iv_len 336 ext/mcrypt/mcrypt.c &cipher, &cipher_len, &key, &key_len, &data, &data_len, &mode, &iv, &iv_len) == FAILURE) { \ iv_len 566 ext/mcrypt/mcrypt.c int key_len, iv_len; iv_len 573 ext/mcrypt/mcrypt.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rss", &mcryptind, &key, &key_len, &iv, &iv_len) == FAILURE) { iv_len 600 ext/mcrypt/mcrypt.c if (iv_len != iv_size) { iv_len 601 ext/mcrypt/mcrypt.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Iv size incorrect; supplied length: %d, needed: %d", iv_len, iv_size); iv_len 602 ext/mcrypt/mcrypt.c if (iv_len > iv_size) { iv_len 603 ext/mcrypt/mcrypt.c iv_len = iv_size; iv_len 606 ext/mcrypt/mcrypt.c memcpy(iv_s, iv, iv_len); iv_len 1265 ext/mcrypt/mcrypt.c static void php_mcrypt_do_crypt(char* cipher, const char *key, int key_len, const char *data, int data_len, char *mode, const char *iv, int iv_len, int dencrypt, zval* return_value TSRMLS_DC) /* {{{ */ iv_len 1286 ext/mcrypt/mcrypt.c if (php_mcrypt_ensure_valid_iv(td, iv, iv_len TSRMLS_CC) == FAILURE) { iv_len 1329 ext/mcrypt/mcrypt.c int cipher_len, key_len, data_len, mode_len, iv_len = 0; iv_len 1332 ext/mcrypt/mcrypt.c &key, &key_len, &data, &data_len, &mode, &mode_len, &iv, &iv_len) == FAILURE) { iv_len 1336 ext/mcrypt/mcrypt.c php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, mode, iv, iv_len, MCRYPT_ENCRYPT, return_value TSRMLS_CC); iv_len 1345 ext/mcrypt/mcrypt.c int cipher_len, key_len, data_len, mode_len, iv_len = 0; iv_len 1348 ext/mcrypt/mcrypt.c &key, &key_len, &data, &data_len, &mode, &mode_len, &iv, &iv_len) == FAILURE) { iv_len 1352 ext/mcrypt/mcrypt.c php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, mode, iv, iv_len, MCRYPT_DECRYPT, return_value TSRMLS_CC); iv_len 1362 ext/mcrypt/mcrypt.c int cipher_len, key_len, data_len, iv_len = 0; iv_len 1368 ext/mcrypt/mcrypt.c php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "ecb", iv, iv_len, Z_LVAL_PP(mode), return_value TSRMLS_CC); iv_len 1378 ext/mcrypt/mcrypt.c int cipher_len, key_len, data_len, iv_len = 0; iv_len 1384 ext/mcrypt/mcrypt.c php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "cbc", iv, iv_len, Z_LVAL_PP(mode), return_value TSRMLS_CC); iv_len 1394 ext/mcrypt/mcrypt.c int cipher_len, key_len, data_len, iv_len = 0; iv_len 1400 ext/mcrypt/mcrypt.c php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "cfb", iv, iv_len, Z_LVAL_PP(mode), return_value TSRMLS_CC); iv_len 1410 ext/mcrypt/mcrypt.c int cipher_len, key_len, data_len, iv_len = 0; iv_len 1416 ext/mcrypt/mcrypt.c php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "ofb", iv, iv_len, Z_LVAL_PP(mode), return_value TSRMLS_CC); iv_len 154 ext/mcrypt/mcrypt_filter.c int encrypt = 1, iv_len, key_len, keyl, result; iv_len 215 ext/mcrypt/mcrypt_filter.c iv_len = mcrypt_enc_get_iv_size(mcrypt_module); iv_len 228 ext/mcrypt/mcrypt_filter.c iv = emalloc(iv_len + 1); iv_len 229 ext/mcrypt/mcrypt_filter.c if (iv_len <= Z_STRLEN_PP(tmpzval)) { iv_len 230 ext/mcrypt/mcrypt_filter.c memcpy(iv, Z_STRVAL_PP(tmpzval), iv_len); iv_len 233 ext/mcrypt/mcrypt_filter.c memset(iv + Z_STRLEN_PP(tmpzval), 0, iv_len - Z_STRLEN_PP(tmpzval)); iv_len 5171 ext/openssl/openssl.c int data_len, method_len, password_len, iv_len = 0, max_iv_len; iv_len 5178 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss|ls", &data, &data_len, &method, &method_len, &password, &password_len, &options, &iv, &iv_len) == FAILURE) { iv_len 5197 ext/openssl/openssl.c if (iv_len <= 0 && max_iv_len > 0) { iv_len 5200 ext/openssl/openssl.c free_iv = php_openssl_validate_iv(&iv, &iv_len, max_iv_len TSRMLS_CC); iv_len 5250 ext/openssl/openssl.c int data_len, method_len, password_len, iv_len = 0; iv_len 5259 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss|ls", &data, &data_len, &method, &method_len, &password, &password_len, &options, &iv, &iv_len) == FAILURE) { iv_len 5293 ext/openssl/openssl.c free_iv = php_openssl_validate_iv(&iv, &iv_len, EVP_CIPHER_iv_length(cipher_type) TSRMLS_CC);