Searched defs:password (Results 1 - 17 of 17) sorted by relevance

/PHP_5_6/ext/zip/lib/
H A Dzip_fopen_encrypted.c2 zip_fopen_encrypted.c -- open file for reading with password
43 zip_fopen_encrypted(struct zip *za, const char *fname, zip_flags_t flags, const char *password)
50 return zip_fopen_index_encrypted(za, (zip_uint64_t)idx, flags, password);
41 zip_fopen_encrypted(struct zip *za, const char *fname, zip_flags_t flags, const char *password) argument
H A Dzip_source_pkware.c68 zip_uint16_t em, int flags, const char *password)
73 if (password == NULL || src == NULL || em != ZIP_EM_TRAD_PKWARE) {
92 decrypt(ctx, NULL, (const zip_uint8_t *)password, strlen(password), 1);
160 /* stat failed, skip password validation */
64 zip_source_pkware(struct zip *za, struct zip_source *src, zip_uint16_t em, int flags, const char *password) argument
H A Dzip_source_zip_new.c46 zip_uint64_t start, zip_uint64_t len, const char *password)
89 if (password == NULL) {
137 if ((s2=enc_impl(za, src, st.encryption_method, 0, password)) == NULL) {
43 _zip_source_zip_new(struct zip *za, struct zip *srcza, zip_uint64_t srcidx, zip_flags_t flags, zip_uint64_t start, zip_uint64_t len, const char *password) argument
H A Dzip_fopen_index_encrypted.c2 zip_fopen_index_encrypted.c -- open file for reading by index w/ password
50 const char *password)
55 if ((src=_zip_source_zip_new(za, za, index, flags, 0, 0, password)) == NULL)
47 zip_fopen_index_encrypted(struct zip *za, zip_uint64_t index, zip_flags_t flags, const char *password) argument
/PHP_5_6/ext/mysqlnd/
H A Dmysqlnd_auth.c328 void php_mysqlnd_scramble(zend_uchar * const buffer, const zend_uchar * const scramble, const zend_uchar * const password, size_t password_len) argument
334 /* Phase 1: hash password */
336 PHP_SHA1Update(&context, password, password_len);
610 /* password message is to long */
611 SET_CLIENT_ERROR(*conn->error_info, CR_UNKNOWN_ERROR, UNKNOWN_SQLSTATE, "password is too long");
612 DBG_ERR("password is too long");
/PHP_5_6/ext/pdo/
H A Dphp_pdo_driver.h442 char *username, *password; member in struct:_pdo_dbh_t
H A Dpdo_dbh.c209 char *username=NULL, *password=NULL; local
217 &username, &usernamelen, &password, &passwordlen, &options)) {
267 * it might contain a password */
288 password ? password : "",
296 password ? password : "");
368 dbh->password = password ? pestrdup(password, is_persisten
[all...]
/PHP_5_6/ext/standard/
H A Dcrypt.c148 PHPAPI int php_crypt(const char *password, const int pass_len, const char *salt, int salt_len, char **result) argument
160 out = php_md5_crypt_r(password, salt, output);
170 crypt_res = php_sha512_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
185 crypt_res = php_sha256_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
208 crypt_res = php_crypt_blowfish_rn(password, salt, output, sizeof(output));
221 crypt_res = _crypt_extended_r(password, salt, &buffer);
242 crypt_res = crypt_r(password, salt, &buffer);
H A Dpassword.c38 PHP_MINIT_FUNCTION(password) /* {{{ */
187 php_error_docref(NULL TSRMLS_CC, E_WARNING, "Supplied password hash too long to safely identify");
231 php_error_docref(NULL TSRMLS_CC, E_WARNING, "Supplied password hash too long to safely identify");
271 /* {{{ proto boolean password_make_salt(string password, string hash)
277 char *ret, *password, *hash; local
279 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", &password, &password_len, &hash, &hash_len) == FAILURE) {
282 if (php_crypt(password, password_len, hash, hash_len, &ret) == FAILURE) {
306 /* {{{ proto string password_hash(string password, int algo, array options = array())
307 Hash a password */
310 char *hash_format, *hash, *salt, *password, *resul local
[all...]
H A Dphp_password.h29 PHP_MINIT_FUNCTION(password); variable
/PHP_5_6/ext/zip/
H A Dphp_zip.c1580 /* {{{ proto resource ZipArchive::setPassword(string password)
1581 Set the password for the active archive */
1586 char *password; local
1595 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", &password, &password_len) == FAILURE) {
1602 int res = zip_set_default_password(intern, (const char *)password);
2843 ZEND_ARG_INFO(0, password)
/PHP_5_6/ext/hash/
H A Dhash.c607 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int length = 0, bool raw_output = false])
608 Generate a PBKDF2 hash of the given password and salt
678 /* digest = hash_hmac(salt + pack('N', i), password) { */
698 /* digest = hash_hmac(digest, password) { */
931 char *password, *salt; local
935 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "lssl", &algorithm, &password, &password_len, &salt, &salt_len, &l_bytes) == FAILURE) {
980 ops->hash_update(context, (unsigned char *)password, password_len);
1188 ZEND_ARG_INFO(0, password)
/PHP_5_6/ext/oci8/
H A Doci8.c138 static int php_oci_create_session(php_oci_connection *connection, php_oci_spool *session_pool, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC);
139 static int php_oci_old_create_session(php_oci_connection *connection, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC);
140 static php_oci_spool *php_oci_get_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, int charsetid TSRMLS_DC);
141 static php_oci_spool *php_oci_create_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, char *hash_key, int hash_key_len, int charsetid TSRMLS_DC);
384 ZEND_ARG_INFO(0, password)
392 ZEND_ARG_INFO(0, password)
400 ZEND_ARG_INFO(0, password)
1441 * If oci_password_change() changed the password of a persistent connection, close the
1443 * will be prevented from being able to present the old (now invalid) password to a usable
1444 * connection to the database; they must use the new password
1756 char *username, *password; local
1799 php_oci_do_connect_ex(char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, char *dbname, int dbname_len, char *charset, long session_mode, int persistent, int exclusive TSRMLS_DC) argument
2826 php_oci_create_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, char *hash_key, int hash_key_len, int charsetid TSRMLS_DC) argument
2963 php_oci_get_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, int charsetid TSRMLS_DC) argument
3068 php_oci_old_create_session(php_oci_connection *connection, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC) argument
3251 php_oci_create_session(php_oci_connection *connection, php_oci_spool *session_pool, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC) argument
[all...]
/PHP_5_6/ext/mysqli/
H A Dmysqli_api.c622 /* {{{ proto bool mysqli_change_user(object link, string user, string password, string database)
628 char *user, *password, *dbname; local
635 if (zend_parse_method_parameters(ZEND_NUM_ARGS() TSRMLS_CC, getThis(), "Osss", &mysql_link, mysqli_link_class_entry, &user, &user_len, &password, &password_len, &dbname, &dbname_len) == FAILURE) {
645 rc = mysqlnd_change_user_ex(mysql->mysql, user, password, dbname, FALSE, (size_t) password_len);
647 rc = mysql_change_user(mysql->mysql, user, password, dbname);
/PHP_5_6/ext/com_dotnet/
H A Dcom_com.c39 char *user_name = NULL, *domain_name = NULL, *password = NULL; local
98 password = Z_STRVAL_PP(tmp);
134 if (password) {
135 authid.Password = (OLECHAR*)password;
/PHP_5_6/ext/openssl/
H A Dopenssl.c263 ZEND_ARG_INFO(0, password)
382 ZEND_ARG_INFO(0, password)
390 ZEND_ARG_INFO(0, password)
3900 /* {{{ proto string openssl_pbkdf2(string password, string salt, long key_length, long iterations [, string digest_method = "sha1"])
3905 char *password; int password_len; local
3913 &password, &password_len,
3938 if (PKCS5_PBKDF2_HMAC(password, password_len, (unsigned char *)salt, salt_len, iterations, digest, key_length, out_buffer) == 1) {
5079 /* {{{ proto string openssl_encrypt(string data, string method, string password [, long options=0 [, string $iv='']])
5084 char *data, *method, *password, *iv = ""; local
5092 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss|ls", &data, &data_len, &method, &method_len, &password,
5163 char *data, *method, *password, *iv = ""; local
[all...]
/PHP_5_6/ext/soap/
H A Dphp_http.c37 zval **login, **password; local
46 if (zend_hash_find(Z_OBJPROP_P(this_ptr), "_proxy_password", sizeof("_proxy_password"), (void **)&password) == SUCCESS) {
47 smart_str_appendl(&auth, Z_STRVAL_PP(password), Z_STRLEN_PP(password));
64 zval **login, **password; local
74 if (zend_hash_find(Z_OBJPROP_P(this_ptr), "_password", sizeof("_password"), (void **)&password) == SUCCESS) {
75 smart_str_appendl(&auth, Z_STRVAL_PP(password), Z_STRLEN_PP(password));
525 zval **cookies, **login, **password; local
661 if (zend_hash_find(Z_OBJPROP_P(this_ptr), "_password", sizeof("_password"), (void **)&password)
1130 zval **digest, **login, **password; local
[all...]

Completed in 82 milliseconds