/PHP-5.5/ |
H A D | INSTALL | 1130 prompt for a password): sudo nano /private/etc/apache2/httpd.conf
|
H A D | NEWS | 323 . Fixed bug #69362 (PDO-pgsql fails to connect if password contains a 1352 . Fixed bug #62479 (PDO-psql cannot connect if password contains 1633 . Fix issue with return types of password API helper functions. Found via 1801 . Added simplified password hashing API 2596 . Fixed bug #63162 (parse_url does not match password component). (husman) 6995 - Fixed bug #43493 (pdo_pgsql does not send username on connect when password is not available). (I… 8730 - Fixed bug #36820 (Privileged connection with an Oracle password file 9561 - Fixed bug #32947 (Incorrect option for mysqli default password). (Georg) 9861 - Fixed bug #31623 (OCILogin does not support password grace period).
|
H A D | README.REDIST.BINS | 58 This code comes from John the Ripper password cracker, with reentrant 59 and crypt(3) interfaces added, but optimizations specific to password 84 ideas. The password hashing algorithm was designed by David Mazieres
|
H A D | UPGRADING | 71 - Added a simplified password hashing API 72 (http://php.net/password, https://wiki.php.net/rfc/password_hash)
|
/PHP-5.5/ext/com_dotnet/ |
H A D | com_com.c | 39 char *user_name = NULL, *domain_name = NULL, *password = NULL; in PHP_FUNCTION() local 98 password = Z_STRVAL_PP(tmp); in PHP_FUNCTION() 134 if (password) { in PHP_FUNCTION() 135 authid.Password = (OLECHAR*)password; in PHP_FUNCTION()
|
/PHP-5.5/ext/curl/tests/ |
H A D | curl_ftp_pasv.phpt | 15 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD'); 19 $url = "ftp://$username:$password@$host/test.phpt" ;
|
H A D | curl_multi_segfault.phpt | 15 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD'); 19 $url = "ftp://$username:$password@$host/" ;
|
/PHP-5.5/ext/fileinfo/tests/ |
H A D | magic | 4547 0 lelong 0x70775631 Cracklib password index, little endian 4551 0 belong 0x70775631 Cracklib password index, big endian 4554 0 search/1 \0\0\0\0pwV1 Cracklib password index, big endian ("64-bit") 10797 >17 byte >0 \b, password protected 11061 0 lelong 0x9AA2D903 Keepass password database 15197 0 string/t /1\ :pserver: cvs password text file
|
/PHP-5.5/ext/ftp/ |
H A D | php_ftp.c | 65 ZEND_ARG_INFO(0, password)
|
/PHP-5.5/ext/ftp/tests/ |
H A D | server.inc | 157 fputs($s, "331 User name ok, need password\r\n");
|
/PHP-5.5/ext/hash/ |
H A D | hash.c | 896 char *password, *salt; in PHP_FUNCTION() local 900 …if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "lssl", &algorithm, &password, &password_len,… in PHP_FUNCTION() 945 ops->hash_update(context, (unsigned char *)password, password_len); in PHP_FUNCTION() 1150 ZEND_ARG_INFO(0, password)
|
/PHP-5.5/ext/hash/tests/ |
H A D | bug64745.phpt | 7 $hash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0); 8 $rawHash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0, true);
|
H A D | hash_pbkdf2_basic.phpt | 16 echo "sha1: " . hash_pbkdf2('sha1', 'password', 'salt', 1, 20)."\n"; 17 echo "sha1(no length): " . hash_pbkdf2('sha1', 'password', 'salt', 1)."\n"; 18 echo "sha1(raw): " . bin2hex(hash_pbkdf2('sha1', 'password', 'salt', 1, 20, TRUE))."\n"; 21 echo "sha256: " . hash_pbkdf2('sha256', 'password', 'salt', 1, 20)."\n"; 22 echo "sha256(no length): " . hash_pbkdf2('sha256', 'password', 'salt', 1)."\n"; 23 echo "sha256(raw): " . bin2hex(hash_pbkdf2('sha256', 'password', 'salt', 1, 20, TRUE))."\n";
|
H A D | hash_pbkdf2_error.phpt | 8 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int le… 9 Generate a PBKDF2 hash of the given password and salt 14 $password = 'password'; 22 var_dump(@hash_pbkdf2('crc32', $password)); 24 var_dump(@hash_pbkdf2('crc32', $password, $salt)); 28 var_dump(@hash_pbkdf2('crc32', $password, $salt, 10, 10, true, 'extra arg')); 32 var_dump(@hash_pbkdf2('foo', $password, $salt, 1)); 36 var_dump(@hash_pbkdf2('md5', $password, $salt, 0)); 38 var_dump(@hash_pbkdf2('md5', $password, $salt, -1)); 42 var_dump(@hash_pbkdf2('md5', $password, $salt, 1, -1));
|
/PHP-5.5/ext/imap/ |
H A D | php_imap.c | 105 ZEND_ARG_INFO(0, password)
|
/PHP-5.5/ext/imap/tests/ |
H A D | README | 9 … the tests is given below (after -----). The dovecot password file (dovecotpass) requires a passwo…
|
H A D | bug63126.phpt | 9 $in = imap_open($default_mailbox, $username, $password, OP_HALFOPEN, 1); 34 $in = imap_open($default_mailbox, $username, $password, OP_HALFOPEN, 1, $testparams);
|
H A D | clean.inc | 4 $imap_stream = imap_open($default_mailbox, $username, $password);
|
H A D | imap_body.phpt | 19 $stream_id = imap_open($default_mailbox, $username, $password) or
|
H A D | imap_close_basic.phpt | 33 $stream_id = imap_open($mailbox, $username, $password);
|
H A D | imap_close_error.phpt | 27 $stream_id = imap_open($server, $username, $password);
|
H A D | imap_close_variation2.phpt | 94 $imap_stream = imap_open($mailbox, $username, $password); 107 $stream_id = imap_open($mailbox, $username, $password);
|
H A D | imap_close_variation4.phpt | 43 $imap_stream = imap_open($mailbox, $username, $password); 56 $stream_id = imap_open($mailbox, $username, $password);
|
H A D | imap_createmailbox_basic.phpt | 18 $imap_stream = imap_open($default_mailbox, $username, $password) or
|
H A D | imap_errors_basic.phpt | 16 $password = "bogus"; // invalid password to use in this test 18 echo "Issue open with invalid password with normal default number of retries, i.e 3\n"; 19 $mbox = imap_open($default_mailbox, $username, $password, OP_READONLY, 3); 24 echo "\n\nIssue open with invalid password with retries == 1\n"; 25 $mbox = imap_open($default_mailbox, $username, $password, OP_READONLY, 1); 33 Issue open with invalid password with normal default number of retries, i.e 3 47 Issue open with invalid password with retries == 1
|