pass 346 ext/ftp/ftp.c if (!ftp_putcmd(ftp, "PASS", pass)) {
pass 416 ext/ftp/php_ftp.c char *user, *pass;
pass 419 ext/ftp/php_ftp.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rss", &z_ftp, &user, &user_len, &pass, &pass_len) == FAILURE) {
pass 426 ext/ftp/php_ftp.c if (!ftp_login(ftp, user, pass TSRMLS_CC)) {
pass 557 ext/gd/libgd/gd_gif_in.c int xpos = 0, ypos = 0, pass = 0;
pass 609 ext/gd/libgd/gd_gif_in.c switch (pass) {
pass 620 ext/gd/libgd/gd_gif_in.c ++pass;
pass 621 ext/gd/libgd/gd_gif_in.c switch (pass) {
pass 617 ext/hash/hash.c char *returnval, *algo, *salt, *pass;
pass 625 ext/hash/hash.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sssl|lb", &algo, &algo_len, &pass, &pass_len, &salt, &salt_len, &iterations, &length, &raw_output) == FAILURE) {
pass 659 ext/hash/hash.c php_hash_hmac_prep_key(K1, ops, context, (unsigned char *) pass, pass_len);
pass 89 ext/hash/hash_tiger.c pass(a,b,c,5) \
pass 91 ext/hash/hash_tiger.c pass(c,a,b,7) \
pass 93 ext/hash/hash_tiger.c pass(b,c,a,9) \
pass 96 ext/hash/hash_tiger.c pass(a,b,c,9) \
pass 213 ext/interbase/ibase_service.c char buf[128], *host, *user, *pass, *loc;
pass 219 ext/interbase/ibase_service.c &host, &hlen, &user, &ulen, &pass, &plen)) {
pass 227 ext/interbase/ibase_service.c user, isc_spb_password, (char)plen, pass, host);
pass 289 ext/odbc/birdstep.c char *serv, *user, *pass;
pass 296 ext/odbc/birdstep.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", &serv, &serv_len, &user, &user_len, &pass, &pass_len) == FAILURE) {
pass 310 ext/odbc/birdstep.c stat = SQLConnect(hdbc, serv, SQL_NTS, user, SQL_NTS, pass, SQL_NTS);
pass 2031 ext/opcache/Optimizer/block_pass.c int pass;
pass 2053 ext/opcache/Optimizer/block_pass.c for (pass = 0; pass < PASSES; pass++) {
pass 1949 ext/openssl/openssl.c char * pass;
pass 1957 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "Zpzs|a", &zcert, &filename, &filename_len, &zpkey, &pass, &pass_len, &args) == FAILURE)
pass 1995 ext/openssl/openssl.c p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0);
pass 2032 ext/openssl/openssl.c char * pass;
pass 2038 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "zzzs|a", &zcert, &zout, &zpkey, &pass, &pass_len, &args) == FAILURE)
pass 2066 ext/openssl/openssl.c p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0);
pass 2099 ext/openssl/openssl.c char *pass, *zp12;
pass 2108 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "szs", &zp12, &zp12_len, &zout, &pass, &pass_len) == FAILURE)
pass 2119 ext/openssl/openssl.c if(PKCS12_parse(p12, pass, &pkey, &cert, &ca)) {
pass 1749 ext/phar/phar_object.c struct _phar_t pass;
pass 1824 ext/phar/phar_object.c pass.c = apply_reg ? Z_OBJCE_P(regexiter) : Z_OBJCE_P(iteriter);
pass 1825 ext/phar/phar_object.c pass.p = phar_obj;
pass 1826 ext/phar/phar_object.c pass.b = dir;
pass 1827 ext/phar/phar_object.c pass.l = dir_len;
pass 1828 ext/phar/phar_object.c pass.count = 0;
pass 1829 ext/phar/phar_object.c pass.ret = return_value;
pass 1830 ext/phar/phar_object.c pass.fp = php_stream_fopen_tmpfile();
pass 1831 ext/phar/phar_object.c if (pass.fp == NULL) {
pass 1841 ext/phar/phar_object.c php_stream_close(pass.fp);
pass 1846 ext/phar/phar_object.c if (SUCCESS == spl_iterator_apply((apply_reg ? regexiter : iteriter), (spl_iterator_apply_func_t) phar_build, (void *) &pass TSRMLS_CC)) {
pass 1853 ext/phar/phar_object.c phar_obj->arc.archive->ufp = pass.fp;
pass 1866 ext/phar/phar_object.c php_stream_close(pass.fp);
pass 1887 ext/phar/phar_object.c struct _phar_t pass;
pass 1908 ext/phar/phar_object.c pass.c = Z_OBJCE_P(obj);
pass 1909 ext/phar/phar_object.c pass.p = phar_obj;
pass 1910 ext/phar/phar_object.c pass.b = base;
pass 1911 ext/phar/phar_object.c pass.l = base_len;
pass 1912 ext/phar/phar_object.c pass.ret = return_value;
pass 1913 ext/phar/phar_object.c pass.count = 0;
pass 1914 ext/phar/phar_object.c pass.fp = php_stream_fopen_tmpfile();
pass 1915 ext/phar/phar_object.c if (pass.fp == NULL) {
pass 1920 ext/phar/phar_object.c if (SUCCESS == spl_iterator_apply(obj, (spl_iterator_apply_func_t) phar_build, (void *) &pass TSRMLS_CC)) {
pass 1921 ext/phar/phar_object.c phar_obj->arc.archive->ufp = pass.fp;
pass 1928 ext/phar/phar_object.c php_stream_close(pass.fp);
pass 936 ext/phar/tar.c struct _phar_pass_tar_info pass;
pass 1123 ext/phar/tar.c pass.old = oldfile;
pass 1124 ext/phar/tar.c pass.new = newfile;
pass 1125 ext/phar/tar.c pass.error = error;
pass 1126 ext/phar/tar.c pass.free_fp = 1;
pass 1127 ext/phar/tar.c pass.free_ufp = 1;
pass 1165 ext/phar/tar.c zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_setupmetadata, (void *) &pass TSRMLS_CC);
pass 1177 ext/phar/tar.c zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_writeheaders, (void *) &pass TSRMLS_CC);
pass 1231 ext/phar/tar.c entry.filename_len = phar_tar_writeheaders((void *)&entry, (void *)&pass TSRMLS_CC);
pass 1258 ext/phar/tar.c if (phar->fp && pass.free_fp) {
pass 1263 ext/phar/tar.c if (pass.free_ufp) {
pass 1090 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to create temporary file for the signature file");
pass 1093 ext/phar/zip.c st = tell = php_stream_tell(pass->filefp);
pass 1095 ext/phar/zip.c php_stream_seek(pass->filefp, 0, SEEK_SET);
pass 1096 ext/phar/zip.c phar_stream_copy_to_stream(pass->filefp, newfile, tell, NULL);
pass 1097 ext/phar/zip.c tell = php_stream_tell(pass->centralfp);
pass 1098 ext/phar/zip.c php_stream_seek(pass->centralfp, 0, SEEK_SET);
pass 1099 ext/phar/zip.c phar_stream_copy_to_stream(pass->centralfp, newfile, tell, NULL);
pass 1104 ext/phar/zip.c if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, pass->error TSRMLS_CC)) {
pass 1105 ext/phar/zip.c if (pass->error) {
pass 1106 ext/phar/zip.c char *save = *(pass->error);
pass 1107 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar: %s", save);
pass 1121 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to create temporary file for signature");
pass 1130 ext/phar/zip.c if (pass->error) {
pass 1131 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar %s", phar->fname);
pass 1142 ext/phar/zip.c phar_zip_changed_apply((void *)&entry, (void *)pass TSRMLS_CC);
pass 1145 ext/phar/zip.c if (pass->error && *(pass->error)) {
pass 1168 ext/phar/zip.c struct _phar_zip_pass pass;
pass 1172 ext/phar/zip.c pass.error = &temperr;
pass 1361 ext/phar/zip.c pass.old = oldfile;
pass 1362 ext/phar/zip.c pass.filefp = php_stream_fopen_tmpfile();
pass 1364 ext/phar/zip.c if (!pass.filefp) {
pass 1375 ext/phar/zip.c pass.centralfp = php_stream_fopen_tmpfile();
pass 1377 ext/phar/zip.c if (!pass.centralfp) {
pass 1381 ext/phar/zip.c pass.free_fp = pass.free_ufp = 1;
pass 1395 ext/phar/zip.c zend_hash_apply_with_argument(&phar->manifest, phar_zip_changed_apply, (void *) &pass TSRMLS_CC);
pass 1409 ext/phar/zip.c php_stream_close(pass.centralfp);
pass 1414 ext/phar/zip.c php_stream_close(pass.filefp);
pass 1421 ext/phar/zip.c if (FAILURE == phar_zip_applysignature(phar, &pass, &main_metadata_str TSRMLS_CC)) {
pass 1426 ext/phar/zip.c cdir_size = php_stream_tell(pass.centralfp);
pass 1427 ext/phar/zip.c cdir_offset = php_stream_tell(pass.filefp);
pass 1430 ext/phar/zip.c php_stream_seek(pass.centralfp, 0, SEEK_SET);
pass 1434 ext/phar/zip.c int ret = phar_stream_copy_to_stream(pass.centralfp, pass.filefp, PHP_STREAM_COPY_ALL, &clen);
pass 1443 ext/phar/zip.c php_stream_close(pass.centralfp);
pass 1449 ext/phar/zip.c if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) {
pass 1456 ext/phar/zip.c if (main_metadata_str.len != php_stream_write(pass.filefp, main_metadata_str.c, main_metadata_str.len)) {
pass 1466 ext/phar/zip.c if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) {
pass 1474 ext/phar/zip.c if (phar->fp && pass.free_fp) {
pass 1479 ext/phar/zip.c if (pass.free_ufp) {
pass 1490 ext/phar/zip.c phar->fp = pass.filefp;
pass 1497 ext/phar/zip.c phar->fp = pass.filefp;
pass 1503 ext/phar/zip.c php_stream_rewind(pass.filefp);
pass 1504 ext/phar/zip.c phar_stream_copy_to_stream(pass.filefp, phar->fp, PHP_STREAM_COPY_ALL, NULL);
pass 1506 ext/phar/zip.c php_stream_close(pass.filefp);
pass 1310 ext/snmp/snmp.c (u_char *) pass, strlen(pass),
pass 1312 ext/snmp/snmp.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error generating a key for authentication pass phrase '%s': %s", pass, snmp_api_errstring(snmp_errno));
pass 1327 ext/snmp/snmp.c (u_char *)pass, strlen(pass),
pass 1329 ext/snmp/snmp.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error generating a key for privacy pass phrase '%s': %s", pass, snmp_api_errstring(snmp_errno));
pass 1198 ext/soap/php_http.c if (phpurl->pass) phpurl->pass = estrdup(phpurl->pass);
pass 263 ext/standard/ftp_fopen_wrapper.c if (resource->pass != NULL) {
pass 264 ext/standard/ftp_fopen_wrapper.c tmp_len = php_raw_url_decode(resource->pass, strlen(resource->pass));
pass 266 ext/standard/ftp_fopen_wrapper.c PHP_FTP_CNTRL_CHK(resource->pass, tmp_len, "Invalid password %s")
pass 268 ext/standard/ftp_fopen_wrapper.c php_stream_printf(stream TSRMLS_CC, "PASS %s\r\n", resource->pass);
pass 531 ext/standard/http_fopen_wrapper.c if (resource->pass) {
pass 532 ext/standard/http_fopen_wrapper.c php_url_decode(resource->pass, strlen(resource->pass));
pass 533 ext/standard/http_fopen_wrapper.c strcat(scratch, resource->pass);
pass 873 ext/standard/http_fopen_wrapper.c CHECK_FOR_CNTRL_CHARS(resource->pass)
pass 48 ext/standard/url.c if (theurl->pass)
pass 49 ext/standard/url.c efree(theurl->pass);
pass 250 ext/standard/url.c ret->pass = estrndup(pp, (p-pp));
pass 251 ext/standard/url.c php_replace_controlchars_ex(ret->pass, (p-pp));
pass 278 ext/standard/url.c STR_FREE(ret->pass);
pass 291 ext/standard/url.c STR_FREE(ret->pass);
pass 306 ext/standard/url.c STR_FREE(ret->pass);
pass 406 ext/standard/url.c if (resource->pass != NULL) RETVAL_STRING(resource->pass, 1);
pass 436 ext/standard/url.c if (resource->pass != NULL)
pass 437 ext/standard/url.c add_assoc_string(return_value, "pass", resource->pass, 1);
pass 26 ext/standard/url.h char *pass;
pass 2603 main/main.c char *pass;
pass 2608 main/main.c pass = strchr(user, ':');
pass 2609 main/main.c if (pass) {
pass 2610 main/main.c *pass++ = '\0';
pass 2612 main/main.c SG(request_info).auth_password = estrdup(pass);