/PHP-7.4/ext/pdo_pgsql/tests/ |
H A D | bug68199.phpt | 35 $db->exec("NOTIFY notifies_phpt, 'payload'"); 44 $db->exec("NOTIFY notifies_phpt, 'payload'"); 49 var_dump($notify['payload']); 65 var_dump($notify['payload']); 73 var_dump($notify['payload']); 89 string(7) "payload" 93 string(7) "payload" 97 string(7) "payload" 101 string(7) "payload" 105 string(7) "payload" [all …]
|
/PHP-7.4/ext/pdo_firebird/tests/ |
H A D | payload_server.php | 10 $payload = file_get_contents($filename); variable 11 if ($payload === false) { 19 fwrite($conn, $payload);
|
H A D | payload_server.inc | 12 // First, wait for the payload server to declare itself ready. 24 if (preg_match('/FB payload server listening on (.+)/', $line, $matches)) { 41 // note: even when server prints 'FB payload server listening on localhost:12345'
|
H A D | payload_test.phpt | 2 FB payload server satisfies connection attempt
|
/PHP-7.4/ext/standard/tests/serialize/ |
H A D | __serialize_003.phpt | 27 return "payload"; 30 public function unserialize($payload) { 32 var_dump($payload); 40 var_dump(unserialize('C:4:"Test":7:{payload}')); 54 string(7) "payload"
|
H A D | unserialize_abstract_class.phpt | 6 $payload = 'O:23:"RecursiveFilterIterator":0:{}'; 8 var_dump(unserialize($payload));
|
H A D | __serialize_007.phpt | 6 $payload = 'O:13:"ArrayIterator":2:{i:0;i:0;s:1:"x";R:2;}'; 8 var_dump(unserialize($payload));
|
H A D | unserialize_leak.phpt | 6 $payload = 'C:16:"SplObjectStorage":113:{x:i:2;O:8:"stdClass":1:{},a:2:{s:4:"prev";i:2;s:4:"next";O… 8 var_dump(unserialize($payload));
|
H A D | __serialize_005.phpt | 28 public function __unserialize(array $payload) { 29 [$data2, $data] = $payload;
|
H A D | unserialize_large.phpt | 2 Unserializing payload with unrealistically large element counts
|
/PHP-7.4/ext/imap/tests/ |
H A D | bug77153.phpt | 11 $payload = "echo 'BUG'> " . __DIR__ . '/__bug'; 12 $payloadb64 = base64_encode($payload);
|
/PHP-7.4/ext/date/tests/ |
H A D | bug79015.phpt | 5 $payload = 'O:12:"DateInterval":16:{s:1:"y";i:1;s:1:"m";i:0;s:1:"d";i:4;s:1:"h";i:0;s:1:"i";i:0;s:1… 6 var_dump(unserialize($payload));
|
/PHP-7.4/ext/spl/tests/ |
H A D | bug74669.phpt | 78 $payload = 'x:i:33554432;O:8:"stdClass":0:{};m:a:0:{}'; 79 $str = 'C:11:"ArrayObject":' . strlen($payload) . ':{' . $payload . '}';
|
/PHP-7.4/ext/json/tests/ |
H A D | fail001.phpt | 11 '"A JSON payload should be an object or array, not a string."', 47 Testing: "A JSON payload should be an object or array, not a string." 49 string(58) "A JSON payload should be an object or array, not a string." 51 string(58) "A JSON payload should be an object or array, not a string."
|
/PHP-7.4/ext/mysqlnd/ |
H A D | mysqlnd_commands.c | 343 …mand, change_user)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload, const zend_bool … in MYSQLND_METHOD() 350 …d(conn->payload_decoder_factory, COM_CHANGE_USER, (const zend_uchar*) payload.s, payload.l, silent, in MYSQLND_METHOD() 407 …QLND_METHOD(mysqlnd_command, stmt_execute)(MYSQLND_CONN_DATA * conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD() 415 (const unsigned char *) payload.s, payload.l, FALSE, in MYSQLND_METHOD() 430 …_METHOD(mysqlnd_command, stmt_fetch)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD() 437 …and(conn->payload_decoder_factory, COM_STMT_FETCH, (const zend_uchar*) payload.s, payload.l, FALSE, in MYSQLND_METHOD() 481 …ysqlnd_command, stmt_send_long_data)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload) in MYSQLND_METHOD() 488 …>payload_decoder_factory, COM_STMT_SEND_LONG_DATA, (const zend_uchar*) payload.s, payload.l, FALSE, in MYSQLND_METHOD()
|
H A D | mysqlnd_structs.h | 329 …e_com_change_user)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload, const zend_bool … 332 … (*func_mysqlnd_execute_com_stmt_execute)(MYSQLND_CONN_DATA * conn, const MYSQLND_CSTRING payload); 333 …unc_mysqlnd_execute_com_stmt_fetch)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload); 335 …nd_execute_com_stmt_send_long_data)(MYSQLND_CONN_DATA * const conn, const MYSQLND_CSTRING payload);
|
H A D | mysqlnd_ps.c | 48 const MYSQLND_CSTRING payload = {(const char*) buf, sizeof(buf)}; in mysqlnd_stmt_send_cursor_fetch_command() local 53 if (conn->command->stmt_fetch(conn, payload) == FAIL) { in mysqlnd_stmt_send_cursor_fetch_command() 721 const MYSQLND_CSTRING payload = {(const char*) request, request_len}; in MYSQLND_METHOD() local 723 ret = conn->command->stmt_execute(conn, payload); in MYSQLND_METHOD() 1299 const MYSQLND_CSTRING payload = {(const char *) cmd_buf, packet_len}; in MYSQLND_METHOD() local 1301 ret = conn->command->stmt_send_long_data(conn, payload); in MYSQLND_METHOD()
|
H A D | mysqlnd_wireprotocol.c | 619 …const MYSQLND_CSTRING payload = {(char*) buffer + MYSQLND_HEADER_SIZE, p - (buffer + MYSQLND_HEADE… in php_mysqlnd_auth_write() local 622 ret = conn->command->change_user(conn, payload, silent); in php_mysqlnd_auth_write()
|
/PHP-7.4/ext/standard/tests/file/ |
H A D | stream_rfc2397_006.phpt | 2 Stream: RFC2397 with corrupt? payload
|
/PHP-7.4/ext/standard/tests/strings/ |
H A D | bug72434.phpt | 7 // Create our payload and unserialize it.
|
/PHP-7.4/ext/dom/ |
H A D | dom_iterators.c | 44 static void itemHashScanner (void *payload, void *data, const xmlChar *name) /* {{{ */ in itemHashScanner() argument 46 static void itemHashScanner (void *payload, void *data, xmlChar *name) in itemHashScanner() 55 priv->node = (xmlNode *)payload; in itemHashScanner()
|