Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 33) sorted by relevance

12

/PHP-7.4/Zend/tests/
H A Dbug69315.phpt19 Warning: strlen() has been disabled for security reasons in %sbug69315.php on line %d
22 Warning: defined() has been disabled for security reasons in %sbug69315.php on line %d
25 Warning: constant() has been disabled for security reasons in %sbug69315.php on line %d
28 Warning: call_user_func() has been disabled for security reasons in %sbug69315.php on line %d
31 Warning: is_string() has been disabled for security reasons in %sbug69315.php on line %d
H A Derrmsg_020.phpt13 Warning: phpinfo() has been disabled for security reasons in %s on line %d
H A Derrmsg_021.phpt16 Warning: test() has been disabled for security reasons in %s on line %d
H A Dbug77494.phpt13 Warning: CURLFile() has been disabled for security reasons in %sbug77494.php on line 2
/PHP-7.4/TSRM/
H A Dtsrm_win32.c454 SECURITY_ATTRIBUTES security; in popen_ex() local
504 security.nLength = sizeof(SECURITY_ATTRIBUTES); in popen_ex()
505 security.bInheritHandle = TRUE; in popen_ex()
506 security.lpSecurityDescriptor = NULL; in popen_ex()
508 if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) { in popen_ex()
542 …DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &t… in popen_ex()
563 …res = CreateProcessAsUserW(token_user, NULL, cmdw, &security, &security, security.bInheritHandle, … in popen_ex()
566 …res = CreateProcessW(NULL, cmdw, &security, &security, security.bInheritHandle, dwCreateFlags, env… in popen_ex()
/PHP-7.4/ext/snmp/tests/
H A Dsnmp-object-setSecurity_error.phpt39 Warning: SNMP::setSecurity(): Invalid security level '' in %s on line %d
42 Warning: SNMP::setSecurity(): Invalid security level 'bugusPriv' in %s on line %d
54 Warning: SNMP::setSecurity(): Unknown security protocol 'BBB' in %s on line %d
H A Dsnmp3-error.phpt42 Warning: snmp3_get(): Invalid security level '' in %s on line %d
45 Warning: snmp3_get(): Invalid security level 'bugusPriv' in %s on line %d
57 Warning: snmp3_get(): Unknown security protocol 'BBB' in %s on line %d
H A Dsnmp-object.phpt95 echo "SNMPv3 (default security settings)\n";
209 SNMPv3 (default security settings)
/PHP-7.4/ext/opcache/tests/
H A Dbug76796.phpt17 Warning: strpos() has been disabled for security reasons in %s on line %d
H A Dbug68104.phpt19 Warning: dl() has been disabled for security reasons in %sbug68104.php on line %d
/PHP-7.4/ext/standard/
H A Dproc_open.c362 # define pipe(pair) (CreatePipe(&pair[0], &pair[1], &security, 0) ? 0 : -1)
497 SECURITY_ATTRIBUTES security; in PHP_FUNCTION() local
624 memset(&security, 0, sizeof(security)); in PHP_FUNCTION()
625 security.nLength = sizeof(security); in PHP_FUNCTION()
626 security.bInheritHandle = TRUE; in PHP_FUNCTION()
627 security.lpSecurityDescriptor = NULL; in PHP_FUNCTION()
952 …newprocok = CreateProcessW(NULL, cmdw, &security, &security, TRUE, dwCreateFlags, envpw, cwdw, &si… in PHP_FUNCTION()
973 …newprocok = CreateProcessW(NULL, cmdw2, &security, &security, TRUE, dwCreateFlags, envpw, cwdw, &s… in PHP_FUNCTION()
/PHP-7.4/docs/
H A Dinput-filter.md8 which a company-wide or site-wide security policy can be enforced. It is
10 functions. To implement your own security policy you will need to write a
13 implement your own security policy, read on.
H A Drelease-process.md170 highlight the major important things (security fixes) and when it is
283 * `$PHP_X_Y_TAGS` array should include `security` if this is a security
318 highlight the major important things (security fixes) and when it is
357 highlight the major important things (security fixes) and when it is
/PHP-7.4/tests/basic/
H A Dbug55500.phpt2 Bug #55500 (Corrupted $_FILES indices lead to security concern)
/PHP-7.4/ext/openssl/tests/
H A Dbug65538_002.phpt21 Warning: remote cafile streams are disabled for security purposes in %s on line %d
H A Dstream_security_level.phpt25 // Make sure the server side starts up successfully if the default security level is
/PHP-7.4/ext/standard/tests/network/
H A Dnews.rss24 …evelopment team announces the immediate availability of PHP 5.4.37. Six security-related bugs were…
/PHP-7.4/ext/phar/
H A Dphar_internal.h581 …r_get_entry_info(phar_archive_data *phar, char *path, size_t path_len, char **error, int security);
582 …fo_dir(phar_archive_data *phar, char *path, size_t path_len, char dir, char **error, int security);
583 …me_len, char *path, size_t path_len, const char *mode, char allow_dir, char **error, int security);
584 …me_len, char *path, size_t path_len, const char *mode, char allow_dir, char **error, int security);
H A Dutil.c341 …har *path, size_t path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_entry_data() argument
379 … allow_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data()
386 …, path_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data()
507 …har *path, size_t path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_or_create_entry_data() argument
525 …== phar_get_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security)) { in phar_get_or_create_entry_data()
1198 …ry_info(phar_archive_data *phar, char *path, size_t path_len, char **error, int security) /* {{{ */ in phar_get_entry_info() argument
1200 return phar_get_entry_info_dir(phar, path, path_len, 0, error, security); in phar_get_entry_info()
1208 …ar_archive_data *phar, char *path, size_t path_len, char dir, char **error, int security) /* {{{ */ in phar_get_entry_info_dir() argument
1224 if (security && path_len >= sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) { in phar_get_entry_info_dir()
/PHP-7.4/ext/exif/tests/
H A Dbug50845.phpt45 …nd (LSD-41), May 5, 2016. The vehicles were loaded to support a theater security cooperation event…
/PHP-7.4/ext/session/tests/
H A Dsave_handler.inc133 // security reasons for production save handler.
156 // NOTE: This handler is mandatory for session security.
/PHP-7.4/tests/security/
H A Dopen_basedir.inc14 // recommended for production use as . bypasses all semblence of security..!
/PHP-7.4/
H A DCONTRIBUTING.md336 … release the PHP 7.2.x series. This is an old stable version and is open for security fixes only. |
350 1. All non-security bugfix changes should first go to the lowest bugfix branch
351 (i.e. 7.3) and then get merged up to all other branches. All security fixes
352 should go to the lowest security fixes branch (i.e 7.2). If a change is not
H A Dphp.ini-development76 ; php.ini-production contains settings which hold security, performance and
78 ; compatibility with older or less security conscience applications. We
375 ; (e.g. by adding its signature to the Web server header). It is no security
747 ; see documentation for security issues. The alternate is to use the
773 ; cgi.force_redirect is necessary to provide security running PHP as a CGI under
787 ; cause security issues, KNOW WHAT YOU ARE DOING FIRST.
801 ; of the web tree and people will not be able to circumvent .htaccess security.
805 ; security tokens of the calling client. This allows IIS to define the
806 ; security context that the request runs under. mod_fastcgi under Apache
1450 ; Use of trans sid may risk your users' security.
[all …]
/PHP-7.4/win32/build/
H A Dconfig.w32318 ARG_ENABLE("security-flags", "Disable the compiler security flags", "yes");

Completed in 54 milliseconds

12