/PHP-7.4/Zend/tests/ |
H A D | bug69315.phpt | 19 Warning: strlen() has been disabled for security reasons in %sbug69315.php on line %d 22 Warning: defined() has been disabled for security reasons in %sbug69315.php on line %d 25 Warning: constant() has been disabled for security reasons in %sbug69315.php on line %d 28 Warning: call_user_func() has been disabled for security reasons in %sbug69315.php on line %d 31 Warning: is_string() has been disabled for security reasons in %sbug69315.php on line %d
|
H A D | errmsg_020.phpt | 13 Warning: phpinfo() has been disabled for security reasons in %s on line %d
|
H A D | errmsg_021.phpt | 16 Warning: test() has been disabled for security reasons in %s on line %d
|
H A D | bug77494.phpt | 13 Warning: CURLFile() has been disabled for security reasons in %sbug77494.php on line 2
|
/PHP-7.4/TSRM/ |
H A D | tsrm_win32.c | 454 SECURITY_ATTRIBUTES security; in popen_ex() local 504 security.nLength = sizeof(SECURITY_ATTRIBUTES); in popen_ex() 505 security.bInheritHandle = TRUE; in popen_ex() 506 security.lpSecurityDescriptor = NULL; in popen_ex() 508 if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) { in popen_ex() 542 …DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &t… in popen_ex() 563 …res = CreateProcessAsUserW(token_user, NULL, cmdw, &security, &security, security.bInheritHandle, … in popen_ex() 566 …res = CreateProcessW(NULL, cmdw, &security, &security, security.bInheritHandle, dwCreateFlags, env… in popen_ex()
|
/PHP-7.4/ext/snmp/tests/ |
H A D | snmp-object-setSecurity_error.phpt | 39 Warning: SNMP::setSecurity(): Invalid security level '' in %s on line %d 42 Warning: SNMP::setSecurity(): Invalid security level 'bugusPriv' in %s on line %d 54 Warning: SNMP::setSecurity(): Unknown security protocol 'BBB' in %s on line %d
|
H A D | snmp3-error.phpt | 42 Warning: snmp3_get(): Invalid security level '' in %s on line %d 45 Warning: snmp3_get(): Invalid security level 'bugusPriv' in %s on line %d 57 Warning: snmp3_get(): Unknown security protocol 'BBB' in %s on line %d
|
H A D | snmp-object.phpt | 95 echo "SNMPv3 (default security settings)\n"; 209 SNMPv3 (default security settings)
|
/PHP-7.4/ext/opcache/tests/ |
H A D | bug76796.phpt | 17 Warning: strpos() has been disabled for security reasons in %s on line %d
|
H A D | bug68104.phpt | 19 Warning: dl() has been disabled for security reasons in %sbug68104.php on line %d
|
/PHP-7.4/ext/standard/ |
H A D | proc_open.c | 362 # define pipe(pair) (CreatePipe(&pair[0], &pair[1], &security, 0) ? 0 : -1) 497 SECURITY_ATTRIBUTES security; in PHP_FUNCTION() local 624 memset(&security, 0, sizeof(security)); in PHP_FUNCTION() 625 security.nLength = sizeof(security); in PHP_FUNCTION() 626 security.bInheritHandle = TRUE; in PHP_FUNCTION() 627 security.lpSecurityDescriptor = NULL; in PHP_FUNCTION() 952 …newprocok = CreateProcessW(NULL, cmdw, &security, &security, TRUE, dwCreateFlags, envpw, cwdw, &si… in PHP_FUNCTION() 973 …newprocok = CreateProcessW(NULL, cmdw2, &security, &security, TRUE, dwCreateFlags, envpw, cwdw, &s… in PHP_FUNCTION()
|
/PHP-7.4/docs/ |
H A D | input-filter.md | 8 which a company-wide or site-wide security policy can be enforced. It is 10 functions. To implement your own security policy you will need to write a 13 implement your own security policy, read on.
|
H A D | release-process.md | 170 highlight the major important things (security fixes) and when it is 283 * `$PHP_X_Y_TAGS` array should include `security` if this is a security 318 highlight the major important things (security fixes) and when it is 357 highlight the major important things (security fixes) and when it is
|
/PHP-7.4/tests/basic/ |
H A D | bug55500.phpt | 2 Bug #55500 (Corrupted $_FILES indices lead to security concern)
|
/PHP-7.4/ext/openssl/tests/ |
H A D | bug65538_002.phpt | 21 Warning: remote cafile streams are disabled for security purposes in %s on line %d
|
H A D | stream_security_level.phpt | 25 // Make sure the server side starts up successfully if the default security level is
|
/PHP-7.4/ext/standard/tests/network/ |
H A D | news.rss | 24 …evelopment team announces the immediate availability of PHP 5.4.37. Six security-related bugs were…
|
/PHP-7.4/ext/phar/ |
H A D | phar_internal.h | 581 …r_get_entry_info(phar_archive_data *phar, char *path, size_t path_len, char **error, int security); 582 …fo_dir(phar_archive_data *phar, char *path, size_t path_len, char dir, char **error, int security); 583 …me_len, char *path, size_t path_len, const char *mode, char allow_dir, char **error, int security); 584 …me_len, char *path, size_t path_len, const char *mode, char allow_dir, char **error, int security);
|
H A D | util.c | 341 …har *path, size_t path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_entry_data() argument 379 … allow_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data() 386 …, path_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data() 507 …har *path, size_t path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_or_create_entry_data() argument 525 …== phar_get_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security)) { in phar_get_or_create_entry_data() 1198 …ry_info(phar_archive_data *phar, char *path, size_t path_len, char **error, int security) /* {{{ */ in phar_get_entry_info() argument 1200 return phar_get_entry_info_dir(phar, path, path_len, 0, error, security); in phar_get_entry_info() 1208 …ar_archive_data *phar, char *path, size_t path_len, char dir, char **error, int security) /* {{{ */ in phar_get_entry_info_dir() argument 1224 if (security && path_len >= sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) { in phar_get_entry_info_dir()
|
/PHP-7.4/ext/exif/tests/ |
H A D | bug50845.phpt | 45 …nd (LSD-41), May 5, 2016. The vehicles were loaded to support a theater security cooperation event…
|
/PHP-7.4/ext/session/tests/ |
H A D | save_handler.inc | 133 // security reasons for production save handler. 156 // NOTE: This handler is mandatory for session security.
|
/PHP-7.4/tests/security/ |
H A D | open_basedir.inc | 14 // recommended for production use as . bypasses all semblence of security..!
|
/PHP-7.4/ |
H A D | CONTRIBUTING.md | 336 … release the PHP 7.2.x series. This is an old stable version and is open for security fixes only. | 350 1. All non-security bugfix changes should first go to the lowest bugfix branch 351 (i.e. 7.3) and then get merged up to all other branches. All security fixes 352 should go to the lowest security fixes branch (i.e 7.2). If a change is not
|
H A D | php.ini-development | 76 ; php.ini-production contains settings which hold security, performance and 78 ; compatibility with older or less security conscience applications. We 375 ; (e.g. by adding its signature to the Web server header). It is no security 747 ; see documentation for security issues. The alternate is to use the 773 ; cgi.force_redirect is necessary to provide security running PHP as a CGI under 787 ; cause security issues, KNOW WHAT YOU ARE DOING FIRST. 801 ; of the web tree and people will not be able to circumvent .htaccess security. 805 ; security tokens of the calling client. This allows IIS to define the 806 ; security context that the request runs under. mod_fastcgi under Apache 1450 ; Use of trans sid may risk your users' security. [all …]
|
/PHP-7.4/win32/build/ |
H A D | config.w32 | 318 ARG_ENABLE("security-flags", "Disable the compiler security flags", "yes");
|