/php-src/ext/phar/ |
H A D | pharzip.h | 21 char signature[4]; /* local file header signature 4 bytes (0x04034b50) */ member 38 char signature[4]; /* signature (optional) 4 bytes */ member 54 char signature[4]; /* archive extra data signature 4 bytes (0x08064b50) */ member 157 char signature[4]; /* central file header signature 4 bytes (0x02014b50) */ member 181 char signature[4]; /* header signature 4 bytes (0x05054b50) */ member 187 char signature[4]; /* zip64 end of central dir member 214 char signature[4]; /* zip64 end of central dir locator member 226 char signature[4]; /* end of central dir signature 4 bytes (0x06054b50) */ member
|
H A D | util.c | 1424 (*signature)[++pos] = '\0'; in phar_hex_str() 1840 if (phar->signature) { in phar_create_signature() 1841 efree(phar->signature); in phar_create_signature() 1842 phar->signature = NULL; in phar_create_signature() 1857 *signature = estrndup((char *) digest, 64); in phar_create_signature() 1875 *signature = estrndup((char *) digest, 32); in phar_create_signature() 1974 *signature = (char *) sigbuf; in phar_create_signature() 1989 *signature = estrndup((char *) digest, 20); in phar_create_signature() 2010 phar->sig_len = phar_hex_str((const char *)*signature, *signature_length, &phar->signature); in phar_create_signature() 2089 if (phar->signature) { in phar_copy_cached_phar() [all …]
|
/php-src/ext/openssl/tests/ |
H A D | bug41033.phpt | 17 openssl_sign($ct, $signature, $prkeyid, OPENSSL_ALGO_SHA256); 18 echo "Signature: ".base64_encode($signature) . "\n"; 21 $valid = openssl_verify($ct, $signature, $pukeyid, OPENSSL_ALGO_SHA256);
|
H A D | bug38255.phpt | 8 $signature = ''; 9 $ok = openssl_verify("foo", $signature, $pub_key_id, OPENSSL_ALGO_MD5); 19 var_dump(openssl_verify("foo", $signature, $pub_key_id, OPENSSL_ALGO_MD5));
|
H A D | bug37820.phpt | 18 if (!openssl_sign($data, $signature, $priv_key_id, OPENSSL_ALGO_MD5)) { 22 $ok = openssl_verify($data, $signature, $pub_key_id, OPENSSL_ALGO_MD5);
|
H A D | signed.eml | 2 Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="sha-256"; boundar… 30 Content-Type: application/x-pkcs7-signature; name="smime.p7s"
|
/php-src/ext/gd/tests/ |
H A D | imagegd_truecolor.phpt | 26 printf("signature: %d\n", $header['signature']); 33 signature: 65534
|
/php-src/ext/phar/tests/ |
H A D | bug72928.phpt | 2 Phar: #72928 (Out of bound when verify signature of zip phar in phar_parse_zipfile) 17 phar error: signature cannot be read in zip-based phar "%sbug72928.zip"
|
H A D | bug73035.phpt | 2 Phar: #73035 (Out of bound when verify signature of tar phar in phar_parse_tarfile) 17 phar error: tar-based phar "%sbug73035.tar" signature cannot be read
|
H A D | bug73809.phpt | 12 $zip->addFromString('.phar/signature.bin', str_repeat('*', 64 * 1024 + 1)); 13 $zip->setCompressionName('.phar/signature.bin', ZipArchive::CM_STORE);
|
H A D | gh14603.phpt | 22 …W+A��<?php function hio(){}PK!��+�e.phar/signature.binnu��A… 23 …psnuW+A��PK!��+�e�.phar/signature.binnu��A…
|
H A D | phar_oo_nosig.phpt | 2 Phar::getSignature() no signature
|
/php-src/ext/sodium/tests/ |
H A D | crypto_sign.phpt | 46 $signature = sodium_crypto_sign_detached($msg, $alice_secretkey); 47 var_dump(strlen($signature) === SODIUM_CRYPTO_SIGN_BYTES); 48 var_dump(sodium_crypto_sign_verify_detached($signature, 50 var_dump(sodium_crypto_sign_verify_detached($signature,
|
/php-src/ext/phar/tests/tar/ |
H A D | require_hash.phpt | 2 Phar: tar-based phar, require_hash=1, no signature 47 tar-based phar "%srequire_hash.phar.tar" does not have a signature
|
/php-src/ext/phar/tests/zip/ |
H A D | require_hash.phpt | 2 Phar: zip-based phar, require_hash=1, no signature 49 phar error: signature is missing in zip-based phar "%srequire_hash.phar.zip"
|
H A D | corrupt_007.phpt | 14 phar error: corrupted central directory entry, no magic signature in zip-based phar "%struncfilenam…
|
/php-src/tests/classes/ |
H A D | __call_002.phpt | 2 ZE2 __call() signature check
|
H A D | __set__get_003.phpt | 2 ZE2 __set() signature check
|
H A D | __set__get_002.phpt | 2 ZE2 __get() signature check
|
/php-src/Zend/tests/ |
H A D | bug42798.phpt | 2 Bug #42798 (_autoload() not triggered for classes used in method signature)
|
H A D | bug61761.phpt | 2 Bug #61761 ('Overriding' a private static method with a different signature causes crash)
|
/php-src/ext/pgsql/tests/ |
H A D | bug37100.phpt | 47 Deprecated: Calling pg_fetch_result() with 2 arguments is deprecated, use the 3-parameter signature… 51 Deprecated: Calling pg_fetch_result() with 2 arguments is deprecated, use the 3-parameter signature…
|
/php-src/ext/ffi/tests/ |
H A D | bug78270_2.phpt | 34 $signature = "__vectorcall void foobar($arglist);"; 36 $ffi = FFI::cdef($signature);
|
/php-src/Zend/tests/objects/ |
H A D | objects_009.phpt | 2 method overloading with different method signature
|
/php-src/Zend/tests/variadic/ |
H A D | adding_additional_optional_parameter.phpt | 2 It's possible to add additional optional arguments with matching signature
|