Searched refs:session (Results 1 – 25 of 287) sorted by last modified time
12345678910>>...12
475 SOURCE=..\ext\session\mod_files.c479 SOURCE=..\ext\session\mod_user.c526 SOURCE=..\ext\session\session.c636 SOURCE=..\ext\session\mod_user.h
1911 SOURCE=..\ext\session\mod_files.c1915 SOURCE=..\ext\session\mod_user.c1952 SOURCE=..\ext\session\session.c2074 SOURCE=..\ext\session\mod_user.h2138 SOURCE=..\ext\session\php_session.h
400 session tmp directory.
62 | You must create /tmp for session tests to work! |
141 ; session.gc_divisor1390 ; Strict session mode does not accept uninitialized session ID and regenerate1391 ; session ID if browser sends uninitialized session ID. Strict mode protects1392 ; applications from session fixation via session adoption vulnerability. It is1399 session.use_cookies = 11402 ;session.cookie_secure =1413 session.name = PHPSESSID1417 session.auto_start = 01425 session.cookie_path = /1429 session.cookie_domain =[all …]
4 <?php if (!extension_loaded("session")) die("skip session extension not available"); ?>7 session.auto_start=18 session.save_handler=files9 session.save_path=./tests/basic/
6 if (!extension_loaded("reflection") || !extension_loaded("session")) {7 die("skip reflection and session extensions required");
55 ns_param php_value "session.auto_start 1"
362 param.inputs.session = session_stream; in php_stream_xport_crypto_setup()
192 php_stream *session; member
2 wddx session serializer handler (deserialize)6 if (!extension_loaded('session')) die('skip Session module not enabled');8 // following test code stolen from ext/session/skipif.inc9 $save_path = ini_get("session.save_path");27 session.serialize_handler=wddx28 session.use_cookies=029 session.cache_limiter=30 session.save_handler=files
9 ini_set('session.serialize_handler', 'wddx');25 Warning: session_decode(): Failed to decode session object. Session has been destroyed in %s on lin…
2 wddx session serializer handler (serialize)6 if (!extension_loaded('session')) die('skip Session module not enabled');8 // following test code stolen from ext/session/skipif.inc9 $save_path = ini_get("session.save_path");27 session.serialize_handler=wddx28 session.use_cookies=029 session.cache_limiter=30 session.save_handler=files
2 Bug #70219 Use after free vulnerability in session deserializer28 Warning: session_decode(): Failed to decode session object. Session has been destroyed in %s on lin…
2 Bug #70219 Use after free vulnerability in session deserializer5 ini_set('session.serialize_handler', 'php_serialize');
7 session.use_cookies=08 session.serialize_handler=php9 session.save_handler=files15 var_dump(get_cfg_var( 'session.use_cookies' ) );16 var_dump(get_cfg_var( 'session.serialize_handler' ) );17 var_dump(get_cfg_var( 'session.save_handler' ) );
7 session.use_cookies=08 session.serialize_handler=php9 session.save_handler=files15 var_dump(get_cfg_var( 'session.use_cookies', 'session.serialize_handler' ) );
7 session.use_cookies=08 session.serialize_handler=php9 session.save_handler=files
7 session.use_cookies=08 session.serialize_handler=php9 session.save_handler=files21 return "session.use_cookies";
Completed in 66 milliseconds