Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 39) sorted by relevance

12

/PHP-7.0/Zend/tests/
H A Dbug69315.phpt20 Warning: strlen() has been disabled for security reasons in %sbug69315.php on line %d
23 Warning: defined() has been disabled for security reasons in %sbug69315.php on line %d
26 Warning: constant() has been disabled for security reasons in %sbug69315.php on line %d
29 Warning: call_user_func() has been disabled for security reasons in %sbug69315.php on line %d
32 Warning: is_string() has been disabled for security reasons in %sbug69315.php on line %d
H A Derrmsg_020.phpt13 Warning: phpinfo() has been disabled for security reasons in %s on line %d
H A Derrmsg_021.phpt16 Warning: test() has been disabled for security reasons in %s on line %d
/PHP-7.0/ext/standard/tests/general_functions/
H A Dimport_request.phpt35 Notice: import_request_variables(): No prefix specified - possible security hazard in %s on line %d
38 Notice: import_request_variables(): No prefix specified - possible security hazard in %s on line %d
42 Warning: import_request_variables(): Numeric key detected - possible security hazard in %s on line …
/PHP-7.0/TSRM/
H A Dtsrm_win32.c464 SECURITY_ATTRIBUTES security; in popen_ex() local
493 security.nLength = sizeof(SECURITY_ATTRIBUTES); in popen_ex()
494 security.bInheritHandle = TRUE; in popen_ex()
495 security.lpSecurityDescriptor = NULL; in popen_ex()
497 if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) { in popen_ex()
528 …DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &t… in popen_ex()
543 …res = CreateProcessAsUser(token_user, NULL, cmd, &security, &security, security.bInheritHandle, dw… in popen_ex()
546 …res = CreateProcess(NULL, cmd, &security, &security, security.bInheritHandle, dwCreateFlags, env, … in popen_ex()
/PHP-7.0/ext/snmp/tests/
H A Dsnmp-object-setSecurity_error.phpt40 Warning: SNMP::setSecurity(): Invalid security level '' in %s on line %d
43 Warning: SNMP::setSecurity(): Invalid security level 'bugusPriv' in %s on line %d
55 Warning: SNMP::setSecurity(): Unknown security protocol 'BBB' in %s on line %d
H A Dsnmp3-error.phpt42 Warning: snmp3_get(): Invalid security level '' in %s on line %d
45 Warning: snmp3_get(): Invalid security level 'bugusPriv' in %s on line %d
57 Warning: snmp3_get(): Unknown security protocol 'BBB' in %s on line %d
H A Dsnmp-object.phpt95 echo "SNMPv3 (default security settings)\n";
209 SNMPv3 (default security settings)
/PHP-7.0/ext/standard/
H A Dproc_open.c375 # define pipe(pair) (CreatePipe(&pair[0], &pair[1], &security, 0) ? 0 : -1)
434 SECURITY_ATTRIBUTES security; in PHP_FUNCTION() local
509 memset(&security, 0, sizeof(security)); in PHP_FUNCTION()
510 security.nLength = sizeof(security); in PHP_FUNCTION()
511 security.bInheritHandle = TRUE; in PHP_FUNCTION()
512 security.lpSecurityDescriptor = NULL; in PHP_FUNCTION()
725 …newprocok = CreateProcess(NULL, command, &security, &security, TRUE, dwCreateFlags, env.envp, cwd,… in PHP_FUNCTION()
729 …newprocok = CreateProcess(NULL, command_with_cmd, &security, &security, TRUE, dwCreateFlags, env.e… in PHP_FUNCTION()
/PHP-7.0/sapi/cgi/
H A DCHANGES15 CGI: Enable the security check for internal server
25 to circumvent .htaccess security
/PHP-7.0/ext/opcache/tests/
H A Dbug68104.phpt19 Warning: dl() has been disabled for security reasons in %sbug68104.php on line %d
/PHP-7.0/
H A DREADME.input_filter10 through which a company-wide or site-wide security policy can be
12 treat_data and post handler functions. To implement your own security
15 peoples' needs. However, if you want to implement your own security
H A DREADME.GIT-RULES52 stable version and is open for security fixes only.
55 stable version and is open for security fixes only.
H A Dphp.ini-development76 ; php.ini-production contains settings which hold security, performance and
78 ; compatibility with older or less security conscience applications. We
296 ; This directive allows you to disable certain functions for security reasons.
301 ; This directive allows you to disable certain classes for security reasons.
355 ; (e.g. by adding its signature to the Web server header). It is no security
709 ; see documentation for security issues. The alternate is to use the
749 ; cause security issues, KNOW WHAT YOU ARE DOING FIRST.
763 ; of the web tree and people will not be able to circumvent .htaccess security.
768 ; security tokens of the calling client. This allows IIS to define the
769 ; security context that the request runs under. mod_fastcgi under Apache
[all …]
H A Dphp.ini-production76 ; php.ini-production contains settings which hold security, performance and
78 ; compatibility with older or less security conscience applications. We
296 ; This directive allows you to disable certain functions for security reasons.
301 ; This directive allows you to disable certain classes for security reasons.
355 ; (e.g. by adding its signature to the Web server header). It is no security
709 ; see documentation for security issues. The alternate is to use the
749 ; cause security issues, KNOW WHAT YOU ARE DOING FIRST.
763 ; of the web tree and people will not be able to circumvent .htaccess security.
768 ; security tokens of the calling client. This allows IIS to define the
769 ; security context that the request runs under. mod_fastcgi under Apache
[all …]
/PHP-7.0/tests/basic/
H A Dbug55500.phpt2 Bug #55500 (Corrupted $_FILES indices lead to security concern)
/PHP-7.0/ext/openssl/tests/
H A Dbug65538_002.phpt21 Warning: remote cafile streams are disabled for security purposes in %s on line %d
/PHP-7.0/ext/standard/tests/network/
H A Dnews.rss24 …evelopment team announces the immediate availability of PHP 5.4.37. Six security-related bugs were…
/PHP-7.0/ext/phar/
H A Dphar_internal.h603 …phar_get_entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security);
604 …_info_dir(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security);
605 …fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security);
606 …fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security);
H A Dutil.c352 …, char *path, int path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_entry_data() argument
390 … allow_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data()
397 …, path_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data()
518 …, char *path, int path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_or_create_entry_data() argument
536 …== phar_get_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security)) { in phar_get_or_create_entry_data()
1209 …entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security) /* {{{ */ in phar_get_entry_info() argument
1211 return phar_get_entry_info_dir(phar, path, path_len, 0, error, security); in phar_get_entry_info()
1219 …(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security) /* {{{ */ in phar_get_entry_info_dir() argument
1235 if (security && path_len >= sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) { in phar_get_entry_info_dir()
/PHP-7.0/ext/exif/tests/
H A Dbug50845.phpt45 …nd (LSD-41), May 5, 2016. The vehicles were loaded to support a theater security cooperation event…
/PHP-7.0/ext/soap/
H A DTODO60 - SOAP security extension
/PHP-7.0/ext/shmop/
H A DREADME24 …(the n flag is mostly useful for security perpouses, so that you don't end up opening a faked segm…
/PHP-7.0/tests/security/
H A Dopen_basedir.inc14 // recommended for production use as . bypasses all semblence of security..!
/PHP-7.0/win32/build/
H A Dconfig.w32209 ARG_ENABLE("security-flags", "Disable the compiler security flags", "yes");

Completed in 59 milliseconds

12