/PHP-7.2/Zend/tests/ |
H A D | bug69315.phpt | 19 Warning: strlen() has been disabled for security reasons in %sbug69315.php on line %d 22 Warning: defined() has been disabled for security reasons in %sbug69315.php on line %d 25 Warning: constant() has been disabled for security reasons in %sbug69315.php on line %d 28 Warning: call_user_func() has been disabled for security reasons in %sbug69315.php on line %d 31 Warning: is_string() has been disabled for security reasons in %sbug69315.php on line %d
|
H A D | errmsg_020.phpt | 13 Warning: phpinfo() has been disabled for security reasons in %s on line %d
|
H A D | errmsg_021.phpt | 16 Warning: test() has been disabled for security reasons in %s on line %d
|
H A D | bug77494.phpt | 13 Warning: CURLFile() has been disabled for security reasons in %sbug77494.php on line 2
|
/PHP-7.2/TSRM/ |
H A D | tsrm_win32.c | 479 SECURITY_ATTRIBUTES security; in popen_ex() local 530 security.nLength = sizeof(SECURITY_ATTRIBUTES); in popen_ex() 531 security.bInheritHandle = TRUE; in popen_ex() 532 security.lpSecurityDescriptor = NULL; in popen_ex() 534 if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) { in popen_ex() 568 …DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &t… in popen_ex() 589 …res = CreateProcessAsUserW(token_user, NULL, cmdw, &security, &security, security.bInheritHandle, … in popen_ex() 592 …res = CreateProcessW(NULL, cmdw, &security, &security, security.bInheritHandle, dwCreateFlags, env… in popen_ex()
|
/PHP-7.2/ext/snmp/tests/ |
H A D | snmp-object-setSecurity_error.phpt | 39 Warning: SNMP::setSecurity(): Invalid security level '' in %s on line %d 42 Warning: SNMP::setSecurity(): Invalid security level 'bugusPriv' in %s on line %d 54 Warning: SNMP::setSecurity(): Unknown security protocol 'BBB' in %s on line %d
|
H A D | snmp3-error.phpt | 42 Warning: snmp3_get(): Invalid security level '' in %s on line %d 45 Warning: snmp3_get(): Invalid security level 'bugusPriv' in %s on line %d 57 Warning: snmp3_get(): Unknown security protocol 'BBB' in %s on line %d
|
H A D | snmp-object.phpt | 95 echo "SNMPv3 (default security settings)\n"; 209 SNMPv3 (default security settings)
|
/PHP-7.2/ext/standard/ |
H A D | proc_open.c | 369 # define pipe(pair) (CreatePipe(&pair[0], &pair[1], &security, 0) ? 0 : -1) 428 SECURITY_ATTRIBUTES security; in PHP_FUNCTION() local 501 memset(&security, 0, sizeof(security)); in PHP_FUNCTION() 502 security.nLength = sizeof(security); in PHP_FUNCTION() 503 security.bInheritHandle = TRUE; in PHP_FUNCTION() 504 security.lpSecurityDescriptor = NULL; in PHP_FUNCTION() 738 …newprocok = CreateProcessW(NULL, cmdw, &security, &security, TRUE, dwCreateFlags, envpw, cwdw, &si… in PHP_FUNCTION() 759 …newprocok = CreateProcessW(NULL, cmdw2, &security, &security, TRUE, dwCreateFlags, envpw, cwdw, &s… in PHP_FUNCTION()
|
/PHP-7.2/sapi/cgi/ |
H A D | CHANGES | 15 CGI: Enable the security check for internal server 25 to circumvent .htaccess security
|
/PHP-7.2/ext/opcache/tests/ |
H A D | bug76796.phpt | 17 Warning: strpos() has been disabled for security reasons in %s on line %d
|
H A D | bug68104.phpt | 19 Warning: dl() has been disabled for security reasons in %sbug68104.php on line %d
|
/PHP-7.2/ |
H A D | README.input_filter | 10 through which a company-wide or site-wide security policy can be 12 treat_data and post handler functions. To implement your own security 15 peoples' needs. However, if you want to implement your own security
|
H A D | .gitignore | 166 ext/simplexml/examples/security.new.xml
|
/PHP-7.2/tests/basic/ |
H A D | bug55500.phpt | 2 Bug #55500 (Corrupted $_FILES indices lead to security concern)
|
/PHP-7.2/ext/openssl/tests/ |
H A D | bug65538_002.phpt | 21 Warning: remote cafile streams are disabled for security purposes in %s on line %d
|
/PHP-7.2/ext/standard/tests/network/ |
H A D | news.rss | 24 …evelopment team announces the immediate availability of PHP 5.4.37. Six security-related bugs were…
|
/PHP-7.2/ext/phar/ |
H A D | phar_internal.h | 588 …phar_get_entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security); 589 …_info_dir(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security); 590 …fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security); 591 …fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security);
|
H A D | util.c | 345 …, char *path, int path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_entry_data() argument 383 … allow_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data() 390 …, path_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { in phar_get_entry_data() 511 …, char *path, int path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ in phar_get_or_create_entry_data() argument 529 …== phar_get_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security)) { in phar_get_or_create_entry_data() 1202 …entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security) /* {{{ */ in phar_get_entry_info() argument 1204 return phar_get_entry_info_dir(phar, path, path_len, 0, error, security); in phar_get_entry_info() 1212 …(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security) /* {{{ */ in phar_get_entry_info_dir() argument 1228 if (security && path_len >= (int)sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) { in phar_get_entry_info_dir()
|
/PHP-7.2/ext/exif/tests/ |
H A D | bug50845.phpt | 45 …nd (LSD-41), May 5, 2016. The vehicles were loaded to support a theater security cooperation event…
|
/PHP-7.2/ext/session/tests/ |
H A D | save_handler.inc | 133 // security reasons for production save handler. 156 // NOTE: This handler is mandatory for session security.
|
/PHP-7.2/ext/soap/ |
H A D | TODO | 60 - SOAP security extension
|
/PHP-7.2/ext/shmop/ |
H A D | README | 24 …(the n flag is mostly useful for security perpouses, so that you don't end up opening a faked segm…
|
/PHP-7.2/tests/security/ |
H A D | open_basedir.inc | 14 // recommended for production use as . bypasses all semblence of security..!
|
/PHP-7.2/win32/build/ |
H A D | config.w32 | 302 ARG_ENABLE("security-flags", "Disable the compiler security flags", "yes");
|