Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 142) sorted by path

123456

/php-src/.circleci/
H A Dconfig.yml26 … PDO_PGSQL_TEST_DSN: 'pgsql:host=127.0.0.1 port=5432 dbname=test user=postgres password=postgres'
135 --with-password-argon2 \
/php-src/.github/actions/configure-x64/
H A Daction.yml62 --with-password-argon2 \
/php-src/.github/actions/setup-windows/
H A Daction.yml9 …mysql.exe --port=3306 --user=root --password="" -e "ALTER USER 'root'@'localhost' IDENTIFIED BY 'P…
/php-src/.github/actions/setup-x64/
H A Daction.yml14 ….1 -U SA -P "<YourStrong@Passw0rd>" -Q "create login pdo_test with password='password', check_poli…
15 …1 -U SA -P "<YourStrong@Passw0rd>" -Q "create login odbc_test with password='password', check_poli…
/php-src/.github/actions/test-linux/
H A Daction.yml30 export PDO_DBLIB_TEST_PASS="password"
31 … export PGSQL_TEST_CONNSTR="host=localhost dbname=test port=5432 user=postgres password=postgres"
33 …ort PDO_PGSQL_TEST_DSN="pgsql:host=localhost port=5432 dbname=test user=postgres password=postgres"
40 export ODBC_TEST_PASS="password"
/php-src/.github/scripts/windows/
H A Dtest_task.bat33 mysql --host=%PDO_MYSQL_TEST_HOST% --port=%MYSQL_TEST_PORT% --user=%MYSQL_TEST_USER% --password=%MY…
39 rem set PGSQL_TEST_CONNSTR=host=127.0.0.1 dbname=test port=5432 user=postgres password=Password12!
40 echo ^<?php $conn_str = "host=127.0.0.1 dbname=test port=5432 user=%PGUSER% password=%PGPASSWORD%";…
41 set PDO_PGSQL_TEST_DSN=pgsql:host=127.0.0.1 port=5432 dbname=test user=%PGUSER% password=%PGPASSWOR…
59 echo create database '%PDO_FIREBIRD_TEST_DATABASE%' user '%PDO_FIREBIRD_TEST_USER%' password '%PDO_…
/php-src/
H A D.travis.yml63 - PDO_PGSQL_TEST_DSN="pgsql:host=localhost port=5432 dbname=test user=postgres password="
H A DNEWS170 . Fixed GH-12423, DSN credentials being prioritized over the user/password
H A DREADME.REDIST.BINS159 This code comes from John the Ripper password cracker, with reentrant
160 and crypt(3) interfaces added, but optimizations specific to password
185 ideas. The password hashing algorithm was designed by David Mazieres
/php-src/ext/com_dotnet/
H A Dcom_com.c37 zend_string *user_name = NULL, *password = NULL, *domain_name = NULL; in PHP_METHOD() local
91 password = zval_get_string(tmp); in PHP_METHOD()
123 if (password) { in PHP_METHOD()
124 authid.Password = (OLECHAR*) ZSTR_VAL(password); in PHP_METHOD()
125 authid.PasswordLength = (ULONG) ZSTR_LEN(password); in PHP_METHOD()
211 if (password) zend_string_release(password); in PHP_METHOD()
/php-src/ext/curl/tests/
H A Dcurl_ftp_pasv.phpt15 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD');
19 $url = "ftp://$username:$password@$host/test.phpt" ;
H A Dcurl_multi_segfault.phpt15 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD');
19 $url = "ftp://$username:$password@$host/" ;
/php-src/ext/fileinfo/tests/
H A Dmagic3757 # GARBLED_FLAG1; garble with password; g switch
3758 >8 byte &0x01 \b, password-protected
4667 # ~ 30 byte password field only for *.gho
4668 >>12 ubequad !0 \b, password protected
6354 # on 2nd line hashed password
6355 #>41 search/54 Password= \b, password
22778 >17 byte >0 \b, password protected
23232 0 lelong 0x9AA2D903 Keepass password database
39799 # size of password name (0,1Ch)
40016 >0x18 string =MRTS without password
[all …]
H A Dmagic私はガラスを食べられます3757 # GARBLED_FLAG1; garble with password; g switch
3758 >8 byte &0x01 \b, password-protected
4667 # ~ 30 byte password field only for *.gho
4668 >>12 ubequad !0 \b, password protected
6354 # on 2nd line hashed password
6355 #>41 search/54 Password= \b, password
22778 >17 byte >0 \b, password protected
23232 0 lelong 0x9AA2D903 Keepass password database
39799 # size of password name (0,1Ch)
40016 >0x18 string =MRTS without password
[all …]
/php-src/ext/ftp/
H A Dftp_arginfo.h21 ZEND_ARG_TYPE_INFO(0, password, IS_STRING, 0)
/php-src/ext/ftp/tests/
H A Dserver.inc120 fputs($s, "331 User name ok, need password\r\n");
/php-src/ext/hash/
H A Dhash.c1289 char *password, *salt; in PHP_FUNCTION() local
1293 …if (zend_parse_parameters(ZEND_NUM_ARGS(), "lssl", &algorithm, &password, &password_len, &salt, &s… in PHP_FUNCTION()
1341 ops->hash_update(context, (unsigned char *)password, password_len); in PHP_FUNCTION()
H A Dhash.stub.php86 function mhash_keygen_s2k(int $algo, string $password, string $salt, int $length): string|false {}
H A Dhash_arginfo.h72 ZEND_ARG_TYPE_INFO(0, password, IS_STRING, 0)
108 ZEND_ARG_TYPE_INFO(0, password, IS_STRING, 0)
/php-src/ext/hash/tests/
H A Dbug64745.phpt5 $hash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0);
6 $rawHash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0, true);
H A Dhash_pbkdf2_basic.phpt8 echo "sha1: " . hash_pbkdf2('sha1', 'password', 'salt', 1, 20)."\n";
9 echo "sha1(no length): " . hash_pbkdf2('sha1', 'password', 'salt', 1)."\n";
10 echo "sha1(raw): " . bin2hex(hash_pbkdf2('sha1', 'password', 'salt', 1, 20, TRUE))."\n";
13 echo "sha256: " . hash_pbkdf2('sha256', 'password', 'salt', 1, 20)."\n";
14 echo "sha256(no length): " . hash_pbkdf2('sha256', 'password', 'salt', 1)."\n";
15 echo "sha256(raw): " . bin2hex(hash_pbkdf2('sha256', 'password', 'salt', 1, 20, TRUE))."\n";
H A Dhash_pbkdf2_error.phpt6 /* Generate a PBKDF2 hash of the given password and salt
11 $password = 'password';
16 var_dump(hash_pbkdf2('foo', $password, $salt, 1));
25 var_dump(hash_pbkdf2('crc32', $password, $salt, 1));
33 var_dump(hash_pbkdf2('md5', $password, $salt, 0));
40 var_dump(hash_pbkdf2('md5', $password, $salt, -1));
48 var_dump(hash_pbkdf2('md5', $password, $salt, 1, -1));
/php-src/ext/ldap/
H A Dldap_arginfo.h9 ZEND_ARG_TYPE_INFO(0, password, IS_STRING, 0)
18 ZEND_ARG_TYPE_INFO(0, password, IS_STRING, 0)
39 ZEND_ARG_TYPE_INFO_WITH_DEFAULT_VALUE(0, password, IS_STRING, 1, "null")
45 ZEND_ARG_TYPE_INFO_WITH_DEFAULT_VALUE(0, password, IS_STRING, 1, "null")
53 ZEND_ARG_TYPE_INFO_WITH_DEFAULT_VALUE(0, password, IS_STRING, 1, "null")
/php-src/ext/ldap/tests/
H A DREADME.md22 export SLAPPASS=`slappasswd -s password`
43 ou: extldap" | ldapadd -c -x -H ldap://localhost:389 -D "dc=admin,dc=nodomain" -w password
63 export LDAP_TEST_PASSWD="password"
H A Dconnect.inc4 Default values are "localhost", "cn=Manager,dc=my-domain,dc=com", and password "secret".

Completed in 194 milliseconds

123456