Searched refs:read (Results 26 – 50 of 478) sorted by path
12345678910>>...20
/PHP-5.5/ext/dba/tests/ |
H A D | dba_cdb_read.phpt | 2 DBA CDB handler test (read only) 14 // read key sequence
|
H A D | skipif.inc | 10 $handlers = array_diff($handlers, array('cdb', 'cdb_make')); /* these can only read OR write */
|
/PHP-5.5/ext/dom/tests/ |
H A D | DOMAttr_name_basic_001.phpt | 2 DOMAttr read $name property.
|
H A D | DOMDocument_config_basic.phpt | 2 Tests DOMDocument::config read
|
H A D | DOMDocument_documentURI_basic.phpt | 2 Tests DOMDocument::documentURI read and write
|
H A D | DOMDocument_encoding_basic.phpt | 2 DOMDocument::$encoding - read/write tests (dom_document_encoding_read/dom_document_encoding_write)
|
H A D | DOMDocument_preserveWhiteSpace_basic.phpt | 2 DOMDocument::$preserveWhiteSpace - test ability to read and write property
|
H A D | DOMDocument_preserveWhiteSpace_variations.phpt | 2 DOMDocument::$preserveWhiteSpace - test ability to read and write property
|
H A D | DOMDocument_validate_on_parse_basic.phpt | 2 DOMDocument::$validateOnParse - read/write tests (dom_document_validate_on_parse_read/dom_document_…
|
/PHP-5.5/ext/ereg/regex/ |
H A D | COPYRIGHT | 13 explicit claim or by omission. Since few users ever read sources, 18 ever read sources, credits must appear in the documentation.
|
/PHP-5.5/ext/exif/ |
H A D | test.txt | 9 * Rename the file to test.php and read the instructions. If the
|
/PHP-5.5/ext/exif/tests/ |
H A D | bug72094.phpt | 2 Bug #72094: Out of bounds heap read access in exif header processing
|
H A D | bug72603.phpt | 2 Bug #72603 (Out of bound read in exif_process_IFD_in_MAKERNOTE)
|
/PHP-5.5/ext/fileinfo/ |
H A D | libmagic.patch | 318 file_error(ms, errno, "cannot read magic file `%s'", 323 /* read and parse this file */ 641 - if (read(fd, map->p, map->len) != (ssize_t)map->len) { 939 DPRINTF(("Out of bounds read %" SIZE_T_FORMAT "u > %" 1240 * `safe' read for sockets and pipes. 1252 - switch ((rv = read(fd, buf, n))) { 1543 +#define FINFO_READ_FUNC read 2500 - /* We can not read it, but we were able to stat it. */ 2508 - if ((nbytes = read(fd, (char *)buf, HOWMANY)) == -1) { 2509 - file_error(ms, errno, "cannot read `%s'", inname); [all …]
|
/PHP-5.5/ext/fileinfo/libmagic/ |
H A D | file.h | 517 #define FINFO_READ_FUNC read
|
/PHP-5.5/ext/fileinfo/tests/ |
H A D | magic | 3737 >2 leshort &0x0040 \b, read only 6370 >313 string A\ disk\ read\ error\ occurred.\r 6535 >>>139 string Disk\ read\ error\0\r 6660 #If the boot sector fails to read any other sector, 6698 #If the boot sector fails to read any other sector, 6831 >>>>&0 string Disk\ read\ error\0 9430 >2 beshort 0410 read-only binary 9434 >2 beshort 0410 read-only binary 11979 #>65 string ttro (SimpleText read-only) 13620 # to read Backing File Information [all …]
|
/PHP-5.5/ext/gd/libgd/ |
H A D | gd_webp.c | 67 unsigned char *read, *temp; in gdImageCreateFromWebpCtx() local 78 read = temp + size; in gdImageCreateFromWebpCtx() 87 n = gdGetBuf(read, GD_WEBP_ALLOC_STEP, infile); in gdImageCreateFromWebpCtx()
|
/PHP-5.5/ext/gd/tests/ |
H A D | bug72227.phpt | 2 Bug #72227: imagescale out-of-bounds read
|
H A D | bug72512_0.phpt | 2 Bug #72512 gdImageTrueColorToPaletteBody allows arbitrary write/read access, var 0
|
H A D | bug72512_1.phpt | 2 Bug #72512 gdImageTrueColorToPaletteBody allows arbitrary write/read access, var 1
|
H A D | gif2gd.phpt | 10 die("skip gif read support unavailable");
|
H A D | gif2jpg.phpt | 13 die("skip gif read support unavailable");
|
H A D | gif2png.phpt | 13 die("skip gif read support unavailable");
|
H A D | xbm2png.phpt | 12 die("skip xbm read support unavailable");
|
H A D | xpm2gd.phpt | 10 die("skip xpm read support unavailable");
|
Completed in 90 milliseconds
12345678910>>...20