/PHP-7.4/sapi/phpdbg/ |
H A D | phpdbg_sigio_win32.c | 32 zend_uchar sig; in ZEND_EXTERN_MODULE_GLOBALS() local 36 (void)phpdbg_consume_bytes(swd->fd, &sig, 1, -1); in ZEND_EXTERN_MODULE_GLOBALS() 39 if (3 == sig) { in ZEND_EXTERN_MODULE_GLOBALS() 42 if (raise(sig)) { in ZEND_EXTERN_MODULE_GLOBALS() 47 phpdbg_set_sigsafe_mem(&sig); in ZEND_EXTERN_MODULE_GLOBALS() 59 ExitThread(sig); in ZEND_EXTERN_MODULE_GLOBALS()
|
H A D | phpdbg.c | 1231 void phpdbg_sigio_handler(int sig, siginfo_t *info, void *context) /* {{{ */ in phpdbg_sigio_handler() argument 1287 void phpdbg_signal_handler(int sig, siginfo_t *info, void *context) /* {{{ */ in phpdbg_signal_handler() argument 1291 switch (sig) { in phpdbg_signal_handler() 1299 zend_sigaction(sig, &PHPDBG_G(old_sigsegv_signal), NULL); in phpdbg_signal_handler() 1307 void phpdbg_sighup_handler(int sig) /* {{{ */ in phpdbg_sighup_handler() argument
|
/PHP-7.4/ext/phar/tests/ |
H A D | bug70091.phpt | 34 ["sig"]=> 40 ["sig"]=> 46 ["sig"]=> 52 ["sig"]=>
|
/PHP-7.4/ext/posix/tests/ |
H A D | posix_kill_error.phpt | 9 /* Prototype : proto bool posix_kill(int pid, int sig) 21 $sig = 9; 23 var_dump( posix_kill($pid, $sig, $extra_arg) ); 31 $sig = 999; 36 $sig = 9;
|
/PHP-7.4/ext/openssl/tests/ |
H A D | bug61930.phpt | 15 $sig = 'f9Gyb6NV/ENn7GUa37ygTLcF93XHf5fbFTnoYF/O+fXbq3iChGUbET0RuhOsptl' . 21 var_dump(openssl_verify($data, base64_decode($sig), $key));
|
/PHP-7.4/sapi/fpm/fpm/ |
H A D | fpm_process_ctl.c | 177 int sig, timeout; in fpm_pctl_action_next() local 185 sig = SIGTERM; in fpm_pctl_action_next() 187 sig = SIGQUIT; in fpm_pctl_action_next() 192 sig = SIGTERM; in fpm_pctl_action_next() 194 sig = SIGKILL; in fpm_pctl_action_next() 199 fpm_pctl_kill_all(sig); in fpm_pctl_action_next() 200 fpm_signal_sent = sig; in fpm_pctl_action_next()
|
/PHP-7.4/ext/gd/libgd/ |
H A D | gd_png.c | 123 png_byte sig[8]; in gdImageCreateFromPngCtx() local 146 memset (sig, 0, sizeof(sig)); in gdImageCreateFromPngCtx() 151 if (gdGetBuf(sig, 8, infile) < 8) { in gdImageCreateFromPngCtx() 155 if (png_sig_cmp(sig, 0, 8) != 0) { /* bad signature */ in gdImageCreateFromPngCtx()
|
/PHP-7.4/ext/pcntl/ |
H A D | pcntl.c | 614 struct php_pcntl_pending_signal *sig; in PHP_RSHUTDOWN_FUNCTION() local 620 sig = PCNTL_G(head); in PHP_RSHUTDOWN_FUNCTION() 621 PCNTL_G(head) = sig->next; in PHP_RSHUTDOWN_FUNCTION() 622 efree(sig); in PHP_RSHUTDOWN_FUNCTION() 625 sig = PCNTL_G(spares); in PHP_RSHUTDOWN_FUNCTION() 626 PCNTL_G(spares) = sig->next; in PHP_RSHUTDOWN_FUNCTION() 627 efree(sig); in PHP_RSHUTDOWN_FUNCTION()
|
/PHP-7.4/ext/phar/ |
H A D | zip.c | 426 char *sig; in phar_parse_zipfile() local 452 sig = (char *) emalloc(entry.uncompressed_filesize); in phar_parse_zipfile() 453 read = php_stream_read(fp, sig, entry.uncompressed_filesize); in phar_parse_zipfile() 456 efree(sig); in phar_parse_zipfile() 459 mydata->sig_flags = PHAR_GET_32(sig); in phar_parse_zipfile() 460 …if (FAILURE == phar_verify_signature(sigfile, php_stream_tell(sigfile), mydata->sig_flags, sig + 8… in phar_parse_zipfile() 461 efree(sig); in phar_parse_zipfile() 475 efree(sig); in phar_parse_zipfile()
|
H A D | util.c | 1472 int phar_verify_signature(php_stream *fp, size_t end_of_phar, uint32_t sig_type, char *sig, size_t … in phar_verify_signature() argument 1520 …p, end_of_phar, pubkey ? ZSTR_VAL(pubkey) : NULL, pubkey ? ZSTR_LEN(pubkey) : 0, &sig, &tempsig)) { in phar_verify_signature() 1580 if (EVP_VerifyFinal(md_ctx, (unsigned char *)sig, sig_len, key) != 1) { in phar_verify_signature() 1596 *signature_len = phar_hex_str((const char*)sig, sig_len, signature); in phar_verify_signature() 1629 if (memcmp(digest, sig, sizeof(digest))) { in phar_verify_signature() 1669 if (memcmp(digest, sig, sizeof(digest))) { in phar_verify_signature() 1709 if (memcmp(digest, sig, sizeof(digest))) { in phar_verify_signature() 1749 if (memcmp(digest, sig, sizeof(digest))) { in phar_verify_signature()
|
H A D | phar.c | 799 char *sig; in phar_parse_pharfile() local 815 sig = (char *) emalloc(signature_len); in phar_parse_pharfile() 821 || signature_len != php_stream_read(fp, sig, signature_len)) { in phar_parse_pharfile() 823 efree(sig); in phar_parse_pharfile() 831 …if (FAILURE == phar_verify_signature(fp, end_of_phar, PHAR_SIG_OPENSSL, sig, signature_len, fname,… in phar_parse_pharfile() 833 efree(sig); in phar_parse_pharfile() 842 efree(sig); in phar_parse_pharfile()
|
H A D | phar_internal.h | 533 int phar_verify_signature(php_stream *fp, size_t end_of_phar, uint32_t sig_type, char *sig, size_t …
|
/PHP-7.4/ext/posix/ |
H A D | posix.c | 58 ZEND_ARG_INFO(0, sig) 461 zend_long pid, sig; local 465 Z_PARAM_LONG(sig) 468 if (kill(pid, sig) < 0) {
|
/PHP-7.4/sapi/litespeed/ |
H A D | lscriu.c | 168 static void lsapi_siguser2(int sig) in lsapi_siguser2() argument
|
H A D | lsapilib.c | 326 static void lsapi_sigpipe( int sig ) in lsapi_sigpipe() argument 331 static void lsapi_siguser1( int sig ) in lsapi_siguser1() argument
|
/PHP-7.4/ext/standard/ |
H A D | image.c | 1134 const char sig[3] = {'V', 'P', '8'}; in php_handle_webp() local 1141 if (memcmp(buf, sig, 3)) { in php_handle_webp()
|
/PHP-7.4/ext/gd/ |
H A D | gd.c | 2364 char sig[12]; in PHP_FUNCTION() local 2374 if (Z_STRLEN_P(data) < sizeof(sig)) { in PHP_FUNCTION() 2379 memcpy(sig, Z_STRVAL_P(data), sizeof(sig)); in PHP_FUNCTION() 2381 imtype = _php_image_type(sig); in PHP_FUNCTION()
|
/PHP-7.4/sapi/cli/ |
H A D | php_cli.c | 607 BOOL WINAPI php_cli_win32_ctrl_handler(DWORD sig) in php_cli_win32_ctrl_handler() argument
|
H A D | php_cli_server.c | 2659 static void php_cli_server_sigint_handler(int sig) /* {{{ */ in php_cli_server_sigint_handler() argument
|
/PHP-7.4/sapi/cgi/ |
H A D | cgi_main.c | 1490 BOOL WINAPI fastcgi_cleanup(DWORD sig) argument
|
/PHP-7.4/ext/fileinfo/tests/ |
H A D | magic私はガラスを食べられます | 2973 # BatComp left out: sig looks like COM executable 2974 # so TODO: get real 4dos batcomp file and find sig 20729 # winarj stores a message in the stub instead of the sig in the MZ header 21314 # PGP sig files .sig 21315 …tring \211\000\077\003\005\000\063\237\127 065 to \027\266\151\064\005\045\101\233\021\002 PGP sig 21316 0 string \211\000\077\003\005\000\063\237\127\065\027\266\151\064\005\045\101\233\021\002 PGP sig 21317 0 string \211\000\077\003\005\000\063\237\127\066\027\266\151\064\005\045\101\233\021\002 PGP sig 21318 0 string \211\000\077\003\005\000\063\237\127\067\027\266\151\064\005\045\101\233\021\002 PGP sig 21319 0 string \211\000\077\003\005\000\063\237\127\070\027\266\151\064\005\045\101\233\021\002 PGP sig 21320 0 string \211\000\077\003\005\000\063\237\127\071\027\266\151\064\005\045\101\233\021\002 PGP sig [all …]
|
H A D | magic | 2973 # BatComp left out: sig looks like COM executable 2974 # so TODO: get real 4dos batcomp file and find sig 20729 # winarj stores a message in the stub instead of the sig in the MZ header 21314 # PGP sig files .sig 21315 …tring \211\000\077\003\005\000\063\237\127 065 to \027\266\151\064\005\045\101\233\021\002 PGP sig 21316 0 string \211\000\077\003\005\000\063\237\127\065\027\266\151\064\005\045\101\233\021\002 PGP sig 21317 0 string \211\000\077\003\005\000\063\237\127\066\027\266\151\064\005\045\101\233\021\002 PGP sig 21318 0 string \211\000\077\003\005\000\063\237\127\067\027\266\151\064\005\045\101\233\021\002 PGP sig 21319 0 string \211\000\077\003\005\000\063\237\127\070\027\266\151\064\005\045\101\233\021\002 PGP sig 21320 0 string \211\000\077\003\005\000\063\237\127\071\027\266\151\064\005\045\101\233\021\002 PGP sig [all …]
|