/php-src/ext/json/tests/ |
H A D | json_exceptions_error_clearing.phpt | 2 JSON_THROW_ON_ERROR: global error flag untouched
|
H A D | json_validate_002.phpt | 39 Error: 0 json_validate(): Argument #3 ($flags) must be a valid flag (allowed flags: JSON_INVALID_UT… 42 Error: 0 json_validate(): Argument #3 ($flags) must be a valid flag (allowed flags: JSON_INVALID_UT…
|
/php-src/ext/ldap/tests/ |
H A D | bug72021.phpt | 2 Bug #72021 (ldap_escape() with DN flag is not RFC compliant)
|
/php-src/ext/mbstring/libmbfl/filters/ |
H A D | mbfilter_cjk.c | 4060 int flag = 0; in mbfl_filt_conv_2022kr_wchar() local 4063 flag = 1; in mbfl_filt_conv_2022kr_wchar() 4065 flag = 2; in mbfl_filt_conv_2022kr_wchar() 4068 if (flag > 0 && c > 0x20 && c < 0x7f) { in mbfl_filt_conv_2022kr_wchar() 4069 if (flag == 1) { in mbfl_filt_conv_2022kr_wchar() 9930 int c1, w, flag; in mbfl_filt_conv_euckr_wchar() local 9947 flag = 0; in mbfl_filt_conv_euckr_wchar() 9949 flag = 1; in mbfl_filt_conv_euckr_wchar() 9951 flag = 2; in mbfl_filt_conv_euckr_wchar() 9953 if (flag > 0 && c >= 0xa1 && c <= 0xfe) { in mbfl_filt_conv_euckr_wchar() [all …]
|
/php-src/ext/mbstring/libmbfl/mbfl/ |
H A D | mbfilter.c | 116 …if ((encoding->flag & (MBFL_ENCTYPE_SBCS | MBFL_ENCTYPE_WCS2 | MBFL_ENCTYPE_WCS4)) || encoding->mb… in mbfl_strcut() 122 if (encoding->flag & MBFL_ENCTYPE_WCS2) { in mbfl_strcut() 131 } else if (encoding->flag & MBFL_ENCTYPE_WCS4) { in mbfl_strcut() 140 } else if ((encoding->flag & MBFL_ENCTYPE_SBCS)) { in mbfl_strcut()
|
H A D | mbfl_encoding.h | 250 unsigned int flag; member
|
/php-src/ext/mbstring/ |
H A D | mb_gpc.h | 38 int _php_mb_enable_encoding_translation(int flag);
|
H A D | mbstring.c | 440 return !(encoding->flag & MBFL_ENCTYPE_GL_UNSAFE); in php_mb_zend_encoding_lexer_compatibility_checker() 1659 unsigned int char_len = enc->flag & (MBFL_ENCTYPE_SBCS | MBFL_ENCTYPE_WCS2 | MBFL_ENCTYPE_WCS4); in PHP_FUNCTION() 1818 …unsigned int char_len = encoding->flag & (MBFL_ENCTYPE_SBCS | MBFL_ENCTYPE_WCS2 | MBFL_ENCTYPE_WCS… in mb_get_strlen() 2125 unsigned int flag = enc->flag & (MBFL_ENCTYPE_SBCS | MBFL_ENCTYPE_WCS2 | MBFL_ENCTYPE_WCS4); in mb_get_substr() local 2126 if (flag) { in mb_get_substr() 2128 from *= flag; in mb_get_substr() 2129 len *= flag; in mb_get_substr() 2415 …unsigned int char_len = string.encoding->flag & (MBFL_ENCTYPE_SBCS | MBFL_ENCTYPE_WCS2 | MBFL_ENCT… in PHP_FUNCTION() 5968 } else if (enc->flag & MBFL_ENCTYPE_WCS2) { in php_mb_mbchar_bytes() 5970 } else if (enc->flag & MBFL_ENCTYPE_WCS4) { in php_mb_mbchar_bytes()
|
/php-src/ext/mbstring/tests/ |
H A D | iso2022jp_kddi_encoding.phpt | 202 …7", "\x00\x01\xF1\xEF\x00\x01\xF1\xF5", 'ISO-2022-JP-KDDI', 'UTF-32BE', false); // Japan flag emoji 212 /* Convert Unicode flag emoji to ISO-2022-JP-KDDI proprietary flag emoji 217 …* `if (s >= (84 * 94) && s < (91 * 94))`, which the kuten code which we are using for flag emoji d…
|
H A D | mb_convert_kana.phpt | 128 // Try non-existent flag 253 mb_convert_kana(): Argument #2 ($mode) contains invalid flag: 'Z'
|
H A D | mb_decode_mimeheader_variation4.phpt | 85 // passed the last buffer of wchars without passing 'end' flag, then called one more 86 // time with an empty buffer and 'end' flag to finish up
|
H A D | mb_stripos_basic.phpt | 29 //flag a swap between good and bad 58 '!', // used to flag a swap between good and bad
|
H A D | mb_strripos_basic.phpt | 29 //flag a swap between good and bad 58 '!', // used to flag a swap between good and bad
|
H A D | pictogram1.phpt | 71 /* Chinese flag emoji */
|
/php-src/ext/mysqli/tests/ |
H A D | mysqli_begin_transaction.phpt | 56 foreach ($flags as $flag) { 57 if (!mysqli_begin_transaction($link, $flag, sprintf("flag %d", $flag))) { 65 /* does it really set a flag? */ 67 … if (!mysqli_begin_transaction($link, MYSQLI_TRANS_START_READ_ONLY, sprintf("flag %d", $flag))) {
|
H A D | mysqli_real_connect.phpt | 106 …// how do we test if gets forbidden because of a missing right or the flag, this test is partly bo…
|
H A D | mysqli_real_connect_pconn.phpt | 108 …// how do we test if gets forbidden because of a missing right or the flag, this test is partly bo…
|
H A D | mysqli_report.phpt | 261 // checks the flag. Functions to check: mysqli_query() - done above,
|
/php-src/ext/mysqlnd/ |
H A D | mysqlnd_vio.c | 39 int flag = 1; in mysqlnd_set_sock_no_delay() local 40 int result = setsockopt(socketd, IPPROTO_TCP, TCP_NODELAY, (char *) &flag, sizeof(int)); in mysqlnd_set_sock_no_delay() 59 int flag = 1; in mysqlnd_set_sock_keepalive() local 60 int result = setsockopt(socketd, SOL_SOCKET, SO_KEEPALIVE, (char *) &flag, sizeof(int)); in mysqlnd_set_sock_keepalive()
|
/php-src/ext/odbc/ |
H A D | php_odbc.c | 662 zend_long flag; in php_odbc_fetch_attribs() local 664 if (zend_parse_parameters(ZEND_NUM_ARGS(), "Ol", &pv_res, odbc_result_ce, &flag) == FAILURE) { in php_odbc_fetch_attribs() 672 result->longreadlen = flag; in php_odbc_fetch_attribs() 674 result->binmode = flag; in php_odbc_fetch_attribs()
|
/php-src/ext/opcache/jit/ir/ |
H A D | ir_aarch64.dasc | 2819 /* swap operands to avoid P flag check */ 2858 //??? ir_reg tmp_reg = ctx->regs[def][3]; // TODO: take into account vs flag 3986 /* op3 is used as a flag that the value is already stored in memory.
|
H A D | ir_x86.dasc | 1779 /* swap operands to avoid P flag check */ 1800 /* swap operands to avoid P flag check */ 1806 /* swap operands to avoid P flag check */ 7763 /* op3 is used as a flag that the value is already stored in memory.
|
/php-src/ext/opcache/tests/jit/ |
H A D | closure_001.phpt | 2 Closures should be always called with ZEND_ACC_CLOSURE flag set
|
/php-src/ext/openssl/tests/ |
H A D | stream_crypto_flags_001.phpt | 2 Basic bitwise stream crypto context flag assignment
|
H A D | stream_crypto_flags_002.phpt | 2 TLSv1.1 and TLSv1.2 bitwise stream crypto flag assignment
|