dbh = new PDO($dsn, $username, $password, [PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION]);
|
/php-src/ext/pdo_pgsql/tests/ |
H A D | bug62479.phpt | 2 PDO PgSQL Bug #62479 (PDO-psql cannot connect if password contains spaces) 50 // Create temp user with space in password 51 $sql = sprintf($template, 'my password'); 53 $testConn = new PDO($config['ENV']['PDOTEST_DSN'], $user, "my password");
|
/php-src/ext/snmp/tests/ |
H A D | snmp-object-setSecurity_error.phpt | 66 …ng a key for authentication pass phrase '': Generic error (The supplied password length is too sho… 69 … a key for authentication pass phrase 'te': Generic error (The supplied password length is too sho… 74 …enerating a key for privacy pass phrase '': Generic error (The supplied password length is too sho… 77 …erating a key for privacy pass phrase 'ty': Generic error (The supplied password length is too sho…
|
H A D | snmp3-error.phpt | 66 …ng a key for authentication pass phrase '': Generic error (The supplied password length is too sho… 69 … a key for authentication pass phrase 'te': Generic error (The supplied password length is too sho… 73 …enerating a key for privacy pass phrase '': Generic error (The supplied password length is too sho… 76 …erating a key for privacy pass phrase 'ty': Generic error (The supplied password length is too sho…
|
/php-src/ext/ldap/tests/ |
H A D | ldap_exop_passwd.phpt | 2 ldap_exop_passwd() - Changing password through EXOP 17 // and optionally returns the NEW password if none was passed.
|
/php-src/ext/curl/tests/ |
H A D | curl_multi_segfault.phpt | 15 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD'); 19 $url = "ftp://$username:$password@$host/" ;
|
/php-src/ext/standard/ |
H A D | php_crypt.h | 22 PHPAPI zend_string *php_crypt(const char *password, const int pass_len, const char *salt, int salt_…
|
/php-src/ext/pdo/tests/ |
H A D | pdo_dsn_containing_credentials.phpt | 27 putenv("PDOTEST_DSN=$orgDsn;user=$orgUser;password=$orgPass"); 36 putenv("PDOTEST_DSN=$orgDsn;user=incorrect;password=ignored");
|