Home
last modified time | relevance | path

Searched refs:read (Results 176 – 200 of 552) sorted by relevance

12345678910>>...23

/PHP-7.4/ext/standard/tests/file/
H A Dfgetc_variation1.phpt2 Test fgetc() function : usage variations - read when file pointer at EOF
19 // loop to check the file opened in different read modes
36 var_dump( fgetc($file_handle) ); // try n read a char, none expected
H A Dfgets_socket_variation2.phpt53 echo "\nClose the server side socket and read the remaining data from the client\n";
68 Close the server side socket and read the remaining data from the client
H A Dfgetcsv_variation21.phpt11 Testing fgetcsv() to read a file containing blank line when provided with
40 // close the file if the mode to be used is read mode and re-open using read mode
54 // read the line which is a blank line to see the working of fgetcsv
H A Dfscanf_variation53.phpt11 /* Test fscanf() to read a file when file pointer is pointing to EOF */
15 echo "*** Test fscanf(): to read a file when file pointer is pointing to EOF ***\n";
22 // various read modes
82 *** Test fscanf(): to read a file when file pointer is pointing to EOF ***
/PHP-7.4/Zend/tests/
H A Dexception_during_property_assign_op.phpt2 Exception during read part of compound assignment operation on a property
H A Dbug69420.phpt2 Bug #69420 (Invalid read in zend_std_get_method)
H A Dbug44660.phpt8 echo "--> read access: ";
30 --> read access:
H A Dbug74084.phpt2 Bug #74084 (Out of bound read - zend_mm_alloc_small)
/PHP-7.4/ext/iconv/tests/
H A Dbug78069.phpt2 Bug #78069 (Out-of-bounds read in iconv.c:_php_iconv_mime_decode() due to integer overflow)
/PHP-7.4/ext/standard/tests/streams/
H A Dbug72857.phpt2 Bug #72857 stream_socket_recvfrom read access violation
H A Dbug61019.phpt9 0 => array("pipe", "r"), // stdin is a pipe that the child will read from
44 //read outstanding data
/PHP-7.4/ext/session/tests/
H A Dsave_handler.inc13 * Session data lock is mandatory. Lock must be exclusive. i.e. Block read also.
49 function read($id) {
53 // read() would be the best place for locking for most save handlers.
59 // read MUST create file. Otherwise, strict mode will not work
62 // MUST return STRING for successful read().
72 // NOTE: This function may unlock session data locked by read(). If write() is
/PHP-7.4/ext/gd/tests/
H A Dbug72482.phpt2 Bug #72482 (Ilegal write/read access caused by gdImageAALine overflow)
H A Dbug72512_0.phpt2 Bug #72512 gdImageTrueColorToPaletteBody allows arbitrary write/read access, var 0
H A Dbug72512_1.phpt2 Bug #72512 gdImageTrueColorToPaletteBody allows arbitrary write/read access, var 1
/PHP-7.4/ext/oci8/tests/
H A Dlob_004.phpt42 var_dump($row[0]->read(10000));
52 var_dump($row[0]->read(10000));
/PHP-7.4/ext/xmlreader/tests/
H A D008.phpt33 while($reader->read());
61 while($reader->read());
H A D015-move-errors.phpt18 exit('XML could not be read');
22 while ($reader->read()) {
H A DreadString_basic.phpt12 $reader->read();
/PHP-7.4/ext/phar/
H A Dtar.c164 size_t save = php_stream_tell(fp), read; in phar_tar_process_metadata() local
217 size_t pos = 0, read, totalsize; in phar_parse_tarfile() local
233 if (read != sizeof(buf)) { in phar_parse_tarfile()
306 read = php_stream_read(fp, buf, size); in phar_parse_tarfile()
307 if (read != size || read <= 8) { in phar_parse_tarfile()
349 if (read != sizeof(buf)) { in phar_parse_tarfile()
389 if (read != entry.filename_len) { in phar_parse_tarfile()
417 if (read != sizeof(buf)) { in phar_parse_tarfile()
550 read = php_stream_read(fp, buf, size); in phar_parse_tarfile()
552 if (read == size) { in phar_parse_tarfile()
[all …]
/PHP-7.4/ext/opcache/tests/
H A Dbug64482.phpt12 include 'php://filter/read=string.toupper/resource=bug64482.inc';
/PHP-7.4/ext/exif/tests/
H A Dbug72603.phpt2 Bug #72603 (Out of bound read in exif_process_IFD_in_MAKERNOTE)
/PHP-7.4/Zend/tests/type_declarations/
H A Dtyped_properties_002.phpt2 Test typed properties error condition (read uninitialized)
/PHP-7.4/ext/standard/tests/serialize/
H A Dbug73825.phpt2 Bug #73825 Heap out of bounds read on unserialize in finish_nested_data()
/PHP-7.4/ext/phar/tests/
H A Dbug69324.phpt2 Bug #69324: Buffer Over-read in unserialize when parsing Phar

Completed in 24 milliseconds

12345678910>>...23