Searched defs:password (Results 1 - 17 of 17) sorted by relevance

/PHP_TRUNK/ext/zip/lib/
H A Dzip_fopen_encrypted.c2 zip_fopen_encrypted.c -- open file for reading with password
43 zip_fopen_encrypted(struct zip *za, const char *fname, zip_flags_t flags, const char *password)
50 return zip_fopen_index_encrypted(za, (zip_uint64_t)idx, flags, password);
41 zip_fopen_encrypted(struct zip *za, const char *fname, zip_flags_t flags, const char *password) argument
H A Dzip_source_pkware.c68 zip_uint16_t em, int flags, const char *password)
73 if (password == NULL || src == NULL || em != ZIP_EM_TRAD_PKWARE) {
92 decrypt(ctx, NULL, (const zip_uint8_t *)password, strlen(password), 1);
160 /* stat failed, skip password validation */
64 zip_source_pkware(struct zip *za, struct zip_source *src, zip_uint16_t em, int flags, const char *password) argument
H A Dzip_source_zip_new.c46 zip_uint64_t start, zip_uint64_t len, const char *password)
89 if (password == NULL) {
137 if ((s2=enc_impl(za, src, st.encryption_method, 0, password)) == NULL) {
43 _zip_source_zip_new(struct zip *za, struct zip *srcza, zip_uint64_t srcidx, zip_flags_t flags, zip_uint64_t start, zip_uint64_t len, const char *password) argument
H A Dzip_fopen_index_encrypted.c2 zip_fopen_index_encrypted.c -- open file for reading by index w/ password
50 const char *password)
55 if ((src=_zip_source_zip_new(za, za, index, flags, 0, 0, password)) == NULL)
47 zip_fopen_index_encrypted(struct zip *za, zip_uint64_t index, zip_flags_t flags, const char *password) argument
/PHP_TRUNK/ext/hash/
H A Dhash.c598 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int length = 0, bool raw_output = false])
599 Generate a PBKDF2 hash of the given password and salt
670 /* digest = hash_hmac(salt + pack('N', i), password) { */
690 /* digest = hash_hmac(digest, password) { */
923 char *password, *salt; local
927 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "lssl", &algorithm, &password, &password_len, &salt, &salt_len, &l_bytes) == FAILURE) {
972 ops->hash_update(context, (unsigned char *)password, password_len);
1176 ZEND_ARG_INFO(0, password)
/PHP_TRUNK/ext/mysqlnd/
H A Dmysqlnd_auth.c328 void php_mysqlnd_scramble(zend_uchar * const buffer, const zend_uchar * const scramble, const zend_uchar * const password, size_t password_len) argument
334 /* Phase 1: hash password */
336 PHP_SHA1Update(&context, password, password_len);
607 /* password message is to long */
608 SET_CLIENT_ERROR(*conn->error_info, CR_UNKNOWN_ERROR, UNKNOWN_SQLSTATE, "password is too long");
609 DBG_ERR("password is too long");
/PHP_TRUNK/ext/openssl/
H A Dopenssl.c263 ZEND_ARG_INFO(0, password)
382 ZEND_ARG_INFO(0, password)
390 ZEND_ARG_INFO(0, password)
3872 /* {{{ proto string openssl_pbkdf2(string password, string salt, long key_length, long iterations [, string digest_method = "sha1"])
3877 char *password; local
3888 &password, &password_len,
3912 if (PKCS5_PBKDF2_HMAC(password, password_len, (unsigned char *)salt, salt_len, iterations, digest, key_length, (unsigned char*)out_buffer->val) == 1) {
5048 /* {{{ proto string openssl_encrypt(string data, string method, string password [, long options=0 [, string $iv='']])
5053 char *data, *method, *password, *iv = ""; local
5062 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss|ls", &data, &data_len, &method, &method_len, &password,
5133 char *data, *method, *password, *iv = ""; local
[all...]
/PHP_TRUNK/ext/pdo/
H A Dphp_pdo_driver.h436 char *username, *password; member in struct:_pdo_dbh_t
H A Dpdo_dbh.c205 char *username=NULL, *password=NULL; local
213 &username, &usernamelen, &password, &passwordlen, &options)) {
262 * it might contain a password */
284 password ? password : "",
292 password ? password : "");
349 dbh->password = password ? pestrdup(password, is_persisten
[all...]
/PHP_TRUNK/ext/standard/
H A Dphp_password.h29 PHP_MINIT_FUNCTION(password); variable
H A Dcrypt.c148 PHPAPI zend_string *php_crypt(const char *password, const int pass_len, const char *salt, int salt_len) argument
161 out = php_md5_crypt_r(password, salt, output);
170 crypt_res = php_sha512_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
185 crypt_res = php_sha256_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
208 crypt_res = php_crypt_blowfish_rn(password, salt, output, sizeof(output));
221 crypt_res = _crypt_extended_r(password, salt, &buffer);
242 crypt_res = crypt_r(password, salt, &buffer);
H A Dpassword.c38 PHP_MINIT_FUNCTION(password) /* {{{ */
259 /* {{{ proto boolean password_make_salt(string password, string hash)
265 char *password, *hash; local
268 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", &password, &password_len, &hash, &hash_len) == FAILURE) {
271 if ((ret = php_crypt(password, (int)password_len, hash, (int)hash_len)) == NULL) {
295 /* {{{ proto string password_hash(string password, int algo, array options = array())
296 Hash a password */
299 char *hash_format, *hash, *salt, *password; local
308 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sl|H", &password, &password_len, &algo, &options) == FAILURE) {
342 php_error_docref(NULL TSRMLS_CC, E_WARNING, "Unknown password hashin
[all...]
/PHP_TRUNK/ext/zip/
H A Dphp_zip.c1435 /* {{{ proto resource ZipArchive::setPassword(string password)
1436 Set the password for the active archive */
1441 char *password; local
1450 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", &password, &password_len) == FAILURE) {
1457 int res = zip_set_default_password(intern, (const char *)password);
2697 ZEND_ARG_INFO(0, password)
/PHP_TRUNK/ext/soap/
H A Dphp_http.c37 zval *login, *password; local
45 if ((password = zend_hash_str_find(Z_OBJPROP_P(this_ptr), "_proxy_password", sizeof("_proxy_password")-1)) != NULL) {
46 smart_str_appendl(&auth, Z_STRVAL_P(password), Z_STRLEN_P(password));
63 zval *login, *password; local
72 if ((password = zend_hash_str_find(Z_OBJPROP_P(this_ptr), "_password", sizeof("_password")-1)) != NULL) {
73 smart_str_appendl(&auth, Z_STRVAL_P(password), Z_STRLEN_P(password));
519 zval *cookies, *login, *password; local
655 if ((password
1119 zval *digest, *login, *password; local
[all...]
/PHP_TRUNK/ext/mysqli/
H A Dmysqli_api.c619 /* {{{ proto bool mysqli_change_user(object link, string user, string password, string database)
625 char *user, *password, *dbname; local
632 if (zend_parse_method_parameters(ZEND_NUM_ARGS() TSRMLS_CC, getThis(), "Osss", &mysql_link, mysqli_link_class_entry, &user, &user_len, &password, &password_len, &dbname, &dbname_len) == FAILURE) {
642 rc = mysqlnd_change_user_ex(mysql->mysql, user, password, dbname, FALSE, (size_t) password_len);
644 rc = mysql_change_user(mysql->mysql, user, password, dbname);
/PHP_TRUNK/ext/com_dotnet/
H A Dcom_com.c39 char *user_name = NULL, *domain_name = NULL, *password = NULL; local
98 password = Z_STRVAL_P(tmp);
134 if (password) {
135 authid.Password = (OLECHAR*)password;
/PHP_TRUNK/ext/oci8/
H A Doci8.c138 static int php_oci_create_session(php_oci_connection *connection, php_oci_spool *session_pool, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC);
139 static int php_oci_old_create_session(php_oci_connection *connection, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC);
140 static php_oci_spool *php_oci_get_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, int charsetid TSRMLS_DC);
141 static php_oci_spool *php_oci_create_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, zend_string *hash_key, int charsetid TSRMLS_DC);
384 ZEND_ARG_INFO(0, password)
392 ZEND_ARG_INFO(0, password)
400 ZEND_ARG_INFO(0, password)
1442 * If oci_password_change() changed the password of a persistent connection, close the
1444 * will be prevented from being able to present the old (now invalid) password to a usable
1445 * connection to the database; they must use the new password
1759 char *username, *password; local
1802 php_oci_do_connect_ex(char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, char *dbname, int dbname_len, char *charset, zend_long session_mode, int persistent, int exclusive TSRMLS_DC) argument
2833 php_oci_create_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, zend_string *hash_key, int charsetid TSRMLS_DC) argument
2970 php_oci_get_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, int charsetid TSRMLS_DC) argument
3082 php_oci_old_create_session(php_oci_connection *connection, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC) argument
3265 php_oci_create_session(php_oci_connection *connection, php_oci_spool *session_pool, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC) argument
[all...]

Completed in 53 milliseconds