/PHP-7.4/ |
H A D | NEWS | 2671 . Fixed bug #77079 (odbc_fetch_object has incorrect type signature). 2764 . Fixed bug #75878 (RecursiveTreeIterator::setPostfix has wrong signature). 2776 signature for setcookie(), setrawcookie() and session_set_cookie_params().
|
H A D | php.ini-development | 375 ; (e.g. by adding its signature to the Web server header). It is no security
|
H A D | php.ini-production | 375 ; (e.g. by adding its signature to the Web server header). It is no security
|
H A D | UPGRADING | 122 . The signature of the ReflectionMethod::getClosure() method changed to 126 The new signature is also (LSP) compatible with older PHP versions. 518 signature of the certificate using a public key. A wrapper around the 538 function is expected to have this signature: "function handler(int $event)".
|
H A D | UPGRADING.INTERNALS | 71 f. A new, optional object handler with the signature
|
/PHP-7.4/ext/phar/ |
H A D | phar.c | 212 if (phar->signature) { in PHP_INI_END() 214 phar->signature = NULL; in PHP_INI_END() 494 if (signature) {\ 678 char *signature = NULL; in phar_parse_pharfile() local 993 if (signature) { in phar_parse_pharfile() 994 efree(signature); in phar_parse_pharfile() 1211 mydata->signature = signature; in phar_parse_pharfile() 1220 signature = NULL; in phar_parse_pharfile() 1227 signature = NULL; in phar_parse_pharfile() 2384 if (desc.signature[0] == 'P' && desc.signature[1] == 'K') { in phar_postprocess_file() [all …]
|
H A D | phar_object.c | 3106 if (phar_obj->archive->signature) { in PHP_METHOD() 3110 add_assoc_stringl(return_value, "hash", phar_obj->archive->signature, phar_obj->archive->sig_len); in PHP_METHOD()
|
H A D | zip.c | 331 if (mydata->signature) { \ in phar_parse_zipfile() 332 efree(mydata->signature); \ in phar_parse_zipfile() 353 if (mydata->signature) { \ in phar_parse_zipfile() 354 efree(mydata->signature); \ in phar_parse_zipfile() 376 if (memcmp("PK\1\2", zipentry.signature, 4)) { in phar_parse_zipfile() 851 memcpy(local.signature, "PK\3\4", 4); in phar_zip_changed_apply_int() 852 memcpy(central.signature, "PK\1\2", 4); in phar_zip_changed_apply_int() 1150 char *signature, sigbuf[8]; in phar_zip_applysignature() local 1196 efree(signature); in phar_zip_applysignature() 1205 efree(signature); in phar_zip_applysignature() [all …]
|
H A D | util.c | 1378 (*signature)[++pos] = '\0'; in phar_hex_str() 1776 if (phar->signature) { in phar_create_signature() 1777 efree(phar->signature); in phar_create_signature() 1778 phar->signature = NULL; in phar_create_signature() 1793 *signature = estrndup((char *) digest, 64); in phar_create_signature() 1808 *signature = estrndup((char *) digest, 32); in phar_create_signature() 1889 *signature = (char *) sigbuf; in phar_create_signature() 1906 *signature = estrndup((char *) digest, 20); in phar_create_signature() 1927 phar->sig_len = phar_hex_str((const char *)*signature, *signature_length, &phar->signature); in phar_create_signature() 2016 if (phar->signature) { in phar_copy_cached_phar() [all …]
|
H A D | tar.c | 323 …fp) - size - 512, myphar->sig_flags, buf + 8, size - 8, fname, &myphar->signature, &sig_len, error… in phar_parse_tarfile() 621 if (!myphar->is_data && PHAR_G(require_hash) && !myphar->signature) { in phar_parse_tarfile() 976 char *buf, *signature, *tmp, sigbuf[8]; in phar_tar_flush() local 1229 if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, error)) { in phar_tar_flush() 1263 …(entry.fp, sigbuf, 8) || signature_length != php_stream_write(entry.fp, signature, signature_lengt… in phar_tar_flush() 1264 efree(signature); in phar_tar_flush() 1276 efree(signature); in phar_tar_flush()
|
/PHP-7.4/ext/openssl/ |
H A D | openssl.c | 359 ZEND_ARG_INFO(1, signature) 366 ZEND_ARG_INFO(0, signature) 6027 zval *key, *signature; in PHP_FUNCTION() local 6039 …if (zend_parse_parameters(ZEND_NUM_ARGS(), "szz|z", &data, &data_len, &signature, &key, &method) =… in PHP_FUNCTION() 6074 ZEND_TRY_ASSIGN_REF_NEW_STR(signature, sigbuf); in PHP_FUNCTION() 6100 char * signature; in PHP_FUNCTION() local 6105 …if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssz|z", &data, &data_len, &signature, &signature_len, … in PHP_FUNCTION() 6109 PHP_OPENSSL_CHECK_SIZE_T_TO_UINT(signature_len, signature); in PHP_FUNCTION() 6137 …(err = EVP_VerifyFinal(md_ctx, (unsigned char *)signature, (unsigned int)signature_len, pkey)) < 0… in PHP_FUNCTION()
|
/PHP-7.4/ext/phar/tests/ |
H A D | bug73809.phpt | 14 $zip->addFromString('.phar/signature.bin', str_repeat('*', 64 * 1024 + 1)); 15 $zip->setCompressionName('.phar/signature.bin', ZipArchive::CM_STORE);
|
H A D | test_signaturealgos.phpt | 2 Phar: verify signature parsing works
|
H A D | phar_oo_nosig.phpt | 2 Phar::getSignature() no signature
|
H A D | badparameters.phpt | 178 Cannot set signature algorithm, phar is read-only
|
/PHP-7.4/ext/sodium/ |
H A D | libsodium.c | 96 ZEND_ARG_INFO(0, signature) 1667 zend_string *signature; in PHP_FUNCTION() local 1686 signature = zend_string_alloc((size_t) crypto_sign_BYTES, 0); in PHP_FUNCTION() 1687 memset(ZSTR_VAL(signature), 0, (size_t) crypto_sign_BYTES); in PHP_FUNCTION() 1691 zend_string_efree(signature); in PHP_FUNCTION() 1696 zend_string_efree(signature); in PHP_FUNCTION() 1701 ZSTR_VAL(signature)[signature_real_len] = 0; in PHP_FUNCTION() local 1703 RETURN_NEW_STR(signature); in PHP_FUNCTION() 1710 unsigned char *signature; in PHP_FUNCTION() local 1716 &signature, &signature_len, in PHP_FUNCTION() [all …]
|
/PHP-7.4/docs/ |
H A D | release-process.md | 245 11. Commit and push all the tarballs and signature files to 333 9. Please note down the sha256 and the PGP signature (.asc). These *must* be
|
/PHP-7.4/ext/ffi/tests/ |
H A D | bug78270_2.phpt | 31 $signature = "__vectorcall void foobar($arglist);"; 33 $ffi = FFI::cdef($signature);
|
/PHP-7.4/ext/imap/ |
H A D | config.m4 | 131 AC_CACHE_CHECK(for utf8_mime2text signature, ac_cv_utf8_mime2text, 145 AC_DEFINE(HAVE_NEW_MIME2TEXT, 1, [Whether utf8_mime2text() has new signature]) 165 …AC_MSG_ERROR([utf8_mime2text() has new signature, but U8T_CANONICAL is missing. This should not ha… 168 …AC_MSG_ERROR([utf8_mime2text() has old signature, but U8T_CANONICAL is present. This should not ha…
|
/PHP-7.4/ext/phar/tests/zip/ |
H A D | corrupt_004.phpt | 15 phar error: corrupted central directory entry, no magic signature in zip-based phar "%scdir_offset.…
|
H A D | corrupt_007.phpt | 15 phar error: corrupted central directory entry, no magic signature in zip-based phar "%struncfilenam…
|
/PHP-7.4/ext/phar/tests/tar/ |
H A D | require_hash.phpt | 2 Phar: tar-based phar, require_hash=1, no signature 48 tar-based phar "%srequire_hash.phar.tar" does not have a signature
|
/PHP-7.4/ext/openssl/tests/ |
H A D | bug38255.phpt | 10 $signature = ''; 11 $ok = openssl_verify("foo", $signature, $pub_key_id, OPENSSL_ALGO_MD5); 21 var_dump(openssl_verify("foo", $signature, $pub_key_id, OPENSSL_ALGO_MD5));
|
H A D | openssl_x509_fingerprint_basic.phpt | 50 Warning: openssl_x509_fingerprint(): Unknown signature algorithm in %s on line %d
|
/PHP-7.4/ext/gd/tests/ |
H A D | imagegd_truecolor.phpt | 22 printf("signature: %d\n", $header['signature']); 30 signature: 65534
|