/php-src/.circleci/ |
H A D | config.yml | 26 … PDO_PGSQL_TEST_DSN: 'pgsql:host=127.0.0.1 port=5432 dbname=test user=postgres password=postgres' 135 --with-password-argon2 \
|
/php-src/.github/actions/configure-x64/ |
H A D | action.yml | 62 --with-password-argon2 \
|
/php-src/.github/actions/setup-windows/ |
H A D | action.yml | 9 …mysql.exe --port=3306 --user=root --password="" -e "ALTER USER 'root'@'localhost' IDENTIFIED BY 'P…
|
/php-src/.github/actions/setup-x64/ |
H A D | action.yml | 14 ….1 -U SA -P "<YourStrong@Passw0rd>" -Q "create login pdo_test with password='password', check_poli… 15 …1 -U SA -P "<YourStrong@Passw0rd>" -Q "create login odbc_test with password='password', check_poli…
|
/php-src/.github/actions/test-linux/ |
H A D | action.yml | 30 export PDO_DBLIB_TEST_PASS="password" 31 … export PGSQL_TEST_CONNSTR="host=localhost dbname=test port=5432 user=postgres password=postgres" 33 …ort PDO_PGSQL_TEST_DSN="pgsql:host=localhost port=5432 dbname=test user=postgres password=postgres" 40 export ODBC_TEST_PASS="password"
|
/php-src/.github/scripts/windows/ |
H A D | test_task.bat | 33 mysql --host=%PDO_MYSQL_TEST_HOST% --port=%MYSQL_TEST_PORT% --user=%MYSQL_TEST_USER% --password=%MY… 39 rem set PGSQL_TEST_CONNSTR=host=127.0.0.1 dbname=test port=5432 user=postgres password=Password12! 40 echo ^<?php $conn_str = "host=127.0.0.1 dbname=test port=5432 user=%PGUSER% password=%PGPASSWORD%";… 41 set PDO_PGSQL_TEST_DSN=pgsql:host=127.0.0.1 port=5432 dbname=test user=%PGUSER% password=%PGPASSWOR… 59 echo create database '%PDO_FIREBIRD_TEST_DATABASE%' user '%PDO_FIREBIRD_TEST_USER%' password '%PDO_…
|
/php-src/ |
H A D | .travis.yml | 63 - PDO_PGSQL_TEST_DSN="pgsql:host=localhost port=5432 dbname=test user=postgres password="
|
H A D | NEWS | 170 . Fixed GH-12423, DSN credentials being prioritized over the user/password
|
H A D | README.REDIST.BINS | 159 This code comes from John the Ripper password cracker, with reentrant 160 and crypt(3) interfaces added, but optimizations specific to password 185 ideas. The password hashing algorithm was designed by David Mazieres
|
/php-src/ext/com_dotnet/ |
H A D | com_com.c | 37 zend_string *user_name = NULL, *password = NULL, *domain_name = NULL; in PHP_METHOD() local 91 password = zval_get_string(tmp); in PHP_METHOD() 123 if (password) { in PHP_METHOD() 124 authid.Password = (OLECHAR*) ZSTR_VAL(password); in PHP_METHOD() 125 authid.PasswordLength = (ULONG) ZSTR_LEN(password); in PHP_METHOD() 211 if (password) zend_string_release(password); in PHP_METHOD()
|
/php-src/ext/curl/tests/ |
H A D | curl_ftp_pasv.phpt | 15 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD'); 19 $url = "ftp://$username:$password@$host/test.phpt" ;
|
H A D | curl_multi_segfault.phpt | 15 $password = getenv('PHP_CURL_FTP_REMOTE_PASSWD'); 19 $url = "ftp://$username:$password@$host/" ;
|
/php-src/ext/fileinfo/tests/ |
H A D | magic | 3757 # GARBLED_FLAG1; garble with password; g switch 3758 >8 byte &0x01 \b, password-protected 4667 # ~ 30 byte password field only for *.gho 4668 >>12 ubequad !0 \b, password protected 6354 # on 2nd line hashed password 6355 #>41 search/54 Password= \b, password 22778 >17 byte >0 \b, password protected 23232 0 lelong 0x9AA2D903 Keepass password database 39799 # size of password name (0,1Ch) 40016 >0x18 string =MRTS without password [all …]
|
H A D | magic私はガラスを食べられます | 3757 # GARBLED_FLAG1; garble with password; g switch 3758 >8 byte &0x01 \b, password-protected 4667 # ~ 30 byte password field only for *.gho 4668 >>12 ubequad !0 \b, password protected 6354 # on 2nd line hashed password 6355 #>41 search/54 Password= \b, password 22778 >17 byte >0 \b, password protected 23232 0 lelong 0x9AA2D903 Keepass password database 39799 # size of password name (0,1Ch) 40016 >0x18 string =MRTS without password [all …]
|
/php-src/ext/ftp/ |
H A D | ftp_arginfo.h | 21 ZEND_ARG_TYPE_INFO(0, password, IS_STRING, 0)
|
/php-src/ext/ftp/tests/ |
H A D | server.inc | 120 fputs($s, "331 User name ok, need password\r\n");
|
/php-src/ext/hash/ |
H A D | hash.c | 1289 char *password, *salt; in PHP_FUNCTION() local 1293 …if (zend_parse_parameters(ZEND_NUM_ARGS(), "lssl", &algorithm, &password, &password_len, &salt, &s… in PHP_FUNCTION() 1341 ops->hash_update(context, (unsigned char *)password, password_len); in PHP_FUNCTION()
|
H A D | hash.stub.php | 86 function mhash_keygen_s2k(int $algo, string $password, string $salt, int $length): string|false {}
|
H A D | hash_arginfo.h | 72 ZEND_ARG_TYPE_INFO(0, password, IS_STRING, 0) 108 ZEND_ARG_TYPE_INFO(0, password, IS_STRING, 0)
|
/php-src/ext/hash/tests/ |
H A D | bug64745.phpt | 5 $hash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0); 6 $rawHash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0, true);
|
H A D | hash_pbkdf2_basic.phpt | 8 echo "sha1: " . hash_pbkdf2('sha1', 'password', 'salt', 1, 20)."\n"; 9 echo "sha1(no length): " . hash_pbkdf2('sha1', 'password', 'salt', 1)."\n"; 10 echo "sha1(raw): " . bin2hex(hash_pbkdf2('sha1', 'password', 'salt', 1, 20, TRUE))."\n"; 13 echo "sha256: " . hash_pbkdf2('sha256', 'password', 'salt', 1, 20)."\n"; 14 echo "sha256(no length): " . hash_pbkdf2('sha256', 'password', 'salt', 1)."\n"; 15 echo "sha256(raw): " . bin2hex(hash_pbkdf2('sha256', 'password', 'salt', 1, 20, TRUE))."\n";
|
H A D | hash_pbkdf2_error.phpt | 6 /* Generate a PBKDF2 hash of the given password and salt 11 $password = 'password'; 16 var_dump(hash_pbkdf2('foo', $password, $salt, 1)); 25 var_dump(hash_pbkdf2('crc32', $password, $salt, 1)); 33 var_dump(hash_pbkdf2('md5', $password, $salt, 0)); 40 var_dump(hash_pbkdf2('md5', $password, $salt, -1)); 48 var_dump(hash_pbkdf2('md5', $password, $salt, 1, -1));
|
/php-src/ext/ldap/ |
H A D | ldap_arginfo.h | 9 ZEND_ARG_TYPE_INFO(0, password, IS_STRING, 0) 18 ZEND_ARG_TYPE_INFO(0, password, IS_STRING, 0) 39 ZEND_ARG_TYPE_INFO_WITH_DEFAULT_VALUE(0, password, IS_STRING, 1, "null") 45 ZEND_ARG_TYPE_INFO_WITH_DEFAULT_VALUE(0, password, IS_STRING, 1, "null") 53 ZEND_ARG_TYPE_INFO_WITH_DEFAULT_VALUE(0, password, IS_STRING, 1, "null")
|
/php-src/ext/ldap/tests/ |
H A D | README.md | 22 export SLAPPASS=`slappasswd -s password` 43 ou: extldap" | ldapadd -c -x -H ldap://localhost:389 -D "dc=admin,dc=nodomain" -w password 63 export LDAP_TEST_PASSWD="password"
|
H A D | connect.inc | 4 Default values are "localhost", "cn=Manager,dc=my-domain,dc=com", and password "secret".
|