Searched refs:password (Results 1 - 25 of 41) sorted by relevance

12

/PHP_5_6/ext/oci8/tests/
H A Dconn_attr.inc70 $password = $GLOBALS['testpassword'];
75 return(oci_connect($user,$password,$dbase));
79 return(oci_pconnect($user,$password,$dbase));
83 return(oci_new_connect($user,$password,$dbase));
H A Dconnect.inc6 $c = @oci_connect($user, $password, $dbase);
9 $c = @oci_connect($user, $password);
H A Ddetails.inc4 * Please change $user, $password and $dbase to match your configuration.
19 $password = getenv('PHP_OCI8_TEST_PASS'); // Password for $user
29 $password = "oracle";
/PHP_5_6/ext/pdo_firebird/tests/
H A Dtestdb.inc4 $password = 'masterkey';
6 ini_set('ibase.default_password',$password);
13 global $test_base, $user, $password;
16 $test_base, $user, $password));
/PHP_5_6/ext/standard/tests/mail/
H A Dmail_include.inc8 $password = 'p4ssw0rd';
21 global $server, $default_mailbox, $username, $password;
24 $imap_stream = imap_open($default_mailbox, $username, $password);
/PHP_5_6/ext/zip/lib/
H A Dzip_fopen_encrypted.c2 zip_fopen_encrypted.c -- open file for reading with password
43 zip_fopen_encrypted(struct zip *za, const char *fname, zip_flags_t flags, const char *password)
50 return zip_fopen_index_encrypted(za, (zip_uint64_t)idx, flags, password);
41 zip_fopen_encrypted(struct zip *za, const char *fname, zip_flags_t flags, const char *password) argument
H A Dzip_source_pkware.c68 zip_uint16_t em, int flags, const char *password)
73 if (password == NULL || src == NULL || em != ZIP_EM_TRAD_PKWARE) {
92 decrypt(ctx, NULL, (const zip_uint8_t *)password, strlen(password), 1);
160 /* stat failed, skip password validation */
64 zip_source_pkware(struct zip *za, struct zip_source *src, zip_uint16_t em, int flags, const char *password) argument
H A Dzip_source_zip_new.c46 zip_uint64_t start, zip_uint64_t len, const char *password)
89 if (password == NULL) {
137 if ((s2=enc_impl(za, src, st.encryption_method, 0, password)) == NULL) {
43 _zip_source_zip_new(struct zip *za, struct zip *srcza, zip_uint64_t srcidx, zip_flags_t flags, zip_uint64_t start, zip_uint64_t len, const char *password) argument
H A Dzip_fopen_index_encrypted.c2 zip_fopen_index_encrypted.c -- open file for reading by index w/ password
50 const char *password)
55 if ((src=_zip_source_zip_new(za, za, index, flags, 0, 0, password)) == NULL)
47 zip_fopen_index_encrypted(struct zip *za, zip_uint64_t index, zip_flags_t flags, const char *password) argument
/PHP_5_6/ext/mysqli/tests/
H A Dconnect.inc4 database "stest" and empty password.
/PHP_5_6/ext/imap/tests/
H A Dimap_include.inc8 $password = 'p4ssw0rd';
67 global $server, $default_mailbox, $username, $password;
70 $imap_stream = imap_open($default_mailbox, $username, $password);
/PHP_5_6/ext/pdo_dblib/
H A Ddblib_driver.c339 if (dbh->password) {
340 if(FAIL == DBSETLPWD(H->login, dbh->password)) {
/PHP_5_6/ext/pdo_odbc/
H A Dodbc_driver.c451 spprintf(&dsn, 0, "%s;UID=%s;PWD=%s", dbh->data_source, dbh->username, dbh->password);
460 rc = SQLConnect(H->dbc, (char*)dbh->data_source, SQL_NTS, dbh->username, SQL_NTS, dbh->password, SQL_NTS);
/PHP_5_6/ext/soap/
H A Dphp_http.c37 zval **login, **password; local
46 if (zend_hash_find(Z_OBJPROP_P(this_ptr), "_proxy_password", sizeof("_proxy_password"), (void **)&password) == SUCCESS) {
47 smart_str_appendl(&auth, Z_STRVAL_PP(password), Z_STRLEN_PP(password));
64 zval **login, **password; local
74 if (zend_hash_find(Z_OBJPROP_P(this_ptr), "_password", sizeof("_password"), (void **)&password) == SUCCESS) {
75 smart_str_appendl(&auth, Z_STRVAL_PP(password), Z_STRLEN_PP(password));
525 zval **cookies, **login, **password; local
661 if (zend_hash_find(Z_OBJPROP_P(this_ptr), "_password", sizeof("_password"), (void **)&password)
1130 zval **digest, **login, **password; local
[all...]
/PHP_5_6/ext/standard/
H A Dcrypt.c148 PHPAPI int php_crypt(const char *password, const int pass_len, const char *salt, int salt_len, char **result) argument
160 out = php_md5_crypt_r(password, salt, output);
170 crypt_res = php_sha512_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
185 crypt_res = php_sha256_crypt_r(password, salt, output, PHP_MAX_SALT_LEN);
208 crypt_res = php_crypt_blowfish_rn(password, salt, output, sizeof(output));
221 crypt_res = _crypt_extended_r(password, salt, &buffer);
242 crypt_res = crypt_r(password, salt, &buffer);
H A Dpassword.c38 PHP_MINIT_FUNCTION(password) /* {{{ */
187 php_error_docref(NULL TSRMLS_CC, E_WARNING, "Supplied password hash too long to safely identify");
231 php_error_docref(NULL TSRMLS_CC, E_WARNING, "Supplied password hash too long to safely identify");
271 /* {{{ proto boolean password_make_salt(string password, string hash)
277 char *ret, *password, *hash; local
279 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", &password, &password_len, &hash, &hash_len) == FAILURE) {
282 if (php_crypt(password, password_len, hash, hash_len, &ret) == FAILURE) {
306 /* {{{ proto string password_hash(string password, int algo, array options = array())
307 Hash a password */
310 char *hash_format, *hash, *salt, *password, *resul local
[all...]
H A Dphp_crypt.h26 PHPAPI int php_crypt(const char *password, const int pass_len, const char *salt, int salt_len, char **result);
H A Dphp_password.h29 PHP_MINIT_FUNCTION(password); variable
/PHP_5_6/ext/pdo_pgsql/
H A Dpgsql_driver.c1176 if (dbh->password) {
1177 if (dbh->password[0] != '\'' && dbh->password[strlen(dbh->password) - 1] != '\'') {
1178 char *pwd = dbh->password;
1181 tmp_pass = safe_emalloc(2, strlen(dbh->password), 3);
1195 tmp_pass = dbh->password;
1199 /* support both full connection string & connection string + login and/or password */
1200 if (dbh->username && dbh->password) {
1201 spprintf(&conn_str, 0, "%s user=%s password
[all...]
/PHP_5_6/ext/hash/
H A Dhash.c607 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int length = 0, bool raw_output = false])
608 Generate a PBKDF2 hash of the given password and salt
678 /* digest = hash_hmac(salt + pack('N', i), password) { */
698 /* digest = hash_hmac(digest, password) { */
931 char *password, *salt; local
935 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "lssl", &algorithm, &password, &password_len, &salt, &salt_len, &l_bytes) == FAILURE) {
980 ops->hash_update(context, (unsigned char *)password, password_len);
1188 ZEND_ARG_INFO(0, password)
/PHP_5_6/ext/oci8/
H A Doci8.c138 static int php_oci_create_session(php_oci_connection *connection, php_oci_spool *session_pool, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC);
139 static int php_oci_old_create_session(php_oci_connection *connection, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC);
140 static php_oci_spool *php_oci_get_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, int charsetid TSRMLS_DC);
141 static php_oci_spool *php_oci_create_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, char *hash_key, int hash_key_len, int charsetid TSRMLS_DC);
384 ZEND_ARG_INFO(0, password)
392 ZEND_ARG_INFO(0, password)
400 ZEND_ARG_INFO(0, password)
1441 * If oci_password_change() changed the password of a persistent connection, close the
1443 * will be prevented from being able to present the old (now invalid) password to a usable
1444 * connection to the database; they must use the new password
1756 char *username, *password; local
1799 php_oci_do_connect_ex(char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, char *dbname, int dbname_len, char *charset, long session_mode, int persistent, int exclusive TSRMLS_DC) argument
2826 php_oci_create_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, char *hash_key, int hash_key_len, int charsetid TSRMLS_DC) argument
2963 php_oci_get_spool(char *username, int username_len, char *password, int password_len, char *dbname, int dbname_len, int charsetid TSRMLS_DC) argument
3068 php_oci_old_create_session(php_oci_connection *connection, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC) argument
3251 php_oci_create_session(php_oci_connection *connection, php_oci_spool *session_pool, char *dbname, int dbname_len, char *username, int username_len, char *password, int password_len, char *new_password, int new_password_len, int session_mode TSRMLS_DC) argument
[all...]
/PHP_5_6/ext/pdo/
H A Dpdo_dbh.c209 char *username=NULL, *password=NULL; local
217 &username, &usernamelen, &password, &passwordlen, &options)) {
267 * it might contain a password */
288 password ? password : "",
296 password ? password : "");
368 dbh->password = password ? pestrdup(password, is_persisten
[all...]
/PHP_5_6/ext/interbase/tests/
H A Dinterbase.inc6 $password = 'masterkey';
8 ini_set('ibase.default_password',$password);
15 global $test_base, $user, $password;
19 $user, $password, ($charset = ini_get('ibase.default_charset')) ? $charset : 'NONE'));
/PHP_5_6/ext/mysqli/
H A Dmysqli_fe.c159 ZEND_ARG_INFO(0, password)
165 ZEND_ARG_INFO(0, password)
173 ZEND_ARG_INFO(0, password)
183 ZEND_ARG_INFO(0, password)
193 ZEND_ARG_INFO(0, password)
/PHP_5_6/ext/com_dotnet/
H A Dcom_com.c39 char *user_name = NULL, *domain_name = NULL, *password = NULL; local
98 password = Z_STRVAL_PP(tmp);
134 if (password) {
135 authid.Password = (OLECHAR*)password;

Completed in 218 milliseconds

12