/PHP-8.0/sapi/phpdbg/ |
H A D | phpdbg_sigio_win32.c | 30 zend_uchar sig; in ZEND_EXTERN_MODULE_GLOBALS() local 34 (void)phpdbg_consume_bytes(swd->fd, &sig, 1, -1); in ZEND_EXTERN_MODULE_GLOBALS() 37 if (3 == sig) { in ZEND_EXTERN_MODULE_GLOBALS() 40 if (raise(sig)) { in ZEND_EXTERN_MODULE_GLOBALS() 45 phpdbg_set_sigsafe_mem(&sig); in ZEND_EXTERN_MODULE_GLOBALS() 57 ExitThread(sig); in ZEND_EXTERN_MODULE_GLOBALS()
|
H A D | phpdbg.c | 1168 void phpdbg_sigio_handler(int sig, siginfo_t *info, void *context) /* {{{ */ in phpdbg_sigio_handler() argument 1224 void phpdbg_signal_handler(int sig, siginfo_t *info, void *context) /* {{{ */ in phpdbg_signal_handler() argument 1228 switch (sig) { in phpdbg_signal_handler() 1236 zend_sigaction(sig, &PHPDBG_G(old_sigsegv_signal), NULL); in phpdbg_signal_handler() 1244 void phpdbg_sighup_handler(int sig) /* {{{ */ in phpdbg_sighup_handler() argument
|
/PHP-8.0/ext/phar/tests/ |
H A D | bug70091.phpt | 34 ["sig"]=> 40 ["sig"]=> 46 ["sig"]=> 52 ["sig"]=>
|
/PHP-8.0/ext/openssl/tests/ |
H A D | bug61930.phpt | 15 $sig = 'f9Gyb6NV/ENn7GUa37ygTLcF93XHf5fbFTnoYF/O+fXbq3iChGUbET0RuhOsptl' . 21 var_dump(openssl_verify($data, base64_decode($sig), $key));
|
H A D | bug81713.phpt | 61 ["openssl_verify", "test", "sig", $priv_key_file_null],
|
/PHP-8.0/ext/posix/tests/ |
H A D | posix_kill_error.phpt | 14 $sig = 999; 19 $sig = 9;
|
/PHP-8.0/sapi/fpm/fpm/ |
H A D | fpm_process_ctl.c | 181 int sig, timeout; in fpm_pctl_action_next() local 189 sig = SIGTERM; in fpm_pctl_action_next() 191 sig = SIGQUIT; in fpm_pctl_action_next() 196 sig = SIGTERM; in fpm_pctl_action_next() 198 sig = SIGKILL; in fpm_pctl_action_next() 203 fpm_pctl_kill_all(sig); in fpm_pctl_action_next() 204 fpm_signal_sent = sig; in fpm_pctl_action_next()
|
/PHP-8.0/ext/gd/libgd/ |
H A D | gd_png.c | 123 png_byte sig[8]; in gdImageCreateFromPngCtx() local 146 memset (sig, 0, sizeof(sig)); in gdImageCreateFromPngCtx() 151 if (gdGetBuf(sig, 8, infile) < 8) { in gdImageCreateFromPngCtx() 155 if (png_sig_cmp(sig, 0, 8) != 0) { /* bad signature */ in gdImageCreateFromPngCtx()
|
/PHP-8.0/ext/pcntl/ |
H A D | pcntl.c | 454 struct php_pcntl_pending_signal *sig; in PHP_RSHUTDOWN_FUNCTION() local 460 sig = PCNTL_G(head); in PHP_RSHUTDOWN_FUNCTION() 461 PCNTL_G(head) = sig->next; in PHP_RSHUTDOWN_FUNCTION() 462 efree(sig); in PHP_RSHUTDOWN_FUNCTION() 465 sig = PCNTL_G(spares); in PHP_RSHUTDOWN_FUNCTION() 466 PCNTL_G(spares) = sig->next; in PHP_RSHUTDOWN_FUNCTION() 467 efree(sig); in PHP_RSHUTDOWN_FUNCTION()
|
/PHP-8.0/ext/phar/ |
H A D | zip.c | 422 char *sig; in phar_parse_zipfile() local 448 sig = (char *) emalloc(entry.uncompressed_filesize); in phar_parse_zipfile() 449 read = php_stream_read(fp, sig, entry.uncompressed_filesize); in phar_parse_zipfile() 452 efree(sig); in phar_parse_zipfile() 455 mydata->sig_flags = PHAR_GET_32(sig); in phar_parse_zipfile() 456 …if (FAILURE == phar_verify_signature(sigfile, php_stream_tell(sigfile), mydata->sig_flags, sig + 8… in phar_parse_zipfile() 457 efree(sig); in phar_parse_zipfile() 471 efree(sig); in phar_parse_zipfile()
|
H A D | util.c | 1476 int phar_verify_signature(php_stream *fp, size_t end_of_phar, uint32_t sig_type, char *sig, size_t … in phar_verify_signature() argument 1524 …p, end_of_phar, pubkey ? ZSTR_VAL(pubkey) : NULL, pubkey ? ZSTR_LEN(pubkey) : 0, &sig, &tempsig)) { in phar_verify_signature() 1584 if (EVP_VerifyFinal(md_ctx, (unsigned char *)sig, sig_len, key) != 1) { in phar_verify_signature() 1600 *signature_len = phar_hex_str((const char*)sig, sig_len, signature); in phar_verify_signature() 1633 if (memcmp(digest, sig, sizeof(digest))) { in phar_verify_signature() 1673 if (memcmp(digest, sig, sizeof(digest))) { in phar_verify_signature() 1713 if (memcmp(digest, sig, sizeof(digest))) { in phar_verify_signature() 1753 if (memcmp(digest, sig, sizeof(digest))) { in phar_verify_signature()
|
H A D | phar.c | 874 char *sig; in phar_parse_pharfile() local 890 sig = (char *) emalloc(signature_len); in phar_parse_pharfile() 896 || signature_len != php_stream_read(fp, sig, signature_len)) { in phar_parse_pharfile() 898 efree(sig); in phar_parse_pharfile() 906 …if (FAILURE == phar_verify_signature(fp, end_of_phar, PHAR_SIG_OPENSSL, sig, signature_len, fname,… in phar_parse_pharfile() 908 efree(sig); in phar_parse_pharfile() 917 efree(sig); in phar_parse_pharfile()
|
H A D | phar_internal.h | 541 int phar_verify_signature(php_stream *fp, size_t end_of_phar, uint32_t sig_type, char *sig, size_t …
|
/PHP-8.0/ext/posix/ |
H A D | posix.c | 193 zend_long pid, sig; local 197 Z_PARAM_LONG(sig) 200 if (kill(pid, sig) < 0) {
|
/PHP-8.0/sapi/litespeed/ |
H A D | lscriu.c | 166 static void lsapi_siguser2(int sig) in lsapi_siguser2() argument
|
H A D | lsapilib.c | 324 static void lsapi_sigpipe( int sig ) in lsapi_sigpipe() argument 329 static void lsapi_siguser1( int sig ) in lsapi_siguser1() argument
|
/PHP-8.0/ext/standard/ |
H A D | image.c | 1115 const char sig[3] = {'V', 'P', '8'}; in php_handle_webp() local 1122 if (memcmp(buf, sig, 3)) { in php_handle_webp()
|
/PHP-8.0/ext/gd/ |
H A D | gd.c | 1497 char sig[12]; in PHP_FUNCTION() local 1503 if (ZSTR_LEN(data) < sizeof(sig)) { in PHP_FUNCTION() 1509 memcpy(sig, ZSTR_VAL(data), sizeof(sig)); in PHP_FUNCTION() 1511 imtype = _php_image_type(sig); in PHP_FUNCTION()
|
/PHP-8.0/sapi/cli/ |
H A D | php_cli.c | 593 BOOL WINAPI php_cli_win32_ctrl_handler(DWORD sig) in php_cli_win32_ctrl_handler() argument
|
H A D | php_cli_server.c | 2676 static void php_cli_server_sigint_handler(int sig) /* {{{ */ in php_cli_server_sigint_handler() argument
|
/PHP-8.0/ext/opcache/jit/dynasm/ |
H A D | minilua.c | 7139 int sig=1; 7141 sig=0; 7148 return sig; 7153 return sig; 7155 else if(uchar(*p)==c)return sig; 7157 return!sig;
|
/PHP-8.0/sapi/cgi/ |
H A D | cgi_main.c | 1477 BOOL WINAPI fastcgi_cleanup(DWORD sig) argument
|
/PHP-8.0/ext/fileinfo/tests/ |
H A D | magic私はガラスを食べられます | 3030 # BatComp left out: sig looks like COM executable 3031 # so TODO: get real 4dos batcomp file and find sig 22417 # winarj stores a message in the stub instead of the sig in the MZ header 23062 # PGP sig files .sig 23063 …tring \211\000\077\003\005\000\063\237\127 065 to \027\266\151\064\005\045\101\233\021\002 PGP sig 23064 0 string \211\000\077\003\005\000\063\237\127\065\027\266\151\064\005\045\101\233\021\002 PGP sig 23065 0 string \211\000\077\003\005\000\063\237\127\066\027\266\151\064\005\045\101\233\021\002 PGP sig 23066 0 string \211\000\077\003\005\000\063\237\127\067\027\266\151\064\005\045\101\233\021\002 PGP sig 23067 0 string \211\000\077\003\005\000\063\237\127\070\027\266\151\064\005\045\101\233\021\002 PGP sig 23068 0 string \211\000\077\003\005\000\063\237\127\071\027\266\151\064\005\045\101\233\021\002 PGP sig [all …]
|
H A D | magic | 3030 # BatComp left out: sig looks like COM executable 3031 # so TODO: get real 4dos batcomp file and find sig 22417 # winarj stores a message in the stub instead of the sig in the MZ header 23062 # PGP sig files .sig 23063 …tring \211\000\077\003\005\000\063\237\127 065 to \027\266\151\064\005\045\101\233\021\002 PGP sig 23064 0 string \211\000\077\003\005\000\063\237\127\065\027\266\151\064\005\045\101\233\021\002 PGP sig 23065 0 string \211\000\077\003\005\000\063\237\127\066\027\266\151\064\005\045\101\233\021\002 PGP sig 23066 0 string \211\000\077\003\005\000\063\237\127\067\027\266\151\064\005\045\101\233\021\002 PGP sig 23067 0 string \211\000\077\003\005\000\063\237\127\070\027\266\151\064\005\045\101\233\021\002 PGP sig 23068 0 string \211\000\077\003\005\000\063\237\127\071\027\266\151\064\005\045\101\233\021\002 PGP sig [all …]
|