iv_len            302 ext/mcrypt/mcrypt.c 		&cipher, &cipher_len, &key, &key_len, &data, &data_len, &mode, &iv, &iv_len) == FAILURE) {	\
iv_len            538 ext/mcrypt/mcrypt.c 	size_t key_len, iv_len;
iv_len            545 ext/mcrypt/mcrypt.c 	if (zend_parse_parameters(ZEND_NUM_ARGS(), "rss", &mcryptind, &key, &key_len, &iv, &iv_len) == FAILURE) {
iv_len            574 ext/mcrypt/mcrypt.c 	if (iv_len != iv_size) {
iv_len            575 ext/mcrypt/mcrypt.c 		php_error_docref(NULL, E_WARNING, "Iv size incorrect; supplied length: %zd, needed: %d", iv_len, iv_size);
iv_len            576 ext/mcrypt/mcrypt.c 		if (iv_len > iv_size) {
iv_len            577 ext/mcrypt/mcrypt.c 			iv_len = iv_size;
iv_len            580 ext/mcrypt/mcrypt.c 	memcpy(iv_s, iv, iv_len);
iv_len           1246 ext/mcrypt/mcrypt.c static void php_mcrypt_do_crypt(char* cipher, const char *key, size_t key_len, const char *data, size_t data_len, char *mode, const char *iv, size_t iv_len, size_t dencrypt, zval* return_value) /* {{{ */
iv_len           1267 ext/mcrypt/mcrypt.c 	if (php_mcrypt_ensure_valid_iv(td, iv, (int)iv_len) == FAILURE) {
iv_len           1312 ext/mcrypt/mcrypt.c 	size_t cipher_len, key_len, data_len, mode_len, iv_len = 0;
iv_len           1315 ext/mcrypt/mcrypt.c 		&key, &key_len, &data, &data_len, &mode, &mode_len, &iv, &iv_len) == FAILURE) {
iv_len           1319 ext/mcrypt/mcrypt.c 	php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, mode, iv, iv_len, MCRYPT_ENCRYPT, return_value);
iv_len           1328 ext/mcrypt/mcrypt.c 	size_t cipher_len, key_len, data_len, mode_len, iv_len = 0;
iv_len           1331 ext/mcrypt/mcrypt.c 		&key, &key_len, &data, &data_len, &mode, &mode_len, &iv, &iv_len) == FAILURE) {
iv_len           1335 ext/mcrypt/mcrypt.c 	php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, mode, iv, iv_len, MCRYPT_DECRYPT, return_value);
iv_len            154 ext/mcrypt/mcrypt_filter.c 	int encrypt = 1, iv_len, key_len, keyl, result;
iv_len            215 ext/mcrypt/mcrypt_filter.c 	iv_len = mcrypt_enc_get_iv_size(mcrypt_module);
iv_len            228 ext/mcrypt/mcrypt_filter.c 	iv = emalloc(iv_len + 1);
iv_len            229 ext/mcrypt/mcrypt_filter.c 	if (iv_len <= Z_STRLEN_P(tmpzval)) {
iv_len            230 ext/mcrypt/mcrypt_filter.c 		memcpy(iv, Z_STRVAL_P(tmpzval), iv_len);
iv_len            233 ext/mcrypt/mcrypt_filter.c 		memset(iv + Z_STRLEN_P(tmpzval), 0, iv_len - Z_STRLEN_P(tmpzval));
iv_len           4900 ext/openssl/openssl.c 	int i, len1, len2, *eksl, nkeys, iv_len;
iv_len           4932 ext/openssl/openssl.c 	iv_len = EVP_CIPHER_iv_length(cipher);
iv_len           4933 ext/openssl/openssl.c 	if (!iv && iv_len > 0) {
iv_len           4996 ext/openssl/openssl.c 			iv_buf[iv_len] = '\0';
iv_len           4997 ext/openssl/openssl.c 			ZVAL_NEW_STR(iv, zend_string_init((char*)iv_buf, iv_len, 0));
iv_len           5036 ext/openssl/openssl.c 	size_t method_len = 0, iv_len = 0;
iv_len           5040 ext/openssl/openssl.c 				&ekey, &ekey_len, &privkey, &method, &method_len, &iv, &iv_len) == FAILURE) {
iv_len           5070 ext/openssl/openssl.c 		if (cipher_iv_len != iv_len) {
iv_len           5237 ext/openssl/openssl.c 	size_t data_len, method_len, password_len, iv_len = 0, max_iv_len;
iv_len           5245 ext/openssl/openssl.c 	if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss|ls", &data, &data_len, &method, &method_len, &password, &password_len, &options, &iv, &iv_len) == FAILURE) {
iv_len           5266 ext/openssl/openssl.c 	if (iv_len == 0 && max_iv_len > 0) {
iv_len           5269 ext/openssl/openssl.c 	free_iv = php_openssl_validate_iv(&iv, &iv_len, max_iv_len);
iv_len           5320 ext/openssl/openssl.c 	size_t data_len, method_len, password_len, iv_len = 0;
iv_len           5329 ext/openssl/openssl.c 	if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss|ls", &data, &data_len, &method, &method_len, &password, &password_len, &options, &iv, &iv_len) == FAILURE) {
iv_len           5365 ext/openssl/openssl.c 	free_iv = php_openssl_validate_iv(&iv, &iv_len, EVP_CIPHER_iv_length(cipher_type));