/PHP-7.4/ext/standard/tests/mail/ |
H A D | mail_skipif.inc | 17 $password = 'p4ssw0rd'; 21 $mbox = imap_open($mailbox, $username, $password, $options, $retries);
|
/PHP-7.4/ext/sodium/tests/ |
H A D | php_password_hash_argon2i.phpt | 24 $password = random_bytes(32); 25 echo "Using password: "; 32 $password[0] = chr(ord($password[0]) ^ 1); 38 Using password: string(44) "%s" 42 Using password: string(44) "%s" 46 Using password: string(44) "%s" 50 Using password: string(44) "%s" 54 Using password: string(44) "%s" 58 Using password: string(44) "%s" 62 Using password: string(44) "%s" [all …]
|
H A D | php_password_hash_argon2id.phpt | 24 $password = random_bytes(32); 25 echo "Using password: "; 32 $password[0] = chr(ord($password[0]) ^ 1); 38 Using password: string(44) "%s" 42 Using password: string(44) "%s" 46 Using password: string(44) "%s" 50 Using password: string(44) "%s" 54 Using password: string(44) "%s" 58 Using password: string(44) "%s" 62 Using password: string(44) "%s" [all …]
|
H A D | php_password_verify.phpt | 35 $password = random_bytes(32); 36 echo "Using password: "; 43 $password[0] = chr(ord($password[0]) ^ 1); 49 Using password: string(44) "%s" 53 Using password: string(44) "%s" 57 Using password: string(44) "%s" 61 Using password: string(44) "%s" 65 Using password: string(44) "%s" 69 Using password: string(44) "%s" 73 Using password: string(44) "%s" [all …]
|
H A D | pwhash_argon2i.phpt | 8 $passwd = 'password';
|
/PHP-7.4/ext/soap/tests/bugs/ |
H A D | multiport.phpt | 11 $response = $client->GetSessionId(array('userId'=>'user', 'password'=>'password')); 16 …ENV:Body><ns1:GetSessionId><ns1:userId>user</ns1:userId><ns1:password>password</ns1:password></ns1…
|
/PHP-7.4/ext/soap/tests/ |
H A D | bug46760.phpt | 11 'password' => "test",
|
/PHP-7.4/ext/phar/tests/files/ |
H A D | openssl.cnf | 27 challengePassword = A challenge password
|
/PHP-7.4/ext/pgsql/tests/ |
H A D | config.inc | 8 …L_TEST_CONNSTR') ?: "host=localhost dbname=test port=5432 user=postgres password=postgres"; // …
|
H A D | skipif.inc | 5 // with no username/password, AND
|
/PHP-7.4/ext/pdo_pgsql/tests/ |
H A D | config.inc | 9 …$config['ENV']['PDOTEST_DSN'] = 'pgsql:host=localhost port=5432 dbname=test user=postgres password…
|
H A D | bug62479.phpt | 2 PDO PgSQL Bug #62479 (PDO-psql cannot connect if password contains spaces) 50 // Create temp user with space in password 51 $sql = sprintf($template, 'my password'); 53 $testConn = new PDO($config['ENV']['PDOTEST_DSN'], $user, "my password");
|
H A D | bug69362.phpt | 2 PDO PgSQL Bug #69362 (PDO-pgsql fails to connect if password contains a leading single quote)
|
H A D | common.phpt | 21 …$config['ENV']['PDOTEST_DSN'] = 'pgsql:host=localhost port=5432 dbname=test user=postgres password…
|
/PHP-7.4/ext/pdo_sqlite/tests/ |
H A D | bug48773.phpt | 17 function __construct($dsn, $username, $password, $driver_options = array()) { 19 parent::__construct($dsn, $username, $password, $driver_options);
|
/PHP-7.4/ext/pdo_mysql/tests/ |
H A D | pecl_bug_5780.phpt | 16 $db->exec("CREATE TABLE test2 (login varchar(32) NOT NULL, password varchar(64) NOT NULL)"); 17 $db->exec("INSERT INTO test2 (login, password) VALUES ('testing', 'testing')"); 18 $db->exec("INSERT INTO test2 (login, password) VALUES ('test2', 'testpw2')"); 21 $authstmt = $db->prepare('SELECT * FROM test2 WHERE login = :varlog AND password = :varpass');
|
H A D | README.md | 24 # Database user password
|
H A D | pdo_mysql___construct.phpt | 302 [009] SQLSTATE[%s] [1045] Access denied for user 'dont%s'@'%s' (using password: YES), [n/a] n/a
|
/PHP-7.4/ext/pdo/tests/ |
H A D | pdo_dsn_containing_credentials.phpt | 26 putenv("PDOTEST_DSN=$orgDsn;user=$orgUser;password=$orgPass"); 35 putenv("PDOTEST_DSN=$orgDsn;user=incorrect;password=ignored");
|
/PHP-7.4/ext/pdo_dblib/tests/ |
H A D | common.phpt | 14 'PDOTEST_PASS' => getenv('PDO_DBLIB_TEST_PASS') ?: 'password',
|
H A D | config.inc | 41 $pass = 'password';
|
/PHP-7.4/ext/openssl/tests/ |
H A D | openssl_pbkdf2_basic.phpt | 8 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 1))); 9 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 2))); 10 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 4096))); 14 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 16777216)));
|
H A D | bug73833.phpt | 12 foreach($passwords as $password) { 15 if (openssl_pkey_export($key, $privatePEM, $password, $conf) === false) { 20 if (openssl_pkey_get_private($privatePEM, $password) === false) {
|
H A D | openssl.cnf | 34 challengePassword = A challenge password
|
H A D | openssl_encrypt_gcm.phpt | 25 var_dump(openssl_encrypt('data', $method, 'password', 0, NULL, $tag, '')); 28 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 32), $tag, '', 20)); 31 var_dump(openssl_encrypt('data', $method, 'password', 0, str_repeat('x', 32)));
|