pass 340 ftp/ftp.c if (!ftp_putcmd(ftp, "PASS", pass)) { pass 416 ftp/php_ftp.c char *user, *pass; pass 419 ftp/php_ftp.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rss", &z_ftp, &user, &user_len, &pass, &pass_len) == FAILURE) { pass 426 ftp/php_ftp.c if (!ftp_login(ftp, user, pass TSRMLS_CC)) { pass 550 gd/libgd/gd_gif_in.c int xpos = 0, ypos = 0, pass = 0; pass 602 gd/libgd/gd_gif_in.c switch (pass) { pass 613 gd/libgd/gd_gif_in.c ++pass; pass 614 gd/libgd/gd_gif_in.c switch (pass) { pass 89 hash/hash_tiger.c pass(a,b,c,5) \ pass 91 hash/hash_tiger.c pass(c,a,b,7) \ pass 93 hash/hash_tiger.c pass(b,c,a,9) \ pass 96 hash/hash_tiger.c pass(a,b,c,9) \ pass 215 interbase/ibase_service.c char buf[128], *host, *user, *pass, *loc; pass 221 interbase/ibase_service.c &host, &hlen, &user, &ulen, &pass, &plen)) { pass 229 interbase/ibase_service.c user, isc_spb_password, (char)plen, pass, host); pass 289 odbc/birdstep.c char *serv, *user, *pass; pass 296 odbc/birdstep.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", &serv, &serv_len, &user, &user_len, &pass, &pass_len) == FAILURE) { pass 310 odbc/birdstep.c stat = SQLConnect(hdbc, serv, SQL_NTS, user, SQL_NTS, pass, SQL_NTS); pass 1835 openssl/openssl.c char * pass; pass 1843 openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "Zpzs|a", &zcert, &filename, &filename_len, &zpkey, &pass, &pass_len, &args) == FAILURE) pass 1881 openssl/openssl.c p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0); pass 1918 openssl/openssl.c char * pass; pass 1924 openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "zzzs|a", &zcert, &zout, &zpkey, &pass, &pass_len, &args) == FAILURE) pass 1952 openssl/openssl.c p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0); pass 1985 openssl/openssl.c char *pass, *zp12; pass 1994 openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "szs", &zp12, &zp12_len, &zout, &pass, &pass_len) == FAILURE) pass 2005 openssl/openssl.c if(PKCS12_parse(p12, pass, &pkey, &cert, &ca)) { pass 1816 phar/phar_object.c struct _phar_t pass; pass 1895 phar/phar_object.c pass.c = apply_reg ? Z_OBJCE_P(regexiter) : Z_OBJCE_P(iteriter); pass 1896 phar/phar_object.c pass.p = phar_obj; pass 1897 phar/phar_object.c pass.b = dir; pass 1898 phar/phar_object.c pass.l = dir_len; pass 1899 phar/phar_object.c pass.count = 0; pass 1900 phar/phar_object.c pass.ret = return_value; pass 1901 phar/phar_object.c pass.fp = php_stream_fopen_tmpfile(); pass 1908 phar/phar_object.c php_stream_close(pass.fp); pass 1913 phar/phar_object.c if (SUCCESS == spl_iterator_apply((apply_reg ? regexiter : iteriter), (spl_iterator_apply_func_t) phar_build, (void *) &pass TSRMLS_CC)) { pass 1920 phar/phar_object.c phar_obj->arc.archive->ufp = pass.fp; pass 1933 phar/phar_object.c php_stream_close(pass.fp); pass 1954 phar/phar_object.c struct _phar_t pass; pass 1975 phar/phar_object.c pass.c = Z_OBJCE_P(obj); pass 1976 phar/phar_object.c pass.p = phar_obj; pass 1977 phar/phar_object.c pass.b = base; pass 1978 phar/phar_object.c pass.l = base_len; pass 1979 phar/phar_object.c pass.ret = return_value; pass 1980 phar/phar_object.c pass.count = 0; pass 1981 phar/phar_object.c pass.fp = php_stream_fopen_tmpfile(); pass 1983 phar/phar_object.c if (SUCCESS == spl_iterator_apply(obj, (spl_iterator_apply_func_t) phar_build, (void *) &pass TSRMLS_CC)) { pass 1984 phar/phar_object.c phar_obj->arc.archive->ufp = pass.fp; pass 1991 phar/phar_object.c php_stream_close(pass.fp); pass 923 phar/tar.c struct _phar_pass_tar_info pass; pass 1101 phar/tar.c pass.old = oldfile; pass 1102 phar/tar.c pass.new = newfile; pass 1103 phar/tar.c pass.error = error; pass 1104 phar/tar.c pass.free_fp = 1; pass 1105 phar/tar.c pass.free_ufp = 1; pass 1143 phar/tar.c zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_setupmetadata, (void *) &pass TSRMLS_CC); pass 1155 phar/tar.c zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_writeheaders, (void *) &pass TSRMLS_CC); pass 1206 phar/tar.c entry.filename_len = phar_tar_writeheaders((void *)&entry, (void *)&pass TSRMLS_CC); pass 1233 phar/tar.c if (phar->fp && pass.free_fp) { pass 1238 phar/tar.c if (pass.free_ufp) { pass 1098 phar/zip.c st = tell = php_stream_tell(pass->filefp); pass 1100 phar/zip.c php_stream_seek(pass->filefp, 0, SEEK_SET); pass 1101 phar/zip.c phar_stream_copy_to_stream(pass->filefp, newfile, tell, NULL); pass 1102 phar/zip.c tell = php_stream_tell(pass->centralfp); pass 1103 phar/zip.c php_stream_seek(pass->centralfp, 0, SEEK_SET); pass 1104 phar/zip.c phar_stream_copy_to_stream(pass->centralfp, newfile, tell, NULL); pass 1109 phar/zip.c if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, pass->error TSRMLS_CC)) { pass 1110 phar/zip.c if (pass->error) { pass 1111 phar/zip.c char *save = *(pass->error); pass 1112 phar/zip.c spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar: %s", save); pass 1131 phar/zip.c if (pass->error) { pass 1132 phar/zip.c spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar %s", phar->fname); pass 1143 phar/zip.c phar_zip_changed_apply((void *)&entry, (void *)pass TSRMLS_CC); pass 1146 phar/zip.c if (pass->error && *(pass->error)) { pass 1169 phar/zip.c struct _phar_zip_pass pass; pass 1173 phar/zip.c pass.error = &temperr; pass 1352 phar/zip.c pass.old = oldfile; pass 1353 phar/zip.c pass.filefp = php_stream_fopen_tmpfile(); pass 1355 phar/zip.c if (!pass.filefp) { pass 1366 phar/zip.c pass.centralfp = php_stream_fopen_tmpfile(); pass 1368 phar/zip.c if (!pass.centralfp) { pass 1372 phar/zip.c pass.free_fp = pass.free_ufp = 1; pass 1386 phar/zip.c zend_hash_apply_with_argument(&phar->manifest, phar_zip_changed_apply, (void *) &pass TSRMLS_CC); pass 1400 phar/zip.c php_stream_close(pass.centralfp); pass 1405 phar/zip.c php_stream_close(pass.filefp); pass 1412 phar/zip.c if (FAILURE == phar_zip_applysignature(phar, &pass, &main_metadata_str TSRMLS_CC)) { pass 1417 phar/zip.c cdir_size = php_stream_tell(pass.centralfp); pass 1418 phar/zip.c cdir_offset = php_stream_tell(pass.filefp); pass 1421 phar/zip.c php_stream_seek(pass.centralfp, 0, SEEK_SET); pass 1425 phar/zip.c int ret = phar_stream_copy_to_stream(pass.centralfp, pass.filefp, PHP_STREAM_COPY_ALL, &clen); pass 1434 phar/zip.c php_stream_close(pass.centralfp); pass 1440 phar/zip.c if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) { pass 1447 phar/zip.c if (main_metadata_str.len != php_stream_write(pass.filefp, main_metadata_str.c, main_metadata_str.len)) { pass 1457 phar/zip.c if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) { pass 1465 phar/zip.c if (phar->fp && pass.free_fp) { pass 1470 phar/zip.c if (pass.free_ufp) { pass 1481 phar/zip.c phar->fp = pass.filefp; pass 1488 phar/zip.c phar->fp = pass.filefp; pass 1494 phar/zip.c php_stream_rewind(pass.filefp); pass 1495 phar/zip.c phar_stream_copy_to_stream(pass.filefp, phar->fp, PHP_STREAM_COPY_ALL, NULL); pass 1497 phar/zip.c php_stream_close(pass.filefp); pass 1277 snmp/snmp.c (u_char *) pass, strlen(pass), pass 1279 snmp/snmp.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error generating a key for authentication pass phrase '%s': %s", pass, snmp_api_errstring(snmp_errno)); pass 1294 snmp/snmp.c (u_char *)pass, strlen(pass), pass 1296 snmp/snmp.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error generating a key for privacy pass phrase '%s': %s", pass, snmp_api_errstring(snmp_errno)); pass 1126 soap/php_http.c if (phpurl->pass) phpurl->pass = estrdup(phpurl->pass); pass 263 standard/ftp_fopen_wrapper.c if (resource->pass != NULL) { pass 264 standard/ftp_fopen_wrapper.c tmp_len = php_raw_url_decode(resource->pass, strlen(resource->pass)); pass 266 standard/ftp_fopen_wrapper.c PHP_FTP_CNTRL_CHK(resource->pass, tmp_len, "Invalid password %s") pass 268 standard/ftp_fopen_wrapper.c php_stream_printf(stream TSRMLS_CC, "PASS %s\r\n", resource->pass); pass 529 standard/http_fopen_wrapper.c if (resource->pass) { pass 530 standard/http_fopen_wrapper.c php_url_decode(resource->pass, strlen(resource->pass)); pass 531 standard/http_fopen_wrapper.c strcat(scratch, resource->pass); pass 862 standard/http_fopen_wrapper.c CHECK_FOR_CNTRL_CHARS(resource->pass) pass 48 standard/url.c if (theurl->pass) pass 49 standard/url.c efree(theurl->pass); pass 250 standard/url.c ret->pass = estrndup(pp, (p-pp)); pass 251 standard/url.c php_replace_controlchars_ex(ret->pass, (p-pp)); pass 279 standard/url.c STR_FREE(ret->pass); pass 292 standard/url.c STR_FREE(ret->pass); pass 307 standard/url.c STR_FREE(ret->pass); pass 407 standard/url.c if (resource->pass != NULL) RETVAL_STRING(resource->pass, 1); pass 437 standard/url.c if (resource->pass != NULL) pass 438 standard/url.c add_assoc_string(return_value, "pass", resource->pass, 1); pass 26 standard/url.h char *pass;