/PHP-5.3/ext/posix/tests/ |
H A D | posix_kill_error.phpt | 9 /* Prototype : proto bool posix_kill(int pid, int sig) 21 $sig = 9; 23 var_dump( posix_kill($pid, $sig, $extra_arg) ); 31 $sig = 999; 36 $sig = 9;
|
H A D | posix_kill_variation1.phpt | 9 /* Prototype : proto bool posix_kill(int pid, int sig) 18 $sig = -999; 73 var_dump( posix_kill($value, $sig) );
|
H A D | posix_kill_variation2.phpt | 9 /* Prototype : proto bool posix_kill(int pid, int sig) 69 // loop through each element of the array for sig
|
/PHP-5.3/sapi/fpm/fpm/ |
H A D | fpm_process_ctl.c | 175 int sig, timeout; in fpm_pctl_action_next() local 183 sig = SIGTERM; in fpm_pctl_action_next() 185 sig = SIGQUIT; in fpm_pctl_action_next() 190 sig = SIGTERM; in fpm_pctl_action_next() 192 sig = SIGKILL; in fpm_pctl_action_next() 197 fpm_pctl_kill_all(sig); in fpm_pctl_action_next() 198 fpm_signal_sent = sig; in fpm_pctl_action_next()
|
/PHP-5.3/ext/gd/libgd/ |
H A D | gd_png.c | 117 png_byte sig[8]; in gdImageCreateFromPngCtx() local 139 memset (sig, 0, sizeof(sig)); in gdImageCreateFromPngCtx() 144 if (gdGetBuf(sig, 8, infile) < 8) { in gdImageCreateFromPngCtx() 148 if (png_sig_cmp(sig, 0, 8) != 0) { /* bad signature */ in gdImageCreateFromPngCtx()
|
/PHP-5.3/ext/pcntl/ |
H A D | pcntl.c | 514 struct php_pcntl_pending_signal *sig; in PHP_RSHUTDOWN_FUNCTION() local 520 sig = PCNTL_G(head); in PHP_RSHUTDOWN_FUNCTION() 521 PCNTL_G(head) = sig->next; in PHP_RSHUTDOWN_FUNCTION() 522 efree(sig); in PHP_RSHUTDOWN_FUNCTION() 525 sig = PCNTL_G(spares); in PHP_RSHUTDOWN_FUNCTION() 526 PCNTL_G(spares) = sig->next; in PHP_RSHUTDOWN_FUNCTION() 527 efree(sig); in PHP_RSHUTDOWN_FUNCTION()
|
/PHP-5.3/ext/posix/ |
H A D | posix.c | 62 ZEND_ARG_INFO(0, sig) 396 long pid, sig; in PHP_FUNCTION() local 398 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ll", &pid, &sig) == FAILURE) { in PHP_FUNCTION() 402 if (kill(pid, sig) < 0) { in PHP_FUNCTION()
|
/PHP-5.3/ext/phar/ |
H A D | zip.c | 409 char *sig; in phar_parse_zipfile() local 429 sig = (char *) emalloc(entry.uncompressed_filesize); in phar_parse_zipfile() 430 read = php_stream_read(fp, sig, entry.uncompressed_filesize); in phar_parse_zipfile() 433 efree(sig); in phar_parse_zipfile() 436 mydata->sig_flags = PHAR_GET_32(sig); in phar_parse_zipfile() 437 …if (FAILURE == phar_verify_signature(sigfile, php_stream_tell(sigfile), mydata->sig_flags, sig + 8… in phar_parse_zipfile() 438 efree(sig); in phar_parse_zipfile() 451 efree(sig); in phar_parse_zipfile()
|
H A D | util.c | 1792 int phar_verify_signature(php_stream *fp, size_t end_of_phar, php_uint32 sig_type, char *sig, int s… argument 1844 …if (FAILURE == phar_call_openssl_signverify(0, fp, end_of_phar, pubkey, pubkey_len, &sig, &tempsig… 1903 if (EVP_VerifyFinal(&md_ctx, (unsigned char *)sig, sig_len, key) != 1) { 1917 *signature_len = phar_hex_str((const char*)sig, sig_len, signature TSRMLS_CC); 1944 if (memcmp(digest, sig, sizeof(digest))) { 1977 if (memcmp(digest, sig, sizeof(digest))) { 2018 if (memcmp(digest, sig, sizeof(digest))) { 2051 if (memcmp(digest, sig, sizeof(digest))) {
|
H A D | phar.c | 791 char *sig; local 807 sig = (char *) emalloc(signature_len); 813 || signature_len != php_stream_read(fp, sig, signature_len)) { 815 efree(sig); 823 …if (FAILURE == phar_verify_signature(fp, end_of_phar, PHAR_SIG_OPENSSL, sig, signature_len, fname,… 825 efree(sig); 834 efree(sig);
|
H A D | phar_internal.h | 643 int phar_verify_signature(php_stream *fp, size_t end_of_phar, php_uint32 sig_type, char *sig, int s…
|
/PHP-5.3/sapi/litespeed/ |
H A D | lsapilib.c | 146 static void lsapi_sigpipe( int sig ) in lsapi_sigpipe() argument 149 static void lsapi_siguser1( int sig ) in lsapi_siguser1() argument
|
/PHP-5.3/ext/gd/ |
H A D | gd.c | 2330 char sig[8]; in PHP_FUNCTION() local 2342 memcpy(sig, Z_STRVAL_PP(data), 8); in PHP_FUNCTION() 2344 imtype = _php_image_type(sig); in PHP_FUNCTION()
|
/PHP-5.3/sapi/thttpd/ |
H A D | thttpd_patch | 1517 handle_term( int sig ) 1534 handle_usr2( int sig )
|
/PHP-5.3/ext/mysql/ |
H A D | php_mysql.c | 364 void timeout(int sig);
|
/PHP-5.3/ext/fileinfo/tests/ |
H A D | magic | 1742 # BatComp left out: sig looks like COM executable 1743 # so TODO: get real 4dos batcomp file and find sig 11177 # winarj stores a message in the stub instead of the sig in the MZ header 11373 # PGP sig files .sig 11374 …tring \211\000\077\003\005\000\063\237\127 065 to \027\266\151\064\005\045\101\233\021\002 PGP sig 11375 0 string \211\000\077\003\005\000\063\237\127\065\027\266\151\064\005\045\101\233\021\002 PGP sig 11376 0 string \211\000\077\003\005\000\063\237\127\066\027\266\151\064\005\045\101\233\021\002 PGP sig 11377 0 string \211\000\077\003\005\000\063\237\127\067\027\266\151\064\005\045\101\233\021\002 PGP sig 11378 0 string \211\000\077\003\005\000\063\237\127\070\027\266\151\064\005\045\101\233\021\002 PGP sig 11379 0 string \211\000\077\003\005\000\063\237\127\071\027\266\151\064\005\045\101\233\021\002 PGP sig [all …]
|