/php-src/ext/pdo_firebird/tests/ |
H A D | bug_77863.phpt | 32 $query->execute(); 36 $query->execute(); 40 $query->execute(); 44 $query->execute(); 48 $query->execute(); 52 $query->execute(); 56 $query->execute(); 61 $query->execute(); 65 $query->execute(); 69 $query->execute(); [all …]
|
/php-src/ext/mysqli/tests/ |
H A D | mysqli_stmt_execute_bind.phpt | 2 mysqli_stmt_execute() - bind in execute 20 $stmt->execute(); 26 $stmt->execute([&$abc, 42, $id]); 33 $stmt->execute([&$abc, 42]); 51 $stmt->execute([]); 60 $stmt->execute(); 66 // 6. wrong argument to execute() 69 $stmt->execute(42); 88 $stmt->execute($arr2); 94 $stmt->execute([]); [all …]
|
H A D | protocol_query_row_fetch_data.phpt | 49 [*] Sending - Query execute data intval: 01000001023200000203646566087068705f7465737404646174610464… 52 [*] Sending - Query execute data fltval: 01000001023200000203646566087068705f7465737404646174610464… 55 [*] Sending - Query execute data dblval: 01000001023200000203646566087068705f7465737404646174610464… 58 [*] Sending - Query execute data datval: 01000001023200000203646566087068705f7465737404646174610464… 61 [*] Sending - Query execute data timval: 01000001023200000203646566087068705f7465737404646174610464… 64 [*] Sending - Query execute data dtival: 01000001023200000203646566087068705f7465737404646174610464… 67 [*] Sending - Query execute data bitval: 01000001023200000203646566087068705f7465737404646174610464… 70 [*] Sending - Query execute data strval: 01000001023200000203646566087068705f7465737404646174610464…
|
H A D | protocol_stmt_row_fetch_data.phpt | 23 $stmt->execute(); 52 [*] Sending - Stmt execute data intval: 01000001023200000203646566087068705f74657374046461746104646… 57 [*] Sending - Stmt execute data fltval: 01000001023200000203646566087068705f74657374046461746104646… 62 [*] Sending - Stmt execute data dblval: 01000001023200000203646566087068705f74657374046461746104646… 67 [*] Sending - Stmt execute data datval: 01000001023200000203646566087068705f74657374046461746104646… 72 [*] Sending - Stmt execute data timval: 01000001023200000203646566087068705f74657374046461746104646… 77 [*] Sending - Stmt execute data dtival: 01000001023200000203646566087068705f74657374046461746104646… 82 [*] Sending - Stmt execute data bitval: 01000001023200000203646566087068705f74657374046461746104646… 87 [*] Sending - Stmt execute data strval: 01000001023200000203646566087068705f74657374046461746104646…
|
H A D | bug52891.phpt | 43 if (!$stmt1->execute()) 46 if (!$stmt2->execute()) 51 if (!$stmt2->execute()) 57 if (!$stmt1->execute()) 60 if (!$stmt2->execute()) 65 if (!$stmt2->execute()) 69 if (!$stmt1->execute()) 72 if (!$stmt2->execute()) 76 if (!$stmt1->execute()) 79 if (!$stmt2->execute())
|
/php-src/ext/pdo_pgsql/tests/ |
H A D | disable_prepares.phpt | 22 $stmt2->execute(array(1)); 24 $stmt2->execute(array(2)); 27 $stmt->execute(); 32 $stmt3->execute(array(3)); 34 $stmt3->execute(array(4)); 37 $stmt->execute();
|
H A D | bug62593.phpt | 23 $query->execute(); 28 $query->execute(); 31 // Verify bindParam maintains reference and only passes when execute is called 35 $query->execute(); 42 $query->execute(); 48 $query->execute();
|
/php-src/ext/pdo/tests/ |
H A D | pdo_015.phpt | 25 $select1->execute(); 27 $select1->execute(); 29 $select1->execute(); 31 $select1->execute(); 33 $select1->execute(); 35 $select1->execute(); 37 $select1->execute(); 40 $select2->execute();
|
H A D | bug_71447.phpt | 31 $stmt->execute(); 41 $stmt->execute(); 51 $stmt->execute(); 61 $stmt->execute(); 71 $stmt->execute(); 82 $stmt->execute([1]); 93 $stmt->execute(['id' => 1]);
|
H A D | pdo_016.phpt | 31 $stmt1->execute(); 35 $stmt2->execute(); 43 $stmt2->execute(); 60 var_dump($stmt3->execute()); 64 * after execute() has been called at least once */ 70 var_dump($stmt4->execute()); 73 * after execute() has been called at least once */ 88 var_dump($stmt3->execute()); 92 var_dump($stmt4->execute()); 102 $stmt2->execute();
|
H A D | pdo_016a.phpt | 31 $stmt1->execute(); 35 $stmt2->execute(); 43 $stmt2->execute(); 60 var_dump($stmt3->execute()); 64 * after execute() has been called at least once */ 70 var_dump($stmt4->execute()); 73 * after execute() has been called at least once */ 88 var_dump($stmt3->execute()); 92 var_dump($stmt4->execute()); 102 $stmt2->execute();
|
/php-src/ext/pdo_mysql/tests/ |
H A D | bug80458.phpt | 24 $stmt->execute(); 31 $stmt2->execute(); 37 $stmt3->execute(); 41 $stmt->execute(); 48 $stmt4->execute(); 56 $stmt5->execute(); 67 $stmt->execute(); 74 $stmt2->execute(); 84 $stmt->execute(); 103 $stmt->execute(); [all …]
|
H A D | pdo_mysql_prepare_emulated_anonymous_placeholders.phpt | 46 if (is_array($error_info) && isset($error_info['execute'])) 47 $ret = @$stmt->execute($input_params); 49 $ret = $stmt->execute($input_params); 55 if (is_array($error_info) && isset($error_info['execute'])) { 58 if (isset($error_info['execute']['sqlstate']) && 59 ($error_info['execute']['sqlstate'] !== $tmp[0])) { 65 if (isset($error_info['execute']['mysql']) && 66 ($error_info['execute']['mysql'] !== $tmp[1])) { 68 $offset, $error_info['execute']['mysql'], $tmp[0]); 91 prepex(3, $db, '', [], ['execute' => ['sqlstate' => '42000']]); [all …]
|
H A D | pdo_mysql_prepare_emulated_myisam_index.phpt | 48 if (is_array($error_info) && isset($error_info['execute'])) 49 $ret = @$stmt->execute($input_params); 51 $ret = $stmt->execute($input_params); 57 if (is_array($error_info) && isset($error_info['execute'])) { 60 if (isset($error_info['execute']['sqlstate']) && 61 ($error_info['execute']['sqlstate'] !== $tmp[0])) { 63 $offset, $error_info['execute']['sqlstate'], $tmp[0]); 67 if (isset($error_info['execute']['mysql']) && 68 ($error_info['execute']['mysql'] !== $tmp[1])) { 70 $offset, $error_info['execute']['mysql'], $tmp[0]); [all …]
|
H A D | pdo_mysql_prepare_emulated_myisam.phpt | 46 if (is_array($error_info) && isset($error_info['execute'])) 47 $ret = @$stmt->execute($input_params); 49 $ret = $stmt->execute($input_params); 55 if (is_array($error_info) && isset($error_info['execute'])) { 58 if (isset($error_info['execute']['sqlstate']) && 59 ($error_info['execute']['sqlstate'] !== $tmp[0])) { 61 $offset, $error_info['execute']['sqlstate'], $tmp[0]); 65 if (isset($error_info['execute']['mysql']) && 66 ($error_info['execute']['mysql'] !== $tmp[1])) { 68 $offset, $error_info['execute']['mysql'], $tmp[0]); [all …]
|
H A D | pdo_mysql_prepare_emulated.phpt | 46 if (is_array($error_info) && isset($error_info['execute'])) 47 $ret = @$stmt->execute($input_params); 49 $ret = $stmt->execute($input_params); 55 if (is_array($error_info) && isset($error_info['execute'])) { 58 if (isset($error_info['execute']['sqlstate']) && 59 ($error_info['execute']['sqlstate'] !== $tmp[0])) { 65 if (isset($error_info['execute']['mysql']) && 66 ($error_info['execute']['mysql'] !== $tmp[1])) { 68 $offset, $error_info['execute']['mysql'], $tmp[0]); 90 prepex(3, $db, '', [], ['execute' => ['sqlstate' => '42000']]); [all …]
|
H A D | pdo_mysql_stmt_fetchobject_ctor_args.phpt | 14 $ok = $stmt->execute(); 46 $stmt->execute(); 53 $stmt->execute(); 60 $stmt->execute(); 64 $stmt->execute(); 68 $stmt->execute(); 73 $stmt->execute();
|
H A D | bug53551.phpt | 2 Bug #53551 (PDOStatement execute segfaults for pdo_mysql driver) 32 $stmt->execute($values); 36 $stmt->execute($values); 50 Warning: PDOStatement::execute(): SQLSTATE[23000]: Integrity constraint violation: 1048 Column 'cou… 61 Warning: PDOStatement::execute(): SQLSTATE[23000]: Integrity constraint violation: 1048 Column 'cou…
|
H A D | pdo_mysql_prepare_native.phpt | 50 $ret = @$stmt->execute($input_params); 52 $ret = $stmt->execute($input_params); 65 if (is_array($error_info) && isset($error_info['execute'])) { 67 if (isset($error_info['execute']['sqlstate']) && 68 ($error_info['execute']['sqlstate'] !== $tmp[0])) { 69 printf("[%03d] execute() - expecting SQLSTATE '%s' got '%s'\n", 70 $offset, $error_info['execute']['sqlstate'], $tmp[0]); 74 if (isset($error_info['execute']['mysql']) && 75 ($error_info['execute']['mysql'] !== $tmp[1])) { 77 $offset, $error_info['execute']['mysql'], $tmp[0]); [all …]
|
H A D | pdo_mysql_prepare_native_myisam_index.phpt | 50 $ret = @$stmt->execute($input_params); 52 $ret = $stmt->execute($input_params); 65 if (is_array($error_info) && isset($error_info['execute'])) { 67 if (isset($error_info['execute']['sqlstate']) && 68 ($error_info['execute']['sqlstate'] !== $tmp[0])) { 69 printf("[%03d] execute() - expecting SQLSTATE '%s' got '%s'\n", 70 $offset, $error_info['execute']['sqlstate'], $tmp[0]); 74 if (isset($error_info['execute']['mysql']) && 75 ($error_info['execute']['mysql'] !== $tmp[1])) { 77 $offset, $error_info['execute']['mysql'], $tmp[0]); [all …]
|
H A D | pdo_mysql_prepare_native_myisam.phpt | 50 $ret = @$stmt->execute($input_params); 52 $ret = $stmt->execute($input_params); 65 if (is_array($error_info) && isset($error_info['execute'])) { 67 if (isset($error_info['execute']['sqlstate']) && 68 ($error_info['execute']['sqlstate'] !== $tmp[0])) { 69 printf("[%03d] execute() - expecting SQLSTATE '%s' got '%s'\n", 70 $offset, $error_info['execute']['sqlstate'], $tmp[0]); 74 if (isset($error_info['execute']['mysql']) && 75 ($error_info['execute']['mysql'] !== $tmp[1])) { 76 printf("[%03d] execute() - expecting MySQL Code '%s' got '%s'\n", [all …]
|
H A D | pecl_bug_5802.phpt | 20 $stmt->execute() or var_dump($stmt->errorInfo()); 24 $stmt->execute() or var_dump($stmt->errorInfo()); 28 $stmt->execute() or var_dump($stmt->errorInfo()); 32 if($stmt) $stmt->execute();
|
H A D | bug79872.phpt | 2 Bug #79872: Can't execute query with pending result sets 18 $stmt->execute(); 26 SQLSTATE[HY000]: General error: 2014 Cannot execute queries while there are pending result sets. Co…
|
/php-src/sapi/cli/tests/ |
H A D | 012-2.phpt | 33 string(57) "Either execute direct code, process stdin or use a file. 35 string(57) "Either execute direct code, process stdin or use a file. 38 string(57) "Either execute direct code, process stdin or use a file. 40 string(57) "Either execute direct code, process stdin or use a file. 42 string(57) "Either execute direct code, process stdin or use a file. 44 string(57) "Either execute direct code, process stdin or use a file. 46 string(57) "Either execute direct code, process stdin or use a file. 52 string(57) "Either execute direct code, process stdin or use a file.
|
/php-src/ext/standard/tests/dir/ |
H A D | dir_variation7.phpt | 13 * remove the execute permission from the parent dir and test dir() on child dir 14 * 1) remove write & execute permission from the 1st parent and test dir() 15 * 2) remove execute permission from 2nd parent and test dir() 18 echo "*** Testing dir() : remove execute permission from the parent dir ***\n"; 39 // remove the write and execute permission from sub parent 45 // remove the execute permission from parent dir, allowing all permission for sub dir 71 *** Testing dir() : remove execute permission from the parent dir ***
|