/PHP-5.5/ext/mysqli/tests/ |
H A D | mysqli_pam_sha256_public_key_option.phpt | 59 if (!$link->query("SET @@session.old_passwords=2")) { 72 if (!$link->query('SET PASSWORD FOR shatest@"%" = PASSWORD("shatest")') || 73 !$link->query('SET PASSWORD FOR shatest@"localhost" = PASSWORD("shatest")')) { 74 die(sprintf("skip SET PASSWORD failed [%d] %s", $link->errno, $link->error));
|
H A D | mysqli_real_escape_string_nobackslash.phpt | 14 if (!mysqli_query($link, 'SET @@sql_mode="NO_BACKSLASH_ESCAPES"')) 47 if (!mysqli_query($link, 'SET @@sql_mode=""'))
|
H A D | 018.phpt | 15 if (!mysqli_query($link, "SET AUTOCOMMIT=0"))
|
H A D | mysqli_affected_rows.phpt | 87 if (!mysqli_query($link, "UPDATE test SET label = 'a' WHERE id = 2")) 95 if (!($res = mysqli_query($link, sprintf("SHOW CHARACTER SET LIKE '%s'", $charset)))) 105 if (!mysqli_query($link, "UPDATE test SET label = 'a' WHERE id = 2")) { 112 if (!mysqli_query($link, "UPDATE test SET label = 'a' WHERE id = 100")) {
|
H A D | 016.phpt | 15 if (!mysqli_query($link, "SET @dummy='foobar'"))
|
H A D | mysqli_pam_sha256_public_key_option_invalid.phpt | 59 if (!$link->query("SET @@session.old_passwords=2")) { 72 if (!$link->query('SET PASSWORD FOR shatest@"%" = PASSWORD("shatest")') || 73 !$link->query('SET PASSWORD FOR shatest@"localhost" = PASSWORD("shatest")')) { 74 die(sprintf("skip SET PASSWORD failed [%d] %s", $link->errno, $link->error));
|
H A D | mysqli_affected_rows_oo.phpt | 79 if (!$mysqli->query("UPDATE test SET label = 'a' WHERE id = 2")) 85 if (!$mysqli->query("UPDATE test SET label = 'a' WHERE id = 2")) { 92 if (!$mysqli->query("UPDATE test SET label = 'a' WHERE id = 100")) {
|
H A D | bug34785.phpt | 28 mysqli_query($link, "SET sql_mode=''");
|
/PHP-5.5/ext/snmp/tests/ |
H A D | snmp-object-errno-errstr.phpt | 69 echo "SET: Wrong type\n"; 132 SET: Wrong type 139 string(74) "Can not fit all OIDs for SET query into one packet, using multiple queries" 144 string(74) "Can not fit all OIDs for SET query into one packet, using multiple queries"
|
/PHP-5.5/ext/pgsql/tests/ |
H A D | 12pg_insert_9.phpt | 15 pg_query($db, "SET standard_conforming_strings = 0");
|
H A D | 14pg_update.phpt | 24 UPDATE "php_pgsql_test" SET "num"=1234,"str"=E'ABC',"bin"=E'XYZ' WHERE "num"=1234;
|
H A D | 13pg_select_9.phpt | 15 pg_query("SET bytea_output = 'hex'");
|
H A D | 18pg_escape_bytea_before.phpt | 15 @pg_query($db, "SET bytea_output = 'escape'");
|
H A D | 18pg_escape_bytea_esc.phpt | 12 @pg_query($db, "SET bytea_output = 'escape'");
|
H A D | 18pg_escape_bytea_hex.phpt | 15 @pg_query($db, "SET bytea_output = 'hex'");
|
H A D | 98old_api.phpt | 25 $result = pg_exec("UPDATE ".$table_name." SET str = 'QQQ' WHERE str like 'RGD';");
|
H A D | 09notice.phpt | 23 $res = pg_query($db, 'SET client_min_messages TO NOTICE;');
|
H A D | bug37100.phpt | 14 @pg_query("SET bytea_output = 'escape'");
|
/PHP-5.5/ext/interbase/tests/ |
H A D | ibase_drop_db_001.phpt | 14 sprintf("CREATE SCHEMA '%s' USER '%s' PASSWORD '%s' DEFAULT CHARACTER SET %s",$file,
|
/PHP-5.5/ext/pdo_sqlite/tests/ |
H A D | bug33841.phpt | 19 $stmt = $db->prepare("UPDATE test SET text = :text ");
|
/PHP-5.5/ext/pdo_mysql/tests/ |
H A D | pdo_mysql_exec_ddl.phpt | 47 exec_and_count(3, $db, 'ALTER DATABASE pdo_exec_ddl CHARACTER SET latin1', 1); 57 exec_and_count(9, $db, 'ALTER TABLE pdo_exec_ddl ALTER id SET DEFAULT 1', 0);
|
/PHP-5.5/ext/xsl/tests/ |
H A D | bug54446.phpt | 46 #SET NO SECURITY PREFS 61 #SET SECURITY PREFS AGAIN
|
H A D | bug54446_with_ini.phpt | 46 #SET NO SECURITY PREFS 61 #SET SECURITY PREFS AGAIN 73 #SET NO SECURITY PREFS with ini, but set them with ->setSecurityPrefs
|
/PHP-5.5/ext/sqlite3/tests/ |
H A D | sqlite3_18_changes.phpt | 19 var_dump($db->exec("UPDATE test SET id = 'c'"));
|
/PHP-5.5/ext/curl/tests/ |
H A D | curl_multi_getcontent_error1.phpt | 18 //SET URL AND OTHER OPTIONS
|