pass 247 ext/ftp/ftp.c ftp_login(ftpbuf_t *ftp, const char *user, const char *pass TSRMLS_DC) pass 346 ext/ftp/ftp.c if (!ftp_putcmd(ftp, "PASS", pass)) { pass 112 ext/ftp/ftp.h int ftp_login(ftpbuf_t *ftp, const char *user, const char *pass TSRMLS_DC); pass 419 ext/ftp/php_ftp.c char *user, *pass; pass 422 ext/ftp/php_ftp.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rss", &z_ftp, &user, &user_len, &pass, &pass_len) == FAILURE) { pass 429 ext/ftp/php_ftp.c if (!ftp_login(ftp, user, pass TSRMLS_CC)) { pass 557 ext/gd/libgd/gd_gif_in.c int xpos = 0, ypos = 0, pass = 0; pass 609 ext/gd/libgd/gd_gif_in.c switch (pass) { pass 620 ext/gd/libgd/gd_gif_in.c ++pass; pass 621 ext/gd/libgd/gd_gif_in.c switch (pass) { pass 617 ext/hash/hash.c char *returnval, *algo, *salt, *pass; pass 625 ext/hash/hash.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sssl|lb", &algo, &algo_len, &pass, &pass_len, &salt, &salt_len, &iterations, &length, &raw_output) == FAILURE) { pass 659 ext/hash/hash.c php_hash_hmac_prep_key(K1, ops, context, (unsigned char *) pass, pass_len); pass 89 ext/hash/hash_tiger.c pass(a,b,c,5) \ pass 91 ext/hash/hash_tiger.c pass(c,a,b,7) \ pass 93 ext/hash/hash_tiger.c pass(b,c,a,9) \ pass 96 ext/hash/hash_tiger.c pass(a,b,c,9) \ pass 213 ext/interbase/ibase_service.c char buf[128], *host, *user, *pass, *loc; pass 219 ext/interbase/ibase_service.c &host, &hlen, &user, &ulen, &pass, &plen)) { pass 227 ext/interbase/ibase_service.c user, isc_spb_password, (char)plen, pass, host); pass 301 ext/mysqlnd/mysqlnd_wireprotocol.h PHPAPI void php_mysqlnd_scramble(zend_uchar * const buffer, const zend_uchar * const scramble, const zend_uchar * const pass, size_t pass_len); pass 56 ext/odbc/birdstep.c ZEND_ARG_INFO(0, pass) pass 289 ext/odbc/birdstep.c char *serv, *user, *pass; pass 296 ext/odbc/birdstep.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", &serv, &serv_len, &user, &user_len, &pass, &pass_len) == FAILURE) { pass 310 ext/odbc/birdstep.c stat = SQLConnect(hdbc, serv, SQL_NTS, user, SQL_NTS, pass, SQL_NTS); pass 2041 ext/opcache/Optimizer/block_pass.c int pass; pass 2063 ext/opcache/Optimizer/block_pass.c for (pass = 0; pass < PASSES; pass++) { pass 172 ext/openssl/openssl.c ZEND_ARG_INFO(0, pass) pass 180 ext/openssl/openssl.c ZEND_ARG_INFO(0, pass) pass 187 ext/openssl/openssl.c ZEND_ARG_INFO(0, pass) pass 2386 ext/openssl/openssl.c char * pass; pass 2394 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "Zpzs|a", &zcert, &filename, &filename_len, &zpkey, &pass, &pass_len, &args) == FAILURE) pass 2432 ext/openssl/openssl.c p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0); pass 2469 ext/openssl/openssl.c char * pass; pass 2475 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "zzzs|a", &zcert, &zout, &zpkey, &pass, &pass_len, &args) == FAILURE) pass 2503 ext/openssl/openssl.c p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0); pass 2536 ext/openssl/openssl.c char *pass, *zp12; pass 2545 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "szs", &zp12, &zp12_len, &zout, &pass, &pass_len) == FAILURE) pass 2556 ext/openssl/openssl.c if(PKCS12_parse(p12, pass, &pkey, &cert, &ca)) { pass 1749 ext/phar/phar_object.c struct _phar_t pass; pass 1824 ext/phar/phar_object.c pass.c = apply_reg ? Z_OBJCE_P(regexiter) : Z_OBJCE_P(iteriter); pass 1825 ext/phar/phar_object.c pass.p = phar_obj; pass 1826 ext/phar/phar_object.c pass.b = dir; pass 1827 ext/phar/phar_object.c pass.l = dir_len; pass 1828 ext/phar/phar_object.c pass.count = 0; pass 1829 ext/phar/phar_object.c pass.ret = return_value; pass 1830 ext/phar/phar_object.c pass.fp = php_stream_fopen_tmpfile(); pass 1831 ext/phar/phar_object.c if (pass.fp == NULL) { pass 1841 ext/phar/phar_object.c php_stream_close(pass.fp); pass 1846 ext/phar/phar_object.c if (SUCCESS == spl_iterator_apply((apply_reg ? regexiter : iteriter), (spl_iterator_apply_func_t) phar_build, (void *) &pass TSRMLS_CC)) { pass 1853 ext/phar/phar_object.c phar_obj->arc.archive->ufp = pass.fp; pass 1866 ext/phar/phar_object.c php_stream_close(pass.fp); pass 1887 ext/phar/phar_object.c struct _phar_t pass; pass 1908 ext/phar/phar_object.c pass.c = Z_OBJCE_P(obj); pass 1909 ext/phar/phar_object.c pass.p = phar_obj; pass 1910 ext/phar/phar_object.c pass.b = base; pass 1911 ext/phar/phar_object.c pass.l = base_len; pass 1912 ext/phar/phar_object.c pass.ret = return_value; pass 1913 ext/phar/phar_object.c pass.count = 0; pass 1914 ext/phar/phar_object.c pass.fp = php_stream_fopen_tmpfile(); pass 1915 ext/phar/phar_object.c if (pass.fp == NULL) { pass 1920 ext/phar/phar_object.c if (SUCCESS == spl_iterator_apply(obj, (spl_iterator_apply_func_t) phar_build, (void *) &pass TSRMLS_CC)) { pass 1921 ext/phar/phar_object.c phar_obj->arc.archive->ufp = pass.fp; pass 1928 ext/phar/phar_object.c php_stream_close(pass.fp); pass 951 ext/phar/tar.c struct _phar_pass_tar_info pass; pass 1138 ext/phar/tar.c pass.old = oldfile; pass 1139 ext/phar/tar.c pass.new = newfile; pass 1140 ext/phar/tar.c pass.error = error; pass 1141 ext/phar/tar.c pass.free_fp = 1; pass 1142 ext/phar/tar.c pass.free_ufp = 1; pass 1180 ext/phar/tar.c zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_setupmetadata, (void *) &pass TSRMLS_CC); pass 1192 ext/phar/tar.c zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_writeheaders, (void *) &pass TSRMLS_CC); pass 1246 ext/phar/tar.c entry.filename_len = phar_tar_writeheaders((void *)&entry, (void *)&pass TSRMLS_CC); pass 1273 ext/phar/tar.c if (phar->fp && pass.free_fp) { pass 1278 ext/phar/tar.c if (pass.free_ufp) { pass 1079 ext/phar/zip.c static int phar_zip_applysignature(phar_archive_data *phar, struct _phar_zip_pass *pass, pass 1092 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to create temporary file for the signature file"); pass 1095 ext/phar/zip.c st = tell = php_stream_tell(pass->filefp); pass 1097 ext/phar/zip.c php_stream_seek(pass->filefp, 0, SEEK_SET); pass 1098 ext/phar/zip.c php_stream_copy_to_stream_ex(pass->filefp, newfile, tell, NULL); pass 1099 ext/phar/zip.c tell = php_stream_tell(pass->centralfp); pass 1100 ext/phar/zip.c php_stream_seek(pass->centralfp, 0, SEEK_SET); pass 1101 ext/phar/zip.c php_stream_copy_to_stream_ex(pass->centralfp, newfile, tell, NULL); pass 1106 ext/phar/zip.c if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, pass->error TSRMLS_CC)) { pass 1107 ext/phar/zip.c if (pass->error) { pass 1108 ext/phar/zip.c char *save = *(pass->error); pass 1109 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar: %s", save); pass 1123 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to create temporary file for signature"); pass 1132 ext/phar/zip.c if (pass->error) { pass 1133 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar %s", phar->fname); pass 1144 ext/phar/zip.c phar_zip_changed_apply((void *)&entry, (void *)pass TSRMLS_CC); pass 1147 ext/phar/zip.c if (pass->error && *(pass->error)) { pass 1170 ext/phar/zip.c struct _phar_zip_pass pass; pass 1174 ext/phar/zip.c pass.error = &temperr; pass 1363 ext/phar/zip.c pass.old = oldfile; pass 1364 ext/phar/zip.c pass.filefp = php_stream_fopen_tmpfile(); pass 1366 ext/phar/zip.c if (!pass.filefp) { pass 1377 ext/phar/zip.c pass.centralfp = php_stream_fopen_tmpfile(); pass 1379 ext/phar/zip.c if (!pass.centralfp) { pass 1383 ext/phar/zip.c pass.free_fp = pass.free_ufp = 1; pass 1397 ext/phar/zip.c zend_hash_apply_with_argument(&phar->manifest, phar_zip_changed_apply, (void *) &pass TSRMLS_CC); pass 1411 ext/phar/zip.c php_stream_close(pass.centralfp); pass 1416 ext/phar/zip.c php_stream_close(pass.filefp); pass 1423 ext/phar/zip.c if (FAILURE == phar_zip_applysignature(phar, &pass, &main_metadata_str TSRMLS_CC)) { pass 1428 ext/phar/zip.c cdir_size = php_stream_tell(pass.centralfp); pass 1429 ext/phar/zip.c cdir_offset = php_stream_tell(pass.filefp); pass 1432 ext/phar/zip.c php_stream_seek(pass.centralfp, 0, SEEK_SET); pass 1436 ext/phar/zip.c int ret = php_stream_copy_to_stream_ex(pass.centralfp, pass.filefp, PHP_STREAM_COPY_ALL, &clen); pass 1445 ext/phar/zip.c php_stream_close(pass.centralfp); pass 1451 ext/phar/zip.c if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) { pass 1458 ext/phar/zip.c if (main_metadata_str.len != php_stream_write(pass.filefp, main_metadata_str.c, main_metadata_str.len)) { pass 1468 ext/phar/zip.c if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) { pass 1476 ext/phar/zip.c if (phar->fp && pass.free_fp) { pass 1481 ext/phar/zip.c if (pass.free_ufp) { pass 1492 ext/phar/zip.c phar->fp = pass.filefp; pass 1499 ext/phar/zip.c phar->fp = pass.filefp; pass 1505 ext/phar/zip.c php_stream_rewind(pass.filefp); pass 1506 ext/phar/zip.c php_stream_copy_to_stream_ex(pass.filefp, phar->fp, PHP_STREAM_COPY_ALL, NULL); pass 1508 ext/phar/zip.c php_stream_close(pass.filefp); pass 1303 ext/snmp/snmp.c static int netsnmp_session_gen_auth_key(struct snmp_session *s, char *pass TSRMLS_DC) pass 1308 ext/snmp/snmp.c (u_char *) pass, strlen(pass), pass 1310 ext/snmp/snmp.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error generating a key for authentication pass phrase '%s': %s", pass, snmp_api_errstring(snmp_errno)); pass 1319 ext/snmp/snmp.c static int netsnmp_session_gen_sec_key(struct snmp_session *s, char *pass TSRMLS_DC) pass 1325 ext/snmp/snmp.c (u_char *)pass, strlen(pass), pass 1327 ext/snmp/snmp.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error generating a key for privacy pass phrase '%s': %s", pass, snmp_api_errstring(snmp_errno)); pass 1199 ext/soap/php_http.c if (phpurl->pass) phpurl->pass = estrdup(phpurl->pass); pass 264 ext/standard/ftp_fopen_wrapper.c if (resource->pass != NULL) { pass 265 ext/standard/ftp_fopen_wrapper.c tmp_len = php_raw_url_decode(resource->pass, strlen(resource->pass)); pass 267 ext/standard/ftp_fopen_wrapper.c PHP_FTP_CNTRL_CHK(resource->pass, tmp_len, "Invalid password %s") pass 269 ext/standard/ftp_fopen_wrapper.c php_stream_printf(stream TSRMLS_CC, "PASS %s\r\n", resource->pass); pass 544 ext/standard/http_fopen_wrapper.c if (resource->pass) { pass 545 ext/standard/http_fopen_wrapper.c php_url_decode(resource->pass, strlen(resource->pass)); pass 546 ext/standard/http_fopen_wrapper.c strcat(scratch, resource->pass); pass 896 ext/standard/http_fopen_wrapper.c CHECK_FOR_CNTRL_CHARS(resource->pass) pass 48 ext/standard/url.c if (theurl->pass) pass 49 ext/standard/url.c efree(theurl->pass); pass 250 ext/standard/url.c ret->pass = estrndup(pp, (p-pp)); pass 251 ext/standard/url.c php_replace_controlchars_ex(ret->pass, (p-pp)); pass 278 ext/standard/url.c STR_FREE(ret->pass); pass 291 ext/standard/url.c STR_FREE(ret->pass); pass 306 ext/standard/url.c STR_FREE(ret->pass); pass 406 ext/standard/url.c if (resource->pass != NULL) RETVAL_STRING(resource->pass, 1); pass 436 ext/standard/url.c if (resource->pass != NULL) pass 437 ext/standard/url.c add_assoc_string(return_value, "pass", resource->pass, 1); pass 26 ext/standard/url.h char *pass; pass 2691 main/main.c char *pass; pass 2696 main/main.c pass = strchr(user, ':'); pass 2697 main/main.c if (pass) { pass 2698 main/main.c *pass++ = '\0'; pass 2700 main/main.c SG(request_info).auth_password = estrdup(pass);