/PHP-7.0/ext/openssl/tests/ |
H A D | openssl_decrypt_basic.phpt | 9 $password = "openssl"; 16 $encrypted = openssl_encrypt($data, $method, $password, 0, $iv); 17 $output = openssl_decrypt($encrypted, $method, $password, 0, $iv); 19 $encrypted = openssl_encrypt($data, $method, $password, OPENSSL_RAW_DATA, $iv); 20 $output = openssl_decrypt($encrypted, $method, $password, OPENSSL_RAW_DATA, $iv); 24 $encrypted = openssl_encrypt($padded_data, $method, $password, OPENSSL_RAW_DATA|OPENSSL_ZERO_PADDIN… 25 $output = openssl_decrypt($encrypted, $method, $password, OPENSSL_RAW_DATA|OPENSSL_ZERO_PADDING, $i…
|
H A D | openssl_decrypt_error.phpt | 9 $password = "openssl"; 13 $encrypted = openssl_encrypt($data, $method, $password); 15 var_dump(openssl_encrypt($data, $method, $password, 0, $iv)); 17 var_dump(openssl_decrypt($encrypted, $wrong, $password)); 18 var_dump(openssl_decrypt($wrong, $method, $password)); 19 var_dump(openssl_decrypt($wrong, $wrong, $password)); 22 var_dump(openssl_decrypt(array(), $method, $password)); 23 var_dump(openssl_decrypt($encrypted, array(), $password));
|
H A D | openssl_pbkdf2_basic.phpt | 8 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 1))); 9 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 2))); 10 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 4096))); 14 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 16777216)));
|
H A D | bug73833.phpt | 12 foreach($passwords as $password) { 15 if (openssl_pkey_export($key, $privatePEM, $password, $conf) === false) { 20 if (openssl_pkey_get_private($privatePEM, $password) === false) {
|
/PHP-7.0/ext/oci8/tests/ |
H A D | persistent.phpt | 10 var_dump(oci_pconnect($user, $password, $dbase)); 11 var_dump(oci_pconnect($user, $password, $dbase)); 12 var_dump(oci_pconnect($user, $password, $dbase)); 13 var_dump(oci_connect($user, $password, $dbase)); 14 var_dump(oci_connect($user, $password, $dbase)); 15 var_dump(oci_connect($user, $password, $dbase));
|
H A D | drcp_scope1.phpt | 21 $c = oci_new_connect($user,$password,$dbase); 28 function1($user,$password,$dbase,$conn_type); 31 function2($user,$password,$dbase,$conn_type); 36 function1($user,$password,$dbase,$conn_type); 39 function2($user,$password,$dbase,$conn_type); 43 function function1($user,$password,$dbase,$conn_type) 48 var_dump($conn1 = oci_new_connect($user,$password,$dbase)); 51 var_dump($conn1 = oci_connect($user,$password,$dbase)); 59 function function2($user,$password,$dbase,$conn_type) 64 var_dump($conn1 = oci_new_connect($user,$password,$dbase)); [all …]
|
H A D | drcp_scope2.phpt | 21 $c = oci_new_connect($user,$password,$dbase); 28 function1($user,$password,$dbase,$conn_type); 31 function2($user,$password,$dbase,$conn_type); 36 function1($user,$password,$dbase,$conn_type); 39 function2($user,$password,$dbase,$conn_type); 43 function function1($user,$password,$dbase,$conn_type) 48 var_dump($conn1 = oci_new_connect($user,$password,$dbase)); 51 var_dump($conn1 = oci_connect($user,$password,$dbase)); 59 function function2($user,$password,$dbase,$conn_type) 64 var_dump($conn1 = oci_new_connect($user,$password,$dbase)); [all …]
|
H A D | connect_with_charset_001.phpt | 10 var_dump($c1 = oci_connect($user, $password, $dbase)); 11 var_dump($c2 = oci_connect($user, $password, $dbase, "")); 12 var_dump($c3 = oci_connect($user, $password, $dbase, "blah")); 13 var_dump($c4 = oci_connect($user, $password, $dbase, "obviously wrong")); 17 var_dump($c5 = oci_connect($user, $password, $dbase, "US7ASCII")); 18 var_dump($c6 = oci_connect($user, $password, $dbase, "UTF8"));
|
H A D | drcp_scope3.phpt | 21 $c = oci_new_connect($user,$password,$dbase); 26 function1($user,$password,$dbase); 29 function2($user,$password,$dbase); 33 function function1($user,$password,$dbase) 35 var_dump($c = oci_pconnect($user,$password,$dbase)); 41 function function2($user,$password,$dbase) 43 var_dump($c = oci_pconnect($user,$password,$dbase));
|
H A D | drcp_scope4.phpt | 24 $c = oci_new_connect($user,$password,$dbase); 29 function1($user,$password,$dbase); 32 function2($user,$password,$dbase); 36 function function1($user,$password,$dbase) 38 var_dump($c = oci_pconnect($user,$password,$dbase)); 44 function function2($user,$password,$dbase) 46 var_dump($c = oci_pconnect($user,$password,$dbase));
|
H A D | connect_1_old.phpt | 11 var_dump($c1 = ociplogon($user, $password, $dbase)); 14 var_dump($c1 = ociplogon($user, $password)); 18 var_dump($c2 = ocinlogon($user, $password, $dbase)); 21 var_dump($c2 = ocinlogon($user, $password));
|
H A D | connect_1.phpt | 11 var_dump($c1 = oci_pconnect($user, $password, $dbase)); 14 var_dump($c1 = oci_pconnect($user, $password)); 18 var_dump($c2 = oci_new_connect($user, $password, $dbase)); 21 var_dump($c2 = oci_new_connect($user, $password));
|
H A D | drcp_scope5.phpt | 24 $c = oci_new_connect($user,$password,$dbase); 29 function1($user,$password,$dbase); 32 function2($user,$password,$dbase); 36 function function1($user,$password,$dbase) 38 var_dump($c = oci_pconnect($user,$password,$dbase)); 44 function function2($user,$password,$dbase) 46 var_dump($c = oci_pconnect($user,$password,$dbase));
|
H A D | connect_scope1.phpt | 18 $c1 = oci_new_connect($user,$password,$dbase); 20 $c1 = oci_new_connect($user,$password); 30 global $user, $password, $dbase; 33 $c = oci_connect($user,$password,$dbase); 35 $c = oci_connect($user,$password);
|
H A D | connect_scope2.phpt | 18 $c1 = oci_new_connect($user,$password,$dbase); 20 $c1 = oci_new_connect($user,$password); 30 global $user, $password, $dbase; 33 $c = oci_pconnect($user,$password,$dbase); 35 $c = oci_pconnect($user,$password);
|
H A D | bug42134.phpt | 16 $c = oci_connect($user,$password,$dbase); 19 $c = oci_connect($user,$password); 32 $c = oci_new_connect($user,$password,$dbase); 35 $c = oci_new_connect($user,$password); 48 $c = oci_pconnect($user,$password,$dbase); 51 $c = oci_pconnect($user,$password);
|
H A D | drcp_privileged.phpt | 17 …die("skip this test is unlikely to work with a remote database - unless an Oracle password file ha… 40 var_dump(oci_connect($user,$password,$dbase,false,OCI_SYSDBA)); 41 var_dump(oci_connect($user,$password,$dbase,false,OCI_SYSOPER)); 42 var_dump(oci_new_connect($user,$password,$dbase,false,OCI_SYSDBA)); 43 var_dump(oci_new_connect($user,$password,$dbase,false,OCI_SYSOPER)); 44 var_dump(oci_pconnect($user,$password,$dbase,false,OCI_SYSDBA)); 45 var_dump(oci_pconnect($user,$password,$dbase,false,OCI_SYSOPER));
|
/PHP-7.0/ext/imap/tests/ |
H A D | imap_errors_basic.phpt | 16 $password = "bogus"; // invalid password to use in this test 18 echo "Issue open with invalid password with normal default number of retries, i.e 3\n"; 19 $mbox = imap_open($default_mailbox, $username, $password, OP_READONLY, 3); 24 echo "\n\nIssue open with invalid password with retries == 1\n"; 25 $mbox = imap_open($default_mailbox, $username, $password, OP_READONLY, 1); 33 Issue open with invalid password with normal default number of retries, i.e 3 47 Issue open with invalid password with retries == 1
|
/PHP-7.0/ext/hash/tests/ |
H A D | hash_pbkdf2_error.phpt | 8 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int le… 9 Generate a PBKDF2 hash of the given password and salt 14 $password = 'password'; 22 var_dump(@hash_pbkdf2('crc32', $password)); 24 var_dump(@hash_pbkdf2('crc32', $password, $salt)); 28 var_dump(@hash_pbkdf2('crc32', $password, $salt, 10, 10, true, 'extra arg')); 32 var_dump(@hash_pbkdf2('foo', $password, $salt, 1)); 36 var_dump(@hash_pbkdf2('md5', $password, $salt, 0)); 38 var_dump(@hash_pbkdf2('md5', $password, $salt, -1)); 42 var_dump(@hash_pbkdf2('md5', $password, $salt, 1, -1));
|
H A D | hash_pbkdf2_basic.phpt | 16 echo "sha1: " . hash_pbkdf2('sha1', 'password', 'salt', 1, 20)."\n"; 17 echo "sha1(no length): " . hash_pbkdf2('sha1', 'password', 'salt', 1)."\n"; 18 echo "sha1(raw): " . bin2hex(hash_pbkdf2('sha1', 'password', 'salt', 1, 20, TRUE))."\n"; 21 echo "sha256: " . hash_pbkdf2('sha256', 'password', 'salt', 1, 20)."\n"; 22 echo "sha256(no length): " . hash_pbkdf2('sha256', 'password', 'salt', 1)."\n"; 23 echo "sha256(raw): " . bin2hex(hash_pbkdf2('sha256', 'password', 'salt', 1, 20, TRUE))."\n";
|
/PHP-7.0/ext/soap/tests/bugs/ |
H A D | multiport.phpt | 11 $response = $client->GetSessionId(array('userId'=>'user', 'password'=>'password')); 16 …ENV:Body><ns1:GetSessionId><ns1:userId>user</ns1:userId><ns1:password>password</ns1:password></ns1…
|
/PHP-7.0/ext/pdo_firebird/tests/ |
H A D | testdb.inc | 4 $password = 'masterkey'; 6 ini_set('ibase.default_password',$password); 13 global $test_base, $user, $password; 16 $test_base, $user, $password));
|
/PHP-7.0/sapi/tests/ |
H A D | test006.phpt | 19 Content-Disposition: form-data; name="password" 21 password box 57 [password] => password box
|
/PHP-7.0/ext/standard/ |
H A D | crypt.c | 154 PHPAPI zend_string *php_crypt(const char *password, const int pass_len, const char *salt, int salt_… in php_crypt() argument 167 out = php_md5_crypt_r(password, salt, output); in php_crypt() 176 crypt_res = php_sha512_crypt_r(password, salt, output, PHP_MAX_SALT_LEN); in php_crypt() 191 crypt_res = php_sha256_crypt_r(password, salt, output, PHP_MAX_SALT_LEN); in php_crypt() 210 crypt_res = php_crypt_blowfish_rn(password, salt, output, sizeof(output)); in php_crypt() 238 crypt_res = _crypt_extended_r(password, salt, &buffer); in php_crypt() 266 crypt_res = crypt_r(password, salt, &buffer); in php_crypt() 269 crypt_res = crypt(password, salt); in php_crypt()
|
/PHP-7.0/ext/zip/lib/ |
H A D | zip_fopen_encrypted.c | 39 zip_fopen_encrypted(zip_t *za, const char *fname, zip_flags_t flags, const char *password) in zip_fopen_encrypted() argument 46 return zip_fopen_index_encrypted(za, (zip_uint64_t)idx, flags, password); in zip_fopen_encrypted()
|