Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 213) sorted by path

123456789

/PHP-5.5/
H A DINSTALL1130 prompt for a password): sudo nano /private/etc/apache2/httpd.conf
H A DNEWS323 . Fixed bug #69362 (PDO-pgsql fails to connect if password contains a
1352 . Fixed bug #62479 (PDO-psql cannot connect if password contains
1633 . Fix issue with return types of password API helper functions. Found via
1801 . Added simplified password hashing API
2596 . Fixed bug #63162 (parse_url does not match password component). (husman)
6995 - Fixed bug #43493 (pdo_pgsql does not send username on connect when password is not available). (I…
8730 - Fixed bug #36820 (Privileged connection with an Oracle password file
9561 - Fixed bug #32947 (Incorrect option for mysqli default password). (Georg)
9861 - Fixed bug #31623 (OCILogin does not support password grace period).
H A DREADME.REDIST.BINS58 This code comes from John the Ripper password cracker, with reentrant
59 and crypt(3) interfaces added, but optimizations specific to password
84 ideas. The password hashing algorithm was designed by David Mazieres
H A DUPGRADING71 - Added a simplified password hashing API
72 (http://php.net/password, https://wiki.php.net/rfc/password_hash)
/PHP-5.5/ext/com_dotnet/
H A Dcom_com.c39 char *user_name = NULL, *domain_name = NULL, *password = NULL; in PHP_FUNCTION() local
98 password = Z_STRVAL_PP(tmp); in PHP_FUNCTION()
134 if (password) { in PHP_FUNCTION()
135 authid.Password = (OLECHAR*)password; in PHP_FUNCTION()
/PHP-5.5/ext/curl/tests/
H A Dcurl_ftp_pasv.phpt15 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD');
19 $url = "ftp://$username:$password@$host/test.phpt" ;
H A Dcurl_multi_segfault.phpt15 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD');
19 $url = "ftp://$username:$password@$host/" ;
/PHP-5.5/ext/fileinfo/tests/
H A Dmagic4547 0 lelong 0x70775631 Cracklib password index, little endian
4551 0 belong 0x70775631 Cracklib password index, big endian
4554 0 search/1 \0\0\0\0pwV1 Cracklib password index, big endian ("64-bit")
10797 >17 byte >0 \b, password protected
11061 0 lelong 0x9AA2D903 Keepass password database
15197 0 string/t /1\ :pserver: cvs password text file
/PHP-5.5/ext/ftp/
H A Dphp_ftp.c65 ZEND_ARG_INFO(0, password)
/PHP-5.5/ext/ftp/tests/
H A Dserver.inc157 fputs($s, "331 User name ok, need password\r\n");
/PHP-5.5/ext/hash/
H A Dhash.c896 char *password, *salt; in PHP_FUNCTION() local
900 …if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "lssl", &algorithm, &password, &password_len,… in PHP_FUNCTION()
945 ops->hash_update(context, (unsigned char *)password, password_len); in PHP_FUNCTION()
1150 ZEND_ARG_INFO(0, password)
/PHP-5.5/ext/hash/tests/
H A Dbug64745.phpt7 $hash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0);
8 $rawHash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0, true);
H A Dhash_pbkdf2_basic.phpt16 echo "sha1: " . hash_pbkdf2('sha1', 'password', 'salt', 1, 20)."\n";
17 echo "sha1(no length): " . hash_pbkdf2('sha1', 'password', 'salt', 1)."\n";
18 echo "sha1(raw): " . bin2hex(hash_pbkdf2('sha1', 'password', 'salt', 1, 20, TRUE))."\n";
21 echo "sha256: " . hash_pbkdf2('sha256', 'password', 'salt', 1, 20)."\n";
22 echo "sha256(no length): " . hash_pbkdf2('sha256', 'password', 'salt', 1)."\n";
23 echo "sha256(raw): " . bin2hex(hash_pbkdf2('sha256', 'password', 'salt', 1, 20, TRUE))."\n";
H A Dhash_pbkdf2_error.phpt8 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int le…
9 Generate a PBKDF2 hash of the given password and salt
14 $password = 'password';
22 var_dump(@hash_pbkdf2('crc32', $password));
24 var_dump(@hash_pbkdf2('crc32', $password, $salt));
28 var_dump(@hash_pbkdf2('crc32', $password, $salt, 10, 10, true, 'extra arg'));
32 var_dump(@hash_pbkdf2('foo', $password, $salt, 1));
36 var_dump(@hash_pbkdf2('md5', $password, $salt, 0));
38 var_dump(@hash_pbkdf2('md5', $password, $salt, -1));
42 var_dump(@hash_pbkdf2('md5', $password, $salt, 1, -1));
/PHP-5.5/ext/imap/
H A Dphp_imap.c105 ZEND_ARG_INFO(0, password)
/PHP-5.5/ext/imap/tests/
H A DREADME9 … the tests is given below (after -----). The dovecot password file (dovecotpass) requires a passwo…
H A Dbug63126.phpt9 $in = imap_open($default_mailbox, $username, $password, OP_HALFOPEN, 1);
34 $in = imap_open($default_mailbox, $username, $password, OP_HALFOPEN, 1, $testparams);
H A Dclean.inc4 $imap_stream = imap_open($default_mailbox, $username, $password);
H A Dimap_body.phpt19 $stream_id = imap_open($default_mailbox, $username, $password) or
H A Dimap_close_basic.phpt33 $stream_id = imap_open($mailbox, $username, $password);
H A Dimap_close_error.phpt27 $stream_id = imap_open($server, $username, $password);
H A Dimap_close_variation2.phpt94 $imap_stream = imap_open($mailbox, $username, $password);
107 $stream_id = imap_open($mailbox, $username, $password);
H A Dimap_close_variation4.phpt43 $imap_stream = imap_open($mailbox, $username, $password);
56 $stream_id = imap_open($mailbox, $username, $password);
H A Dimap_createmailbox_basic.phpt18 $imap_stream = imap_open($default_mailbox, $username, $password) or
H A Dimap_errors_basic.phpt16 $password = "bogus"; // invalid password to use in this test
18 echo "Issue open with invalid password with normal default number of retries, i.e 3\n";
19 $mbox = imap_open($default_mailbox, $username, $password, OP_READONLY, 3);
24 echo "\n\nIssue open with invalid password with retries == 1\n";
25 $mbox = imap_open($default_mailbox, $username, $password, OP_READONLY, 1);
33 Issue open with invalid password with normal default number of retries, i.e 3
47 Issue open with invalid password with retries == 1

Completed in 188 milliseconds

123456789