/PHP-8.1/Zend/tests/ |
H A D | bug77494.phpt | 15 Warning: CURLFile() has been disabled for security reasons in %sbug77494.php on line 2 20 Warning: ErrorException() has been disabled for security reasons in %s on line %d
|
H A D | errmsg_021.phpt | 16 Warning: test() has been disabled for security reasons in %s on line %d
|
/PHP-8.1/TSRM/ |
H A D | tsrm_win32.c | 453 SECURITY_ATTRIBUTES security; in popen_ex() local 503 security.nLength = sizeof(SECURITY_ATTRIBUTES); in popen_ex() 504 security.bInheritHandle = TRUE; in popen_ex() 505 security.lpSecurityDescriptor = NULL; in popen_ex() 507 if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) { in popen_ex() 541 …DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &t… in popen_ex() 562 …res = CreateProcessAsUserW(token_user, NULL, cmdw, &security, &security, security.bInheritHandle, … in popen_ex() 565 …res = CreateProcessW(NULL, cmdw, &security, &security, security.bInheritHandle, dwCreateFlags, env… in popen_ex()
|
/PHP-8.1/docs/ |
H A D | input-filter.md | 8 which a company-wide or site-wide security policy can be enforced. It is 10 functions. To implement your own security policy you will need to write a 13 implement your own security policy, read on.
|
H A D | release-process.md | 152 highlight the major important things (security fixes) and when it is 267 * `tags` array should include `security` if this is a security release 274 Add `--security` for a security release. 308 highlight the major important things (security fixes) and when it is 311 * Call `php bin/createReleaseEntry -v <version> [ --security ]` in your 344 * `tags` array should include `security` if this is a security release 348 highlight the major important things (security fixes) and when it is 351 * Call `php bin/createReleaseEntry -v <version> [ --security ]` in your
|
/PHP-8.1/tests/basic/ |
H A D | bug55500.phpt | 2 Bug #55500 (Corrupted $_FILES indices lead to security concern)
|
/PHP-8.1/ext/openssl/tests/ |
H A D | bug65538_002.phpt | 22 Warning: remote cafile streams are disabled for security purposes in %s on line %d
|
H A D | stream_security_level.phpt | 26 // Make sure the server side starts up successfully if the default security level is
|
/PHP-8.1/ext/standard/tests/network/ |
H A D | news.rss | 24 …evelopment team announces the immediate availability of PHP 5.4.37. Six security-related bugs were…
|
/PHP-8.1/ext/phar/ |
H A D | phar_internal.h | 596 …r_get_entry_info(phar_archive_data *phar, char *path, size_t path_len, char **error, int security); 597 …fo_dir(phar_archive_data *phar, char *path, size_t path_len, char dir, char **error, int security); 598 …me_len, char *path, size_t path_len, const char *mode, char allow_dir, char **error, int security); 599 …me_len, char *path, size_t path_len, const char *mode, char allow_dir, char **error, int security);
|
H A D | util.c | 341 …har *path, size_t path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_entry_data() argument 379 … allow_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data() 386 …, path_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data() 507 …har *path, size_t path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_or_create_entry_data() argument 525 …== phar_get_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security)) { in phar_get_or_create_entry_data() 1198 …ry_info(phar_archive_data *phar, char *path, size_t path_len, char **error, int security) /* {{{ */ in phar_get_entry_info() argument 1200 return phar_get_entry_info_dir(phar, path, path_len, 0, error, security); in phar_get_entry_info() 1208 …ar_archive_data *phar, char *path, size_t path_len, char dir, char **error, int security) /* {{{ */ in phar_get_entry_info_dir() argument 1224 if (security && path_len >= sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) { in phar_get_entry_info_dir()
|
/PHP-8.1/ext/exif/tests/ |
H A D | bug50845.phpt | 46 …nd (LSD-41), May 5, 2016. The vehicles were loaded to support a theater security cooperation event…
|
/PHP-8.1/ext/session/tests/ |
H A D | save_handler.inc | 133 // security reasons for production save handler. 156 // NOTE: This handler is mandatory for session security.
|
/PHP-8.1/ext/snmp/tests/ |
H A D | snmp-object.phpt | 97 echo "SNMPv3 (default security settings)\n"; 211 SNMPv3 (default security settings)
|
/PHP-8.1/tests/security/ |
H A D | open_basedir.inc | 14 // recommended for production use as . bypasses all semblances of security..!
|
/PHP-8.1/ |
H A D | CONTRIBUTING.md | 335 … release the PHP 7.2.x series. This is an old stable version and is open for security fixes only. | 349 1. All non-security bugfix changes should first go to the lowest bugfix branch 350 (i.e. 7.3) and then get merged up to all other branches. All security fixes 351 should go to the lowest security fixes branch (i.e 7.2). If a change is not
|
H A D | php.ini-development | 76 ; php.ini-production contains settings which hold security, performance and 78 ; compatibility with older or less security conscience applications. We 394 ; (e.g. by adding its signature to the Web server header). It is no security 754 ; see documentation for security issues. The alternate is to use the 780 ; cgi.force_redirect is necessary to provide security running PHP as a CGI under 794 ; cause security issues, KNOW WHAT YOU ARE DOING FIRST. 808 ; of the web tree and people will not be able to circumvent .htaccess security. 812 ; security tokens of the calling client. This allows IIS to define the 813 ; security context that the request runs under. mod_fastcgi under Apache 1471 ; Use of trans sid may risk your users' security. [all …]
|
H A D | php.ini-production | 76 ; php.ini-production contains settings which hold security, performance and 78 ; compatibility with older or less security conscience applications. We 396 ; (e.g. by adding its signature to the Web server header). It is no security 756 ; see documentation for security issues. The alternate is to use the 782 ; cgi.force_redirect is necessary to provide security running PHP as a CGI under 796 ; cause security issues, KNOW WHAT YOU ARE DOING FIRST. 810 ; of the web tree and people will not be able to circumvent .htaccess security. 814 ; security tokens of the calling client. This allows IIS to define the 815 ; security context that the request runs under. mod_fastcgi under Apache 1473 ; Use of trans sid may risk your users' security. [all …]
|
H A D | UPGRADING | 601 . add SHA256 and SHA512 for security protocol.
|
H A D | README.REDIST.BINS | 174 as part of a software package, or anywhere else to improve security,
|
H A D | NEWS | 1827 . Implement SHA256 and SHA512 for security protocol. (remi)
|
/PHP-8.1/win32/build/ |
H A D | config.w32 | 331 ARG_ENABLE("security-flags", "Disable the compiler security flags", "yes");
|
/PHP-8.1/sapi/litespeed/ |
H A D | README.md | 18 security when mod_php is used. Usually, FastCGI PHP is not an option in shared
|
/PHP-8.1/sapi/fpm/ |
H A D | www.conf.in | 395 ; Note: chrooting is a great security feature and should be used whenever 435 ;security.limit_extensions = .php .php3 .php4 .php5 .php7
|
/PHP-8.1/build/ |
H A D | libtool.m4 | 2187 dnl not every word. This closes a longstanding sh security hole. 3734 # For security reasons, it is highly recommended that you always
|