Home
last modified time | relevance | path

Searched refs:payload (Results 1 – 21 of 21) sorted by relevance

/PHP-7.4/ext/pdo_pgsql/tests/
H A Dbug68199.phpt35 $db->exec("NOTIFY notifies_phpt, 'payload'");
44 $db->exec("NOTIFY notifies_phpt, 'payload'");
49 var_dump($notify['payload']);
65 var_dump($notify['payload']);
73 var_dump($notify['payload']);
89 string(7) "payload"
93 string(7) "payload"
97 string(7) "payload"
101 string(7) "payload"
105 string(7) "payload"
[all …]
/PHP-7.4/ext/pdo_firebird/tests/
H A Dpayload_server.php10 $payload = file_get_contents($filename); variable
11 if ($payload === false) {
19 fwrite($conn, $payload);
H A Dpayload_server.inc12 // First, wait for the payload server to declare itself ready.
24 if (preg_match('/FB payload server listening on (.+)/', $line, $matches)) {
41 // note: even when server prints 'FB payload server listening on localhost:12345'
H A Dpayload_test.phpt2 FB payload server satisfies connection attempt
/PHP-7.4/ext/standard/tests/serialize/
H A D__serialize_003.phpt27 return "payload";
30 public function unserialize($payload) {
32 var_dump($payload);
40 var_dump(unserialize('C:4:"Test":7:{payload}'));
54 string(7) "payload"
H A Dunserialize_abstract_class.phpt6 $payload = 'O:23:"RecursiveFilterIterator":0:{}';
8 var_dump(unserialize($payload));
H A D__serialize_007.phpt6 $payload = 'O:13:"ArrayIterator":2:{i:0;i:0;s:1:"x";R:2;}';
8 var_dump(unserialize($payload));
H A Dunserialize_leak.phpt6 $payload = 'C:16:"SplObjectStorage":113:{x:i:2;O:8:"stdClass":1:{},a:2:{s:4:"prev";i:2;s:4:"next";O…
8 var_dump(unserialize($payload));
H A D__serialize_005.phpt28 public function __unserialize(array $payload) {
29 [$data2, $data] = $payload;
H A Dunserialize_large.phpt2 Unserializing payload with unrealistically large element counts
/PHP-7.4/ext/imap/tests/
H A Dbug77153.phpt11 $payload = "echo 'BUG'> " . __DIR__ . '/__bug';
12 $payloadb64 = base64_encode($payload);
/PHP-7.4/ext/date/tests/
H A Dbug79015.phpt5 $payload = 'O:12:"DateInterval":16:{s:1:"y";i:1;s:1:"m";i:0;s:1:"d";i:4;s:1:"h";i:0;s:1:"i";i:0;s:1…
6 var_dump(unserialize($payload));
/PHP-7.4/ext/spl/tests/
H A Dbug74669.phpt78 $payload = 'x:i:33554432;O:8:"stdClass":0:{};m:a:0:{}';
79 $str = 'C:11:"ArrayObject":' . strlen($payload) . ':{' . $payload . '}';
/PHP-7.4/ext/json/tests/
H A Dfail001.phpt11 '"A JSON payload should be an object or array, not a string."',
47 Testing: "A JSON payload should be an object or array, not a string."
49 string(58) "A JSON payload should be an object or array, not a string."
51 string(58) "A JSON payload should be an object or array, not a string."
/PHP-7.4/ext/mysqlnd/
H A Dmysqlnd_commands.c343 …mand, change_user)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload, const zend_bool … in MYSQLND_METHOD()
350 …d(conn->payload_decoder_factory, COM_CHANGE_USER, (const zend_uchar*) payload.s, payload.l, silent, in MYSQLND_METHOD()
407 …QLND_METHOD(mysqlnd_command, stmt_execute)(MYSQLND_CONN_DATA * conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD()
415 (const unsigned char *) payload.s, payload.l, FALSE, in MYSQLND_METHOD()
430 …_METHOD(mysqlnd_command, stmt_fetch)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD()
437 …and(conn->payload_decoder_factory, COM_STMT_FETCH, (const zend_uchar*) payload.s, payload.l, FALSE, in MYSQLND_METHOD()
481 …ysqlnd_command, stmt_send_long_data)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD()
488 …>payload_decoder_factory, COM_STMT_SEND_LONG_DATA, (const zend_uchar*) payload.s, payload.l, FALSE, in MYSQLND_METHOD()
H A Dmysqlnd_structs.h329 …e_com_change_user)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload, const zend_bool …
332 … (*func_mysqlnd_execute_com_stmt_execute)(MYSQLND_CONN_DATA * conn, const MYSQLND_CSTRING payload);
333 …unc_mysqlnd_execute_com_stmt_fetch)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload);
335 …nd_execute_com_stmt_send_long_data)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload);
H A Dmysqlnd_ps.c48 const MYSQLND_CSTRING payload = {(const char*) buf, sizeof(buf)}; in mysqlnd_stmt_send_cursor_fetch_command() local
53 if (conn->command->stmt_fetch(conn, payload) == FAIL) { in mysqlnd_stmt_send_cursor_fetch_command()
721 const MYSQLND_CSTRING payload = {(const char*) request, request_len}; in MYSQLND_METHOD() local
723 ret = conn->command->stmt_execute(conn, payload); in MYSQLND_METHOD()
1299 const MYSQLND_CSTRING payload = {(const char *) cmd_buf, packet_len}; in MYSQLND_METHOD() local
1301 ret = conn->command->stmt_send_long_data(conn, payload); in MYSQLND_METHOD()
H A Dmysqlnd_wireprotocol.c619 …const MYSQLND_CSTRING payload = {(char*) buffer + MYSQLND_HEADER_SIZE, p - (buffer + MYSQLND_HEADE… in php_mysqlnd_auth_write() local
622 ret = conn->command->change_user(conn, payload, silent); in php_mysqlnd_auth_write()
/PHP-7.4/ext/standard/tests/file/
H A Dstream_rfc2397_006.phpt2 Stream: RFC2397 with corrupt? payload
/PHP-7.4/ext/standard/tests/strings/
H A Dbug72434.phpt7 // Create our payload and unserialize it.
/PHP-7.4/ext/dom/
H A Ddom_iterators.c44 static void itemHashScanner (void *payload, void *data, const xmlChar *name) /* {{{ */ in itemHashScanner() argument
46 static void itemHashScanner (void *payload, void *data, xmlChar *name) in itemHashScanner()
55 priv->node = (xmlNode *)payload; in itemHashScanner()

Completed in 48 milliseconds