/php-src/.github/actions/setup-x64/ |
H A D | action.yml | 10 …-U SA -C -P "<YourStrong@Passw0rd>" -Q "create login pdo_test with password='password', check_poli… 11 …U SA -C -P "<YourStrong@Passw0rd>" -Q "create login odbc_test with password='password', check_poli…
|
/php-src/ext/pdo_dblib/tests/ |
H A D | README.md | 7 ….1 -U SA -P "<YourStrong@Passw0rd>" -Q "create login pdo_test with password='password', check_poli… 10 …master;version=7.0" PDO_DBLIB_TEST_USER="pdo_test" PDO_DBLIB_TEST_PASS="password" TESTS=ext/pdo_db…
|
/php-src/.github/actions/test-linux/ |
H A D | action.yml | 27 export PDO_DBLIB_TEST_PASS="password" 28 … export PGSQL_TEST_CONNSTR="host=localhost dbname=test port=5432 user=postgres password=postgres" 30 …ort PDO_PGSQL_TEST_DSN="pgsql:host=localhost port=5432 dbname=test user=postgres password=postgres" 37 export ODBC_TEST_PASS="password"
|
/php-src/ext/zip/tests/ |
H A D | bug70752.phpt | 2 Bug #70752 (Depacking with wrong password leaves 0 length files) 14 $zip->setPassword('bar'); // correct password would be 'foo'
|
/php-src/ext/mysqli/tests/ |
H A D | README.md | 22 # Database user password 23 # The default password is empty (no password).
|
H A D | mysqli_report_new.phpt | 26 …20-456789-30-456789-40-456789-50-456789-60-456789-70-456789-80-456789-90-456789", "password", $db); 34 …change_user($link, "This might work if you accept anonymous users in your setup", "password", $db); 43 Warning: mysqli_change_user(): (%d/%d): Access denied for user '%s'@'%s' (using password: %s) in %s…
|
/php-src/ext/mysqli/tests/test_setup/ |
H A D | test_helpers.inc | 25 static $password = null; 26 if ($password === null) { 27 $password = getenv('MYSQL_TEST_PASSWD') ?: ''; 29 return $password; 74 string $password, 89 mysqli_real_connect($link, $host, $user, $password, $db, $port, $socket, $flags); 94 $link = @mysqli_connect($host, $user, $password, $db, $port, $socket);
|
/php-src/ext/pgsql/tests/ |
H A D | changepassword.phpt | 2 Changing user password with pg_change_password 28 pg_change_password(): Argument #3 ($password) must not be empty
|
/php-src/ext/standard/tests/password/ |
H A D | password_bcrypt_errors.phpt | 19 var_dump(password_hash("null\0password", PASSWORD_BCRYPT)); 27 Bcrypt password must not contain null character
|
H A D | password_hash_sensitive_parameter.phpt | 2 Test that the password parameter is marked sensitive. 21 ValueError: password_hash(): Argument #2 ($algo) must be a valid password hashing algorithm in%spas…
|
/php-src/ext/openssl/tests/ |
H A D | openssl_encrypt_chacha20_poly1305.phpt | 25 var_dump(openssl_encrypt('data', $method, 'password', 0, '', $tag, '')); 28 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 12), $tag, '', 20)); 31 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 12)));
|
H A D | openssl_encrypt_ccm.phpt | 27 var_dump(openssl_encrypt('data', $method, 'password', 0, '', $tag, '')); 30 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 10), $tag, '', 14)); 34 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 16), $tag, '', 1024));
|
H A D | openssl_encrypt_gcm.phpt | 25 var_dump(openssl_encrypt('data', $method, 'password', 0, '', $tag, '')); 28 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 32), $tag, '', 20)); 31 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 32)));
|
H A D | openssl_encrypt_ocb.phpt | 25 var_dump(openssl_encrypt('data', $method, 'password', 0, '', $tag, '')); 28 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 12), $tag, '', 20)); 31 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 12)));
|
/php-src/ext/pdo_sqlite/tests/ |
H A D | bug48773.phpt | 15 function __construct($dsn, $username, $password, $driver_options = array()) { 17 parent::__construct($dsn, $username, $password, $driver_options);
|
/php-src/ext/pdo_firebird/tests/ |
H A D | payload_test.phpt | 18 $password = 'masterkey'; 20 new PDO($dsn, $username, $password, [
|
H A D | bug_76448.phpt | 18 $password = 'masterkey'; 20 $dbh = new PDO($dsn, $username, $password, [PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION]);
|
H A D | bug_76449.phpt | 18 $password = 'masterkey'; 20 $dbh = new PDO($dsn, $username, $password, [PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION]);
|
H A D | bug_76450.phpt | 18 $password = 'masterkey'; 20 $dbh = new PDO($dsn, $username, $password, [PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION]);
|
H A D | bug_76452.phpt | 19 $password = 'masterkey'; 21 $dbh = new PDO($dsn, $username, $password, [PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION]);
|
/php-src/ext/pdo_pgsql/tests/ |
H A D | bug62479.phpt | 2 PDO PgSQL Bug #62479 (PDO-psql cannot connect if password contains spaces) 49 // Create temp user with space in password 50 $sql = sprintf($template, 'my password'); 52 $testConn = new PDO($config['ENV']['PDOTEST_DSN'], $user, "my password");
|
/php-src/ext/openssl/ |
H A D | config0.m4 | 21 [whether to enable argon2 password hashing (requires OpenSSL >= 3.2)], 23 [OPENSSL: Enable argon2 password hashing])], 57 [Define to 1 to enable OpenSSL argon2 password hashing.])],
|
H A D | config.w32 | 7 ARG_WITH("openssl-argon2", "OPENSSL: Enable argon2 password hashing (requires OpenSSL >= 3.2)", "no… 24 AC_DEFINE("HAVE_OPENSSL_ARGON2", 1, "Define to 1 to enable OpenSSL argon2 password hashing.");
|
/php-src/ext/snmp/tests/ |
H A D | snmp-object-setSecurity_error.phpt | 66 …ng a key for authentication pass phrase '': Generic error (The supplied password length is too sho… 69 … a key for authentication pass phrase 'te': Generic error (The supplied password length is too sho… 74 …enerating a key for privacy pass phrase '': Generic error (The supplied password length is too sho… 77 …erating a key for privacy pass phrase 'ty': Generic error (The supplied password length is too sho…
|
/php-src/ext/ldap/tests/ |
H A D | ldap_exop_passwd.phpt | 2 ldap_exop_passwd() - Changing password through EXOP 17 // and optionally returns the NEW password if none was passed.
|