pass 342 ext/ftp/ftp.c if (!ftp_putcmd(ftp, "PASS", pass)) {
pass 416 ext/ftp/php_ftp.c char *user, *pass;
pass 419 ext/ftp/php_ftp.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rss", &z_ftp, &user, &user_len, &pass, &pass_len) == FAILURE) {
pass 426 ext/ftp/php_ftp.c if (!ftp_login(ftp, user, pass TSRMLS_CC)) {
pass 550 ext/gd/libgd/gd_gif_in.c int xpos = 0, ypos = 0, pass = 0;
pass 602 ext/gd/libgd/gd_gif_in.c switch (pass) {
pass 613 ext/gd/libgd/gd_gif_in.c ++pass;
pass 614 ext/gd/libgd/gd_gif_in.c switch (pass) {
pass 612 ext/hash/hash.c char *returnval, *algo, *salt, *pass = NULL;
pass 621 ext/hash/hash.c if (zend_parse_parameters(argc TSRMLS_CC, "sssl|lb", &algo, &algo_len, &pass, &pass_len, &salt, &salt_len, &iterations, &length, &raw_output) == FAILURE) {
pass 655 ext/hash/hash.c php_hash_hmac_prep_key(K1, ops, context, (unsigned char *) pass, pass_len);
pass 89 ext/hash/hash_tiger.c pass(a,b,c,5) \
pass 91 ext/hash/hash_tiger.c pass(c,a,b,7) \
pass 93 ext/hash/hash_tiger.c pass(b,c,a,9) \
pass 96 ext/hash/hash_tiger.c pass(a,b,c,9) \
pass 215 ext/interbase/ibase_service.c char buf[128], *host, *user, *pass, *loc;
pass 221 ext/interbase/ibase_service.c &host, &hlen, &user, &ulen, &pass, &plen)) {
pass 229 ext/interbase/ibase_service.c user, isc_spb_password, (char)plen, pass, host);
pass 289 ext/odbc/birdstep.c char *serv, *user, *pass;
pass 296 ext/odbc/birdstep.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", &serv, &serv_len, &user, &user_len, &pass, &pass_len) == FAILURE) {
pass 310 ext/odbc/birdstep.c stat = SQLConnect(hdbc, serv, SQL_NTS, user, SQL_NTS, pass, SQL_NTS);
pass 2028 ext/opcache/Optimizer/block_pass.c int pass;
pass 2050 ext/opcache/Optimizer/block_pass.c for (pass = 0; pass < PASSES; pass++) {
pass 1929 ext/openssl/openssl.c char * pass;
pass 1937 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "Zpzs|a", &zcert, &filename, &filename_len, &zpkey, &pass, &pass_len, &args) == FAILURE)
pass 1975 ext/openssl/openssl.c p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0);
pass 2012 ext/openssl/openssl.c char * pass;
pass 2018 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "zzzs|a", &zcert, &zout, &zpkey, &pass, &pass_len, &args) == FAILURE)
pass 2046 ext/openssl/openssl.c p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0);
pass 2079 ext/openssl/openssl.c char *pass, *zp12;
pass 2088 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "szs", &zp12, &zp12_len, &zout, &pass, &pass_len) == FAILURE)
pass 2099 ext/openssl/openssl.c if(PKCS12_parse(p12, pass, &pkey, &cert, &ca)) {
pass 1748 ext/phar/phar_object.c struct _phar_t pass;
pass 1823 ext/phar/phar_object.c pass.c = apply_reg ? Z_OBJCE_P(regexiter) : Z_OBJCE_P(iteriter);
pass 1824 ext/phar/phar_object.c pass.p = phar_obj;
pass 1825 ext/phar/phar_object.c pass.b = dir;
pass 1826 ext/phar/phar_object.c pass.l = dir_len;
pass 1827 ext/phar/phar_object.c pass.count = 0;
pass 1828 ext/phar/phar_object.c pass.ret = return_value;
pass 1829 ext/phar/phar_object.c pass.fp = php_stream_fopen_tmpfile();
pass 1830 ext/phar/phar_object.c if (pass.fp == NULL) {
pass 1840 ext/phar/phar_object.c php_stream_close(pass.fp);
pass 1845 ext/phar/phar_object.c if (SUCCESS == spl_iterator_apply((apply_reg ? regexiter : iteriter), (spl_iterator_apply_func_t) phar_build, (void *) &pass TSRMLS_CC)) {
pass 1852 ext/phar/phar_object.c phar_obj->arc.archive->ufp = pass.fp;
pass 1865 ext/phar/phar_object.c php_stream_close(pass.fp);
pass 1886 ext/phar/phar_object.c struct _phar_t pass;
pass 1907 ext/phar/phar_object.c pass.c = Z_OBJCE_P(obj);
pass 1908 ext/phar/phar_object.c pass.p = phar_obj;
pass 1909 ext/phar/phar_object.c pass.b = base;
pass 1910 ext/phar/phar_object.c pass.l = base_len;
pass 1911 ext/phar/phar_object.c pass.ret = return_value;
pass 1912 ext/phar/phar_object.c pass.count = 0;
pass 1913 ext/phar/phar_object.c pass.fp = php_stream_fopen_tmpfile();
pass 1914 ext/phar/phar_object.c if (pass.fp == NULL) {
pass 1919 ext/phar/phar_object.c if (SUCCESS == spl_iterator_apply(obj, (spl_iterator_apply_func_t) phar_build, (void *) &pass TSRMLS_CC)) {
pass 1920 ext/phar/phar_object.c phar_obj->arc.archive->ufp = pass.fp;
pass 1927 ext/phar/phar_object.c php_stream_close(pass.fp);
pass 926 ext/phar/tar.c struct _phar_pass_tar_info pass;
pass 1113 ext/phar/tar.c pass.old = oldfile;
pass 1114 ext/phar/tar.c pass.new = newfile;
pass 1115 ext/phar/tar.c pass.error = error;
pass 1116 ext/phar/tar.c pass.free_fp = 1;
pass 1117 ext/phar/tar.c pass.free_ufp = 1;
pass 1155 ext/phar/tar.c zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_setupmetadata, (void *) &pass TSRMLS_CC);
pass 1167 ext/phar/tar.c zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_writeheaders, (void *) &pass TSRMLS_CC);
pass 1221 ext/phar/tar.c entry.filename_len = phar_tar_writeheaders((void *)&entry, (void *)&pass TSRMLS_CC);
pass 1248 ext/phar/tar.c if (phar->fp && pass.free_fp) {
pass 1253 ext/phar/tar.c if (pass.free_ufp) {
pass 1090 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to create temporary file for the signature file");
pass 1093 ext/phar/zip.c st = tell = php_stream_tell(pass->filefp);
pass 1095 ext/phar/zip.c php_stream_seek(pass->filefp, 0, SEEK_SET);
pass 1096 ext/phar/zip.c phar_stream_copy_to_stream(pass->filefp, newfile, tell, NULL);
pass 1097 ext/phar/zip.c tell = php_stream_tell(pass->centralfp);
pass 1098 ext/phar/zip.c php_stream_seek(pass->centralfp, 0, SEEK_SET);
pass 1099 ext/phar/zip.c phar_stream_copy_to_stream(pass->centralfp, newfile, tell, NULL);
pass 1104 ext/phar/zip.c if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, pass->error TSRMLS_CC)) {
pass 1105 ext/phar/zip.c if (pass->error) {
pass 1106 ext/phar/zip.c char *save = *(pass->error);
pass 1107 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar: %s", save);
pass 1121 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to create temporary file for signature");
pass 1130 ext/phar/zip.c if (pass->error) {
pass 1131 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar %s", phar->fname);
pass 1142 ext/phar/zip.c phar_zip_changed_apply((void *)&entry, (void *)pass TSRMLS_CC);
pass 1145 ext/phar/zip.c if (pass->error && *(pass->error)) {
pass 1168 ext/phar/zip.c struct _phar_zip_pass pass;
pass 1172 ext/phar/zip.c pass.error = &temperr;
pass 1361 ext/phar/zip.c pass.old = oldfile;
pass 1362 ext/phar/zip.c pass.filefp = php_stream_fopen_tmpfile();
pass 1364 ext/phar/zip.c if (!pass.filefp) {
pass 1375 ext/phar/zip.c pass.centralfp = php_stream_fopen_tmpfile();
pass 1377 ext/phar/zip.c if (!pass.centralfp) {
pass 1381 ext/phar/zip.c pass.free_fp = pass.free_ufp = 1;
pass 1395 ext/phar/zip.c zend_hash_apply_with_argument(&phar->manifest, phar_zip_changed_apply, (void *) &pass TSRMLS_CC);
pass 1409 ext/phar/zip.c php_stream_close(pass.centralfp);
pass 1414 ext/phar/zip.c php_stream_close(pass.filefp);
pass 1421 ext/phar/zip.c if (FAILURE == phar_zip_applysignature(phar, &pass, &main_metadata_str TSRMLS_CC)) {
pass 1426 ext/phar/zip.c cdir_size = php_stream_tell(pass.centralfp);
pass 1427 ext/phar/zip.c cdir_offset = php_stream_tell(pass.filefp);
pass 1430 ext/phar/zip.c php_stream_seek(pass.centralfp, 0, SEEK_SET);
pass 1434 ext/phar/zip.c int ret = phar_stream_copy_to_stream(pass.centralfp, pass.filefp, PHP_STREAM_COPY_ALL, &clen);
pass 1443 ext/phar/zip.c php_stream_close(pass.centralfp);
pass 1449 ext/phar/zip.c if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) {
pass 1456 ext/phar/zip.c if (main_metadata_str.len != php_stream_write(pass.filefp, main_metadata_str.c, main_metadata_str.len)) {
pass 1466 ext/phar/zip.c if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) {
pass 1474 ext/phar/zip.c if (phar->fp && pass.free_fp) {
pass 1479 ext/phar/zip.c if (pass.free_ufp) {
pass 1490 ext/phar/zip.c phar->fp = pass.filefp;
pass 1497 ext/phar/zip.c phar->fp = pass.filefp;
pass 1503 ext/phar/zip.c php_stream_rewind(pass.filefp);
pass 1504 ext/phar/zip.c phar_stream_copy_to_stream(pass.filefp, phar->fp, PHP_STREAM_COPY_ALL, NULL);
pass 1506 ext/phar/zip.c php_stream_close(pass.filefp);
pass 1310 ext/snmp/snmp.c (u_char *) pass, strlen(pass),
pass 1312 ext/snmp/snmp.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error generating a key for authentication pass phrase '%s': %s", pass, snmp_api_errstring(snmp_errno));
pass 1327 ext/snmp/snmp.c (u_char *)pass, strlen(pass),
pass 1329 ext/snmp/snmp.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error generating a key for privacy pass phrase '%s': %s", pass, snmp_api_errstring(snmp_errno));
pass 1188 ext/soap/php_http.c if (phpurl->pass) phpurl->pass = estrdup(phpurl->pass);
pass 263 ext/standard/ftp_fopen_wrapper.c if (resource->pass != NULL) {
pass 264 ext/standard/ftp_fopen_wrapper.c tmp_len = php_raw_url_decode(resource->pass, strlen(resource->pass));
pass 266 ext/standard/ftp_fopen_wrapper.c PHP_FTP_CNTRL_CHK(resource->pass, tmp_len, "Invalid password %s")
pass 268 ext/standard/ftp_fopen_wrapper.c php_stream_printf(stream TSRMLS_CC, "PASS %s\r\n", resource->pass);
pass 531 ext/standard/http_fopen_wrapper.c if (resource->pass) {
pass 532 ext/standard/http_fopen_wrapper.c php_url_decode(resource->pass, strlen(resource->pass));
pass 533 ext/standard/http_fopen_wrapper.c strcat(scratch, resource->pass);
pass 868 ext/standard/http_fopen_wrapper.c CHECK_FOR_CNTRL_CHARS(resource->pass)
pass 48 ext/standard/url.c if (theurl->pass)
pass 49 ext/standard/url.c efree(theurl->pass);
pass 250 ext/standard/url.c ret->pass = estrndup(pp, (p-pp));
pass 251 ext/standard/url.c php_replace_controlchars_ex(ret->pass, (p-pp));
pass 279 ext/standard/url.c STR_FREE(ret->pass);
pass 292 ext/standard/url.c STR_FREE(ret->pass);
pass 307 ext/standard/url.c STR_FREE(ret->pass);
pass 407 ext/standard/url.c if (resource->pass != NULL) RETVAL_STRING(resource->pass, 1);
pass 437 ext/standard/url.c if (resource->pass != NULL)
pass 438 ext/standard/url.c add_assoc_string(return_value, "pass", resource->pass, 1);
pass 26 ext/standard/url.h char *pass;
pass 2584 main/main.c char *pass;
pass 2589 main/main.c pass = strchr(user, ':');
pass 2590 main/main.c if (pass) {
pass 2591 main/main.c *pass++ = '\0';
pass 2593 main/main.c SG(request_info).auth_password = estrdup(pass);