iv_len 302 ext/mcrypt/mcrypt.c &cipher, &cipher_len, &key, &key_len, &data, &data_len, &mode, &iv, &iv_len) == FAILURE) { \ iv_len 538 ext/mcrypt/mcrypt.c size_t key_len, iv_len; iv_len 545 ext/mcrypt/mcrypt.c if (zend_parse_parameters(ZEND_NUM_ARGS(), "rss", &mcryptind, &key, &key_len, &iv, &iv_len) == FAILURE) { iv_len 574 ext/mcrypt/mcrypt.c if (iv_len != iv_size) { iv_len 575 ext/mcrypt/mcrypt.c php_error_docref(NULL, E_WARNING, "Iv size incorrect; supplied length: %zd, needed: %d", iv_len, iv_size); iv_len 576 ext/mcrypt/mcrypt.c if (iv_len > iv_size) { iv_len 577 ext/mcrypt/mcrypt.c iv_len = iv_size; iv_len 580 ext/mcrypt/mcrypt.c memcpy(iv_s, iv, iv_len); iv_len 1246 ext/mcrypt/mcrypt.c static void php_mcrypt_do_crypt(char* cipher, const char *key, size_t key_len, const char *data, size_t data_len, char *mode, const char *iv, size_t iv_len, size_t dencrypt, zval* return_value) /* {{{ */ iv_len 1267 ext/mcrypt/mcrypt.c if (php_mcrypt_ensure_valid_iv(td, iv, (int)iv_len) == FAILURE) { iv_len 1312 ext/mcrypt/mcrypt.c size_t cipher_len, key_len, data_len, mode_len, iv_len = 0; iv_len 1315 ext/mcrypt/mcrypt.c &key, &key_len, &data, &data_len, &mode, &mode_len, &iv, &iv_len) == FAILURE) { iv_len 1319 ext/mcrypt/mcrypt.c php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, mode, iv, iv_len, MCRYPT_ENCRYPT, return_value); iv_len 1328 ext/mcrypt/mcrypt.c size_t cipher_len, key_len, data_len, mode_len, iv_len = 0; iv_len 1331 ext/mcrypt/mcrypt.c &key, &key_len, &data, &data_len, &mode, &mode_len, &iv, &iv_len) == FAILURE) { iv_len 1335 ext/mcrypt/mcrypt.c php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, mode, iv, iv_len, MCRYPT_DECRYPT, return_value); iv_len 154 ext/mcrypt/mcrypt_filter.c int encrypt = 1, iv_len, key_len, keyl, result; iv_len 215 ext/mcrypt/mcrypt_filter.c iv_len = mcrypt_enc_get_iv_size(mcrypt_module); iv_len 228 ext/mcrypt/mcrypt_filter.c iv = emalloc(iv_len + 1); iv_len 229 ext/mcrypt/mcrypt_filter.c if (iv_len <= Z_STRLEN_P(tmpzval)) { iv_len 230 ext/mcrypt/mcrypt_filter.c memcpy(iv, Z_STRVAL_P(tmpzval), iv_len); iv_len 233 ext/mcrypt/mcrypt_filter.c memset(iv + Z_STRLEN_P(tmpzval), 0, iv_len - Z_STRLEN_P(tmpzval)); iv_len 4900 ext/openssl/openssl.c int i, len1, len2, *eksl, nkeys, iv_len; iv_len 4932 ext/openssl/openssl.c iv_len = EVP_CIPHER_iv_length(cipher); iv_len 4933 ext/openssl/openssl.c if (!iv && iv_len > 0) { iv_len 4996 ext/openssl/openssl.c iv_buf[iv_len] = '\0'; iv_len 4997 ext/openssl/openssl.c ZVAL_NEW_STR(iv, zend_string_init((char*)iv_buf, iv_len, 0)); iv_len 5036 ext/openssl/openssl.c size_t method_len = 0, iv_len = 0; iv_len 5040 ext/openssl/openssl.c &ekey, &ekey_len, &privkey, &method, &method_len, &iv, &iv_len) == FAILURE) { iv_len 5070 ext/openssl/openssl.c if (cipher_iv_len != iv_len) { iv_len 5237 ext/openssl/openssl.c size_t data_len, method_len, password_len, iv_len = 0, max_iv_len; iv_len 5245 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss|ls", &data, &data_len, &method, &method_len, &password, &password_len, &options, &iv, &iv_len) == FAILURE) { iv_len 5266 ext/openssl/openssl.c if (iv_len == 0 && max_iv_len > 0) { iv_len 5269 ext/openssl/openssl.c free_iv = php_openssl_validate_iv(&iv, &iv_len, max_iv_len); iv_len 5320 ext/openssl/openssl.c size_t data_len, method_len, password_len, iv_len = 0; iv_len 5329 ext/openssl/openssl.c if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss|ls", &data, &data_len, &method, &method_len, &password, &password_len, &options, &iv, &iv_len) == FAILURE) { iv_len 5365 ext/openssl/openssl.c free_iv = php_openssl_validate_iv(&iv, &iv_len, EVP_CIPHER_iv_length(cipher_type));