/PHP-5.4/ext/posix/tests/ |
H A D | posix_kill_error.phpt | 9 /* Prototype : proto bool posix_kill(int pid, int sig) 21 $sig = 9; 23 var_dump( posix_kill($pid, $sig, $extra_arg) ); 31 $sig = 999; 36 $sig = 9;
|
H A D | posix_kill_variation1.phpt | 9 /* Prototype : proto bool posix_kill(int pid, int sig) 18 $sig = -999; 73 var_dump( posix_kill($value, $sig) );
|
H A D | posix_kill_variation2.phpt | 9 /* Prototype : proto bool posix_kill(int pid, int sig) 69 // loop through each element of the array for sig
|
/PHP-5.4/ext/openssl/tests/ |
H A D | bug61930.phpt | 15 $sig = 'f9Gyb6NV/ENn7GUa37ygTLcF93XHf5fbFTnoYF/O+fXbq3iChGUbET0RuhOsptlAODi6JsDLnJO4ikcVZo0tC1fFTj3… 19 var_dump(openssl_verify($data, base64_decode($sig), $key));
|
/PHP-5.4/sapi/fpm/fpm/ |
H A D | fpm_process_ctl.c | 175 int sig, timeout; in fpm_pctl_action_next() local 183 sig = SIGTERM; in fpm_pctl_action_next() 185 sig = SIGQUIT; in fpm_pctl_action_next() 190 sig = SIGTERM; in fpm_pctl_action_next() 192 sig = SIGKILL; in fpm_pctl_action_next() 197 fpm_pctl_kill_all(sig); in fpm_pctl_action_next() 198 fpm_signal_sent = sig; in fpm_pctl_action_next()
|
/PHP-5.4/ext/gd/libgd/ |
H A D | gd_png.c | 117 png_byte sig[8]; in gdImageCreateFromPngCtx() local 139 memset (sig, 0, sizeof(sig)); in gdImageCreateFromPngCtx() 144 if (gdGetBuf(sig, 8, infile) < 8) { in gdImageCreateFromPngCtx() 148 if (png_sig_cmp(sig, 0, 8) != 0) { /* bad signature */ in gdImageCreateFromPngCtx()
|
/PHP-5.4/ext/pcntl/ |
H A D | pcntl.c | 514 struct php_pcntl_pending_signal *sig; in PHP_RSHUTDOWN_FUNCTION() local 520 sig = PCNTL_G(head); in PHP_RSHUTDOWN_FUNCTION() 521 PCNTL_G(head) = sig->next; in PHP_RSHUTDOWN_FUNCTION() 522 efree(sig); in PHP_RSHUTDOWN_FUNCTION() 525 sig = PCNTL_G(spares); in PHP_RSHUTDOWN_FUNCTION() 526 PCNTL_G(spares) = sig->next; in PHP_RSHUTDOWN_FUNCTION() 527 efree(sig); in PHP_RSHUTDOWN_FUNCTION()
|
/PHP-5.4/ext/posix/ |
H A D | posix.c | 62 ZEND_ARG_INFO(0, sig) 396 long pid, sig; in PHP_FUNCTION() local 398 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ll", &pid, &sig) == FAILURE) { in PHP_FUNCTION() 402 if (kill(pid, sig) < 0) { in PHP_FUNCTION()
|
/PHP-5.4/ext/phar/ |
H A D | zip.c | 409 char *sig; in phar_parse_zipfile() local 429 sig = (char *) emalloc(entry.uncompressed_filesize); in phar_parse_zipfile() 430 read = php_stream_read(fp, sig, entry.uncompressed_filesize); in phar_parse_zipfile() 433 efree(sig); in phar_parse_zipfile() 436 mydata->sig_flags = PHAR_GET_32(sig); in phar_parse_zipfile() 437 …if (FAILURE == phar_verify_signature(sigfile, php_stream_tell(sigfile), mydata->sig_flags, sig + 8… in phar_parse_zipfile() 438 efree(sig); in phar_parse_zipfile() 451 efree(sig); in phar_parse_zipfile()
|
H A D | util.c | 1793 int phar_verify_signature(php_stream *fp, size_t end_of_phar, php_uint32 sig_type, char *sig, int s… argument 1845 …if (FAILURE == phar_call_openssl_signverify(0, fp, end_of_phar, pubkey, pubkey_len, &sig, &tempsig… 1904 if (EVP_VerifyFinal(&md_ctx, (unsigned char *)sig, sig_len, key) != 1) { 1918 *signature_len = phar_hex_str((const char*)sig, sig_len, signature TSRMLS_CC); 1945 if (memcmp(digest, sig, sizeof(digest))) { 1978 if (memcmp(digest, sig, sizeof(digest))) { 2019 if (memcmp(digest, sig, sizeof(digest))) { 2052 if (memcmp(digest, sig, sizeof(digest))) {
|
H A D | phar.c | 781 char *sig; local 797 sig = (char *) emalloc(signature_len); 803 || signature_len != php_stream_read(fp, sig, signature_len)) { 805 efree(sig); 813 …if (FAILURE == phar_verify_signature(fp, end_of_phar, PHAR_SIG_OPENSSL, sig, signature_len, fname,… 815 efree(sig); 824 efree(sig);
|
H A D | phar_internal.h | 649 int phar_verify_signature(php_stream *fp, size_t end_of_phar, php_uint32 sig_type, char *sig, int s…
|
/PHP-5.4/sapi/litespeed/ |
H A D | lsapilib.c | 188 static void lsapi_sigpipe( int sig ) in lsapi_sigpipe() argument 191 static void lsapi_siguser1( int sig ) in lsapi_siguser1() argument 1055 static void lsapi_sigalarm( int sig ) in lsapi_sigalarm() argument
|
/PHP-5.4/ext/gd/ |
H A D | gd.c | 2350 char sig[8]; in PHP_FUNCTION() local 2362 memcpy(sig, Z_STRVAL_PP(data), 8); in PHP_FUNCTION() 2364 imtype = _php_image_type(sig); in PHP_FUNCTION()
|
/PHP-5.4/sapi/thttpd/ |
H A D | thttpd_patch | 1517 handle_term( int sig ) 1534 handle_usr2( int sig )
|
/PHP-5.4/ext/mysql/ |
H A D | php_mysql.c | 364 void timeout(int sig);
|
/PHP-5.4/sapi/cli/ |
H A D | php_cli_server.c | 2378 static void php_cli_server_sigint_handler(int sig) /* {{{ */ in php_cli_server_sigint_handler() argument
|
/PHP-5.4/ext/fileinfo/tests/ |
H A D | magic | 1928 # BatComp left out: sig looks like COM executable 1929 # so TODO: get real 4dos batcomp file and find sig 13081 # winarj stores a message in the stub instead of the sig in the MZ header 13397 # PGP sig files .sig 13398 …tring \211\000\077\003\005\000\063\237\127 065 to \027\266\151\064\005\045\101\233\021\002 PGP sig 13399 0 string \211\000\077\003\005\000\063\237\127\065\027\266\151\064\005\045\101\233\021\002 PGP sig 13400 0 string \211\000\077\003\005\000\063\237\127\066\027\266\151\064\005\045\101\233\021\002 PGP sig 13401 0 string \211\000\077\003\005\000\063\237\127\067\027\266\151\064\005\045\101\233\021\002 PGP sig 13402 0 string \211\000\077\003\005\000\063\237\127\070\027\266\151\064\005\045\101\233\021\002 PGP sig 13403 0 string \211\000\077\003\005\000\063\237\127\071\027\266\151\064\005\045\101\233\021\002 PGP sig [all …]
|
/PHP-5.4/ |
H A D | NEWS | 2211 . Added JSON_BIGINT_AS_STRING, extended json_decode() sig with $options.
|