pass 342 ext/ftp/ftp.c if (!ftp_putcmd(ftp, "PASS", pass)) { pass 416 ext/ftp/php_ftp.c char *user, *pass; pass 419 ext/ftp/php_ftp.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rss", &z_ftp, &user, &user_len, &pass, &pass_len) == FAILURE) { pass 426 ext/ftp/php_ftp.c if (!ftp_login(ftp, user, pass TSRMLS_CC)) { pass 550 ext/gd/libgd/gd_gif_in.c int xpos = 0, ypos = 0, pass = 0; pass 602 ext/gd/libgd/gd_gif_in.c switch (pass) { pass 613 ext/gd/libgd/gd_gif_in.c ++pass; pass 614 ext/gd/libgd/gd_gif_in.c switch (pass) { pass 612 ext/hash/hash.c char *returnval, *algo, *salt, *pass = NULL; pass 621 ext/hash/hash.c if (zend_parse_parameters(argc TSRMLS_CC, "sssl|lb", &algo, &algo_len, &pass, &pass_len, &salt, &salt_len, &iterations, &length, &raw_output) == FAILURE) { pass 655 ext/hash/hash.c php_hash_hmac_prep_key(K1, ops, context, (unsigned char *) pass, pass_len); pass 89 ext/hash/hash_tiger.c pass(a,b,c,5) \ pass 91 ext/hash/hash_tiger.c pass(c,a,b,7) \ pass 93 ext/hash/hash_tiger.c pass(b,c,a,9) \ pass 96 ext/hash/hash_tiger.c pass(a,b,c,9) \ pass 215 ext/interbase/ibase_service.c char buf[128], *host, *user, *pass, *loc; pass 221 ext/interbase/ibase_service.c &host, &hlen, &user, &ulen, &pass, &plen)) { pass 229 ext/interbase/ibase_service.c user, isc_spb_password, (char)plen, pass, host); pass 289 ext/odbc/birdstep.c char *serv, *user, *pass; pass 296 ext/odbc/birdstep.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", &serv, &serv_len, &user, &user_len, &pass, &pass_len) == FAILURE) { pass 310 ext/odbc/birdstep.c stat = SQLConnect(hdbc, serv, SQL_NTS, user, SQL_NTS, pass, SQL_NTS); pass 2028 ext/opcache/Optimizer/block_pass.c int pass; pass 2050 ext/opcache/Optimizer/block_pass.c for (pass = 0; pass < PASSES; pass++) { pass 1929 ext/openssl/openssl.c char * pass; pass 1937 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "Zpzs|a", &zcert, &filename, &filename_len, &zpkey, &pass, &pass_len, &args) == FAILURE) pass 1975 ext/openssl/openssl.c p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0); pass 2012 ext/openssl/openssl.c char * pass; pass 2018 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "zzzs|a", &zcert, &zout, &zpkey, &pass, &pass_len, &args) == FAILURE) pass 2046 ext/openssl/openssl.c p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0); pass 2079 ext/openssl/openssl.c char *pass, *zp12; pass 2088 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "szs", &zp12, &zp12_len, &zout, &pass, &pass_len) == FAILURE) pass 2099 ext/openssl/openssl.c if(PKCS12_parse(p12, pass, &pkey, &cert, &ca)) { pass 1748 ext/phar/phar_object.c struct _phar_t pass; pass 1823 ext/phar/phar_object.c pass.c = apply_reg ? Z_OBJCE_P(regexiter) : Z_OBJCE_P(iteriter); pass 1824 ext/phar/phar_object.c pass.p = phar_obj; pass 1825 ext/phar/phar_object.c pass.b = dir; pass 1826 ext/phar/phar_object.c pass.l = dir_len; pass 1827 ext/phar/phar_object.c pass.count = 0; pass 1828 ext/phar/phar_object.c pass.ret = return_value; pass 1829 ext/phar/phar_object.c pass.fp = php_stream_fopen_tmpfile(); pass 1830 ext/phar/phar_object.c if (pass.fp == NULL) { pass 1840 ext/phar/phar_object.c php_stream_close(pass.fp); pass 1845 ext/phar/phar_object.c if (SUCCESS == spl_iterator_apply((apply_reg ? regexiter : iteriter), (spl_iterator_apply_func_t) phar_build, (void *) &pass TSRMLS_CC)) { pass 1852 ext/phar/phar_object.c phar_obj->arc.archive->ufp = pass.fp; pass 1865 ext/phar/phar_object.c php_stream_close(pass.fp); pass 1886 ext/phar/phar_object.c struct _phar_t pass; pass 1907 ext/phar/phar_object.c pass.c = Z_OBJCE_P(obj); pass 1908 ext/phar/phar_object.c pass.p = phar_obj; pass 1909 ext/phar/phar_object.c pass.b = base; pass 1910 ext/phar/phar_object.c pass.l = base_len; pass 1911 ext/phar/phar_object.c pass.ret = return_value; pass 1912 ext/phar/phar_object.c pass.count = 0; pass 1913 ext/phar/phar_object.c pass.fp = php_stream_fopen_tmpfile(); pass 1914 ext/phar/phar_object.c if (pass.fp == NULL) { pass 1919 ext/phar/phar_object.c if (SUCCESS == spl_iterator_apply(obj, (spl_iterator_apply_func_t) phar_build, (void *) &pass TSRMLS_CC)) { pass 1920 ext/phar/phar_object.c phar_obj->arc.archive->ufp = pass.fp; pass 1927 ext/phar/phar_object.c php_stream_close(pass.fp); pass 926 ext/phar/tar.c struct _phar_pass_tar_info pass; pass 1113 ext/phar/tar.c pass.old = oldfile; pass 1114 ext/phar/tar.c pass.new = newfile; pass 1115 ext/phar/tar.c pass.error = error; pass 1116 ext/phar/tar.c pass.free_fp = 1; pass 1117 ext/phar/tar.c pass.free_ufp = 1; pass 1155 ext/phar/tar.c zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_setupmetadata, (void *) &pass TSRMLS_CC); pass 1167 ext/phar/tar.c zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_writeheaders, (void *) &pass TSRMLS_CC); pass 1221 ext/phar/tar.c entry.filename_len = phar_tar_writeheaders((void *)&entry, (void *)&pass TSRMLS_CC); pass 1248 ext/phar/tar.c if (phar->fp && pass.free_fp) { pass 1253 ext/phar/tar.c if (pass.free_ufp) { pass 1090 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to create temporary file for the signature file"); pass 1093 ext/phar/zip.c st = tell = php_stream_tell(pass->filefp); pass 1095 ext/phar/zip.c php_stream_seek(pass->filefp, 0, SEEK_SET); pass 1096 ext/phar/zip.c phar_stream_copy_to_stream(pass->filefp, newfile, tell, NULL); pass 1097 ext/phar/zip.c tell = php_stream_tell(pass->centralfp); pass 1098 ext/phar/zip.c php_stream_seek(pass->centralfp, 0, SEEK_SET); pass 1099 ext/phar/zip.c phar_stream_copy_to_stream(pass->centralfp, newfile, tell, NULL); pass 1104 ext/phar/zip.c if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, pass->error TSRMLS_CC)) { pass 1105 ext/phar/zip.c if (pass->error) { pass 1106 ext/phar/zip.c char *save = *(pass->error); pass 1107 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar: %s", save); pass 1121 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to create temporary file for signature"); pass 1130 ext/phar/zip.c if (pass->error) { pass 1131 ext/phar/zip.c spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar %s", phar->fname); pass 1142 ext/phar/zip.c phar_zip_changed_apply((void *)&entry, (void *)pass TSRMLS_CC); pass 1145 ext/phar/zip.c if (pass->error && *(pass->error)) { pass 1168 ext/phar/zip.c struct _phar_zip_pass pass; pass 1172 ext/phar/zip.c pass.error = &temperr; pass 1361 ext/phar/zip.c pass.old = oldfile; pass 1362 ext/phar/zip.c pass.filefp = php_stream_fopen_tmpfile(); pass 1364 ext/phar/zip.c if (!pass.filefp) { pass 1375 ext/phar/zip.c pass.centralfp = php_stream_fopen_tmpfile(); pass 1377 ext/phar/zip.c if (!pass.centralfp) { pass 1381 ext/phar/zip.c pass.free_fp = pass.free_ufp = 1; pass 1395 ext/phar/zip.c zend_hash_apply_with_argument(&phar->manifest, phar_zip_changed_apply, (void *) &pass TSRMLS_CC); pass 1409 ext/phar/zip.c php_stream_close(pass.centralfp); pass 1414 ext/phar/zip.c php_stream_close(pass.filefp); pass 1421 ext/phar/zip.c if (FAILURE == phar_zip_applysignature(phar, &pass, &main_metadata_str TSRMLS_CC)) { pass 1426 ext/phar/zip.c cdir_size = php_stream_tell(pass.centralfp); pass 1427 ext/phar/zip.c cdir_offset = php_stream_tell(pass.filefp); pass 1430 ext/phar/zip.c php_stream_seek(pass.centralfp, 0, SEEK_SET); pass 1434 ext/phar/zip.c int ret = phar_stream_copy_to_stream(pass.centralfp, pass.filefp, PHP_STREAM_COPY_ALL, &clen); pass 1443 ext/phar/zip.c php_stream_close(pass.centralfp); pass 1449 ext/phar/zip.c if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) { pass 1456 ext/phar/zip.c if (main_metadata_str.len != php_stream_write(pass.filefp, main_metadata_str.c, main_metadata_str.len)) { pass 1466 ext/phar/zip.c if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) { pass 1474 ext/phar/zip.c if (phar->fp && pass.free_fp) { pass 1479 ext/phar/zip.c if (pass.free_ufp) { pass 1490 ext/phar/zip.c phar->fp = pass.filefp; pass 1497 ext/phar/zip.c phar->fp = pass.filefp; pass 1503 ext/phar/zip.c php_stream_rewind(pass.filefp); pass 1504 ext/phar/zip.c phar_stream_copy_to_stream(pass.filefp, phar->fp, PHP_STREAM_COPY_ALL, NULL); pass 1506 ext/phar/zip.c php_stream_close(pass.filefp); pass 1310 ext/snmp/snmp.c (u_char *) pass, strlen(pass), pass 1312 ext/snmp/snmp.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error generating a key for authentication pass phrase '%s': %s", pass, snmp_api_errstring(snmp_errno)); pass 1327 ext/snmp/snmp.c (u_char *)pass, strlen(pass), pass 1329 ext/snmp/snmp.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error generating a key for privacy pass phrase '%s': %s", pass, snmp_api_errstring(snmp_errno)); pass 1188 ext/soap/php_http.c if (phpurl->pass) phpurl->pass = estrdup(phpurl->pass); pass 263 ext/standard/ftp_fopen_wrapper.c if (resource->pass != NULL) { pass 264 ext/standard/ftp_fopen_wrapper.c tmp_len = php_raw_url_decode(resource->pass, strlen(resource->pass)); pass 266 ext/standard/ftp_fopen_wrapper.c PHP_FTP_CNTRL_CHK(resource->pass, tmp_len, "Invalid password %s") pass 268 ext/standard/ftp_fopen_wrapper.c php_stream_printf(stream TSRMLS_CC, "PASS %s\r\n", resource->pass); pass 531 ext/standard/http_fopen_wrapper.c if (resource->pass) { pass 532 ext/standard/http_fopen_wrapper.c php_url_decode(resource->pass, strlen(resource->pass)); pass 533 ext/standard/http_fopen_wrapper.c strcat(scratch, resource->pass); pass 868 ext/standard/http_fopen_wrapper.c CHECK_FOR_CNTRL_CHARS(resource->pass) pass 48 ext/standard/url.c if (theurl->pass) pass 49 ext/standard/url.c efree(theurl->pass); pass 250 ext/standard/url.c ret->pass = estrndup(pp, (p-pp)); pass 251 ext/standard/url.c php_replace_controlchars_ex(ret->pass, (p-pp)); pass 279 ext/standard/url.c STR_FREE(ret->pass); pass 292 ext/standard/url.c STR_FREE(ret->pass); pass 307 ext/standard/url.c STR_FREE(ret->pass); pass 407 ext/standard/url.c if (resource->pass != NULL) RETVAL_STRING(resource->pass, 1); pass 437 ext/standard/url.c if (resource->pass != NULL) pass 438 ext/standard/url.c add_assoc_string(return_value, "pass", resource->pass, 1); pass 26 ext/standard/url.h char *pass; pass 2584 main/main.c char *pass; pass 2589 main/main.c pass = strchr(user, ':'); pass 2590 main/main.c if (pass) { pass 2591 main/main.c *pass++ = '\0'; pass 2593 main/main.c SG(request_info).auth_password = estrdup(pass);