signature         339 ext/openssl/openssl.c 	ZEND_ARG_INFO(1, signature)
signature         346 ext/openssl/openssl.c 	ZEND_ARG_INFO(0, signature)
signature        4734 ext/openssl/openssl.c 	zval **key, *signature;
signature        4746 ext/openssl/openssl.c 	if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "szZ|z", &data, &data_len, &signature, &key, &method) == FAILURE) {
signature        4777 ext/openssl/openssl.c 		zval_dtor(signature);
signature        4779 ext/openssl/openssl.c 		ZVAL_STRINGL(signature, (char *)sigbuf, siglen, 0);
signature        4803 ext/openssl/openssl.c 	char * signature;	int signature_len;
signature        4807 ext/openssl/openssl.c 	if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ssZ|z", &data, &data_len, &signature, &signature_len, &key, &method) == FAILURE) {
signature        4835 ext/openssl/openssl.c 	err = EVP_VerifyFinal (&md_ctx, (unsigned char *)signature, signature_len, pkey);
signature         219 ext/phar/phar.c 	if (phar->signature) {
signature         220 ext/phar/phar.c 		pefree(phar->signature, phar->is_persistent);
signature         221 ext/phar/phar.c 		phar->signature = NULL;
signature         495 ext/phar/phar.c 	if (signature) {\
signature         496 ext/phar/phar.c 		pefree(signature, PHAR_G(persist));\
signature         660 ext/phar/phar.c 	char *signature = NULL;
signature         812 ext/phar/phar.c 				if (FAILURE == phar_verify_signature(fp, end_of_phar, PHAR_SIG_OPENSSL, sig, signature_len, fname, &signature, &sig_len, error TSRMLS_CC)) {
signature         842 ext/phar/phar.c 				if (FAILURE == phar_verify_signature(fp, read_len, PHAR_SIG_SHA512, (char *)digest, 64, fname, &signature, &sig_len, error TSRMLS_CC)) {
signature         869 ext/phar/phar.c 				if (FAILURE == phar_verify_signature(fp, read_len, PHAR_SIG_SHA256, (char *)digest, 32, fname, &signature, &sig_len, error TSRMLS_CC)) {
signature         907 ext/phar/phar.c 				if (FAILURE == phar_verify_signature(fp, read_len, PHAR_SIG_SHA1, (char *)digest, 20, fname, &signature, &sig_len, error TSRMLS_CC)) {
signature         934 ext/phar/phar.c 				if (FAILURE == phar_verify_signature(fp, read_len, PHAR_SIG_MD5, (char *)digest, 16, fname, &signature, &sig_len, error TSRMLS_CC)) {
signature         987 ext/phar/phar.c 			if (signature) {
signature         988 ext/phar/phar.c 				efree(signature);
signature        1199 ext/phar/phar.c 	mydata->signature = signature;
signature        1208 ext/phar/phar.c 			signature = NULL;
signature        1215 ext/phar/phar.c 				signature = NULL;
signature        2427 ext/phar/phar.c 			if (desc.signature[0] == 'P' && desc.signature[1] == 'K') {
signature        3151 ext/phar/phar.c 		if (phar->signature) {
signature        3152 ext/phar/phar.c 			efree(phar->signature);
signature        3153 ext/phar/phar.c 			phar->signature = NULL;
signature         315 ext/phar/phar_internal.h 	char                     *signature;
signature         567 ext/phar/phar_internal.h int phar_verify_signature(php_stream *fp, size_t end_of_phar, php_uint32 sig_type, char *sig, int sig_len, char *fname, char **signature, int *signature_len, char **error TSRMLS_DC);
signature         568 ext/phar/phar_internal.h int phar_create_signature(phar_archive_data *phar, php_stream *fp, char **signature, int *signature_length, char **error TSRMLS_DC);
signature        3093 ext/phar/phar_object.c 	if (phar_obj->arc.archive->signature) {
signature        3098 ext/phar/phar_object.c 		add_assoc_stringl(return_value, "hash", phar_obj->arc.archive->signature, phar_obj->arc.archive->sig_len, 1);
signature          23 ext/phar/pharzip.h 	char signature[4];       /* local file header signature     4 bytes  (0x04034b50) */
signature          40 ext/phar/pharzip.h 	char signature[4];  /* signature (optional)            4 bytes */
signature          56 ext/phar/pharzip.h 	char signature[4];   /* archive extra data signature    4 bytes  (0x08064b50) */
signature         152 ext/phar/pharzip.h 	char signature[4];            /* central file header signature   4 bytes  (0x02014b50) */
signature         176 ext/phar/pharzip.h 	char signature[4];  /* header signature                4 bytes  (0x05054b50) */
signature         182 ext/phar/pharzip.h 	char signature[4];        /* zip64 end of central dir 
signature         209 ext/phar/pharzip.h 	char signature[4];     /* zip64 end of central dir locator 
signature         221 ext/phar/pharzip.h 	char signature[4];           /* end of central dir signature    4 bytes  (0x06054b50) */
signature         305 ext/phar/tar.c 			if (FAILURE == phar_verify_signature(fp, php_stream_tell(fp) - size - 512, myphar->sig_flags, buf + 8, size - 8, fname, &myphar->signature, &myphar->sig_len, error TSRMLS_CC)) {
signature         604 ext/phar/tar.c 	if (!myphar->is_data && PHAR_G(require_hash) && !myphar->signature) {
signature         952 ext/phar/tar.c 	char *buf, *signature, *tmp, sigbuf[8];
signature        1196 ext/phar/tar.c 		if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, error TSRMLS_CC)) {
signature        1230 ext/phar/tar.c 		if (8 != (int)php_stream_write(entry.fp, sigbuf, 8) || signature_length != (int)php_stream_write(entry.fp, signature, signature_length)) {
signature        1231 ext/phar/tar.c 			efree(signature);
signature        1243 ext/phar/tar.c 		efree(signature);
signature          41 ext/phar/util.c static int phar_call_openssl_signverify(int is_sign, php_stream *fp, off_t end, char *key, int key_len, char **signature, int *signature_len TSRMLS_DC);
signature        1390 ext/phar/util.c static int phar_hex_str(const char *digest, size_t digest_len, char **signature TSRMLS_DC) /* {{{ */
signature        1395 ext/phar/util.c 	*signature = (char*)safe_pemalloc(digest_len, 2, 1, PHAR_G(persist));
signature        1398 ext/phar/util.c 		(*signature)[++pos] = hexChars[((const unsigned char *)digest)[len] >> 4];
signature        1399 ext/phar/util.c 		(*signature)[++pos] = hexChars[((const unsigned char *)digest)[len] & 0x0F];
signature        1401 ext/phar/util.c 	(*signature)[++pos] = '\0';
signature        1407 ext/phar/util.c static int phar_call_openssl_signverify(int is_sign, php_stream *fp, off_t end, char *key, int key_len, char **signature, int *signature_len TSRMLS_DC) /* {{{ */
signature        1417 ext/phar/util.c 	ZVAL_STRINGL(zsig, *signature, *signature_len, 1);
signature        1506 ext/phar/util.c 				*signature = estrndup(Z_STRVAL_P(zsig), Z_STRLEN_P(zsig));
signature        1520 ext/phar/util.c int phar_verify_signature(php_stream *fp, size_t end_of_phar, php_uint32 sig_type, char *sig, int sig_len, char *fname, char **signature, int *signature_len, char **error TSRMLS_DC) /* {{{ */
signature        1645 ext/phar/util.c 			*signature_len = phar_hex_str((const char*)sig, sig_len, signature TSRMLS_CC);
signature        1679 ext/phar/util.c 			*signature_len = phar_hex_str((const char*)digest, sizeof(digest), signature TSRMLS_CC);
signature        1712 ext/phar/util.c 			*signature_len = phar_hex_str((const char*)digest, sizeof(digest), signature TSRMLS_CC);
signature        1753 ext/phar/util.c 			*signature_len = phar_hex_str((const char*)digest, sizeof(digest), signature TSRMLS_CC);
signature        1786 ext/phar/util.c 			*signature_len = phar_hex_str((const char*)digest, sizeof(digest), signature TSRMLS_CC);
signature        1799 ext/phar/util.c int phar_create_signature(phar_archive_data *phar, php_stream *fp, char **signature, int *signature_length, char **error TSRMLS_DC) /* {{{ */
signature        1806 ext/phar/util.c 	if (phar->signature) {
signature        1807 ext/phar/util.c 		efree(phar->signature);
signature        1808 ext/phar/util.c 		phar->signature = NULL;
signature        1824 ext/phar/util.c 			*signature = estrndup((char *) digest, 64);
signature        1839 ext/phar/util.c 			*signature = estrndup((char *) digest, 32);
signature        1924 ext/phar/util.c 			*signature = (char *) sigbuf;
signature        1941 ext/phar/util.c 			*signature = estrndup((char *) digest, 20);
signature        1956 ext/phar/util.c 			*signature = estrndup((char *) digest, 16);
signature        1962 ext/phar/util.c 	phar->sig_len = phar_hex_str((const char *)*signature, *signature_length, &phar->signature TSRMLS_CC);
signature        2039 ext/phar/util.c 	if (phar->signature) {
signature        2040 ext/phar/util.c 		phar->signature = estrdup(phar->signature);
signature         313 ext/phar/zip.c 			if (mydata->signature) { \
signature         314 ext/phar/zip.c 				efree(mydata->signature); \
signature         337 ext/phar/zip.c 			if (mydata->signature) { \
signature         338 ext/phar/zip.c 				efree(mydata->signature); \
signature         360 ext/phar/zip.c 		if (memcmp("PK\1\2", zipentry.signature, 4)) {
signature         439 ext/phar/zip.c 			if (FAILURE == phar_verify_signature(sigfile, php_stream_tell(sigfile), mydata->sig_flags, sig + 8, entry.uncompressed_filesize - 8, fname, &mydata->signature, &mydata->sig_len, error TSRMLS_CC)) {
signature         796 ext/phar/zip.c 	strncpy(local.signature, "PK\3\4", 4);
signature         797 ext/phar/zip.c 	strncpy(central.signature, "PK\1\2", 4);
signature        1085 ext/phar/zip.c 		char *signature, sigbuf[8];
signature        1106 ext/phar/zip.c 		if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, pass->error TSRMLS_CC)) {
signature        1130 ext/phar/zip.c 		if (8 != (int)php_stream_write(entry.fp, sigbuf, 8) || signature_length != (int)php_stream_write(entry.fp, signature, signature_length)) {
signature        1131 ext/phar/zip.c 			efree(signature);
signature        1140 ext/phar/zip.c 		efree(signature);
signature        1386 ext/phar/zip.c 	strncpy(eocd.signature, "PK\5\6", 4);