diff options
Diffstat (limited to 'ext/mcrypt')
-rw-r--r-- | ext/mcrypt/mcrypt.c | 118 | ||||
-rw-r--r-- | ext/mcrypt/mcrypt_filter.c | 42 |
2 files changed, 80 insertions, 80 deletions
diff --git a/ext/mcrypt/mcrypt.c b/ext/mcrypt/mcrypt.c index d33cdd5972..7b5823ec41 100644 --- a/ext/mcrypt/mcrypt.c +++ b/ext/mcrypt/mcrypt.c @@ -330,7 +330,7 @@ typedef enum { */ #define MCRYPT_GET_CRYPT_ARGS \ - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sssz|s", \ + if (zend_parse_parameters(ZEND_NUM_ARGS(), "sssz|s", \ &cipher, &cipher_len, &key, &key_len, &data, &data_len, &mode, &iv, &iv_len) == FAILURE) { \ return; \ } @@ -338,7 +338,7 @@ typedef enum { #define MCRYPT_GET_TD_ARG \ zval *mcryptind; \ php_mcrypt *pm; \ - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "r", &mcryptind) == FAILURE) { \ + if (zend_parse_parameters(ZEND_NUM_ARGS(), "r", &mcryptind) == FAILURE) { \ return; \ } \ ZEND_FETCH_RESOURCE (pm, php_mcrypt *, mcryptind, -1, "MCrypt", le_mcrypt); @@ -348,7 +348,7 @@ typedef enum { size_t dir_len; \ char *module; \ size_t module_len; \ - if (zend_parse_parameters (ZEND_NUM_ARGS() TSRMLS_CC, \ + if (zend_parse_parameters (ZEND_NUM_ARGS(), \ "s|s", &module, &module_len, &dir, &dir_len) == FAILURE) { \ return; \ } @@ -360,7 +360,7 @@ typedef enum { #define PHP_MCRYPT_INIT_CHECK \ if (!pm->init) { \ - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Operation disallowed prior to mcrypt_generic_init()."); \ + php_error_docref(NULL, E_WARNING, "Operation disallowed prior to mcrypt_generic_init()."); \ RETURN_FALSE; \ } \ @@ -369,7 +369,7 @@ PHP_INI_BEGIN() STD_PHP_INI_ENTRY("mcrypt.modes_dir", NULL, PHP_INI_ALL, OnUpdateString, modes_dir, zend_mcrypt_globals, mcrypt_globals) PHP_INI_END() -static void php_mcrypt_module_dtor(zend_resource *rsrc TSRMLS_DC) /* {{{ */ +static void php_mcrypt_module_dtor(zend_resource *rsrc) /* {{{ */ { php_mcrypt *pm = (php_mcrypt *) rsrc->ptr; if (pm) { @@ -435,8 +435,8 @@ static PHP_MINIT_FUNCTION(mcrypt) /* {{{ */ MCRYPT_ENTRY2_2_4(MODE_STREAM, "stream"); REGISTER_INI_ENTRIES(); - php_stream_filter_register_factory("mcrypt.*", &php_mcrypt_filter_factory TSRMLS_CC); - php_stream_filter_register_factory("mdecrypt.*", &php_mcrypt_filter_factory TSRMLS_CC); + php_stream_filter_register_factory("mcrypt.*", &php_mcrypt_filter_factory); + php_stream_filter_register_factory("mdecrypt.*", &php_mcrypt_filter_factory); return SUCCESS; } @@ -444,8 +444,8 @@ static PHP_MINIT_FUNCTION(mcrypt) /* {{{ */ static PHP_MSHUTDOWN_FUNCTION(mcrypt) /* {{{ */ { - php_stream_filter_unregister_factory("mcrypt.*" TSRMLS_CC); - php_stream_filter_unregister_factory("mdecrypt.*" TSRMLS_CC); + php_stream_filter_unregister_factory("mcrypt.*"); + php_stream_filter_unregister_factory("mdecrypt.*"); UNREGISTER_INI_ENTRIES(); return SUCCESS; @@ -513,7 +513,7 @@ PHP_FUNCTION(mcrypt_module_open) MCRYPT td; php_mcrypt *pm; - if (zend_parse_parameters (ZEND_NUM_ARGS() TSRMLS_CC, "ssss", + if (zend_parse_parameters (ZEND_NUM_ARGS(), "ssss", &cipher, &cipher_len, &cipher_dir, &cipher_dir_len, &mode, &mode_len, &mode_dir, &mode_dir_len)) { return; @@ -527,7 +527,7 @@ PHP_FUNCTION(mcrypt_module_open) ); if (td == MCRYPT_FAILED) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Could not open encryption module"); + php_error_docref(NULL, E_WARNING, "Could not open encryption module"); RETURN_FALSE; } else { pm = emalloc(sizeof(php_mcrypt)); @@ -550,7 +550,7 @@ PHP_FUNCTION(mcrypt_generic_init) php_mcrypt *pm; int result = 0; - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rss", &mcryptind, &key, &key_len, &iv, &iv_len) == FAILURE) { + if (zend_parse_parameters(ZEND_NUM_ARGS(), "rss", &mcryptind, &key, &key_len, &iv, &iv_len) == FAILURE) { return; } @@ -560,7 +560,7 @@ PHP_FUNCTION(mcrypt_generic_init) iv_size = mcrypt_enc_get_iv_size(pm->td); if (key_len == 0) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Key size is 0"); + php_error_docref(NULL, E_WARNING, "Key size is 0"); } key_s = emalloc(key_len); @@ -570,7 +570,7 @@ PHP_FUNCTION(mcrypt_generic_init) memset(iv_s, 0, iv_size + 1); if (key_len > max_key_size) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Key size too large; supplied length: %d, max: %d", key_len, max_key_size); + php_error_docref(NULL, E_WARNING, "Key size too large; supplied length: %d, max: %d", key_len, max_key_size); key_size = max_key_size; } else { key_size = (int)key_len; @@ -578,7 +578,7 @@ PHP_FUNCTION(mcrypt_generic_init) memcpy(key_s, key, key_len); if (iv_len != iv_size) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Iv size incorrect; supplied length: %d, needed: %d", iv_len, iv_size); + php_error_docref(NULL, E_WARNING, "Iv size incorrect; supplied length: %d, needed: %d", iv_len, iv_size); if (iv_len > iv_size) { iv_len = iv_size; } @@ -594,14 +594,14 @@ PHP_FUNCTION(mcrypt_generic_init) zend_list_close(Z_RES_P(mcryptind)); switch (result) { case -3: - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Key length incorrect"); + php_error_docref(NULL, E_WARNING, "Key length incorrect"); break; case -4: - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Memory allocation error"); + php_error_docref(NULL, E_WARNING, "Memory allocation error"); break; case -1: default: - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Unknown error"); + php_error_docref(NULL, E_WARNING, "Unknown error"); break; } } else { @@ -625,7 +625,7 @@ PHP_FUNCTION(mcrypt_generic) char* data_s; int block_size, data_size; - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rs", &mcryptind, &data, &data_len) == FAILURE) { + if (zend_parse_parameters(ZEND_NUM_ARGS(), "rs", &mcryptind, &data, &data_len) == FAILURE) { return; } @@ -633,7 +633,7 @@ PHP_FUNCTION(mcrypt_generic) PHP_MCRYPT_INIT_CHECK if (data_len == 0) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "An empty string was passed"); + php_error_docref(NULL, E_WARNING, "An empty string was passed"); RETURN_FALSE } @@ -670,7 +670,7 @@ PHP_FUNCTION(mdecrypt_generic) char* data_s; int block_size, data_size; - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rs", &mcryptind, &data, &data_len) == FAILURE) { + if (zend_parse_parameters(ZEND_NUM_ARGS(), "rs", &mcryptind, &data, &data_len) == FAILURE) { return; } @@ -678,7 +678,7 @@ PHP_FUNCTION(mdecrypt_generic) PHP_MCRYPT_INIT_CHECK if (data_len == 0) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "An empty string was passed"); + php_error_docref(NULL, E_WARNING, "An empty string was passed"); RETURN_FALSE } @@ -749,7 +749,7 @@ PHP_FUNCTION(mcrypt_generic_deinit) MCRYPT_GET_TD_ARG if (mcrypt_generic_deinit(pm->td) < 0) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Could not terminate encryption specifier"); + php_error_docref(NULL, E_WARNING, "Could not terminate encryption specifier"); RETURN_FALSE } pm->init = 0; @@ -956,7 +956,7 @@ PHP_FUNCTION(mcrypt_list_algorithms) size_t lib_dir_len; int i, count; - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "|s", + if (zend_parse_parameters(ZEND_NUM_ARGS(), "|s", &lib_dir, &lib_dir_len) == FAILURE) { return; } @@ -965,7 +965,7 @@ PHP_FUNCTION(mcrypt_list_algorithms) modules = mcrypt_list_algorithms(lib_dir, &count); if (count == 0) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "No algorithms found in module dir"); + php_error_docref(NULL, E_WARNING, "No algorithms found in module dir"); } for (i = 0; i < count; i++) { add_index_string(return_value, i, modules[i]); @@ -983,7 +983,7 @@ PHP_FUNCTION(mcrypt_list_modes) size_t lib_dir_len; int i, count; - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "|s", + if (zend_parse_parameters(ZEND_NUM_ARGS(), "|s", &lib_dir, &lib_dir_len) == FAILURE) { return; } @@ -992,7 +992,7 @@ PHP_FUNCTION(mcrypt_list_modes) modules = mcrypt_list_modes(lib_dir, &count); if (count == 0) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "No modes found in module dir"); + php_error_docref(NULL, E_WARNING, "No modes found in module dir"); } for (i = 0; i < count; i++) { add_index_string(return_value, i, modules[i]); @@ -1014,7 +1014,7 @@ PHP_FUNCTION(mcrypt_get_key_size) MCRYPT_GET_INI - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", + if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss", &cipher, &cipher_len, &module, &module_len) == FAILURE) { return; } @@ -1024,7 +1024,7 @@ PHP_FUNCTION(mcrypt_get_key_size) RETVAL_LONG(mcrypt_enc_get_key_size(td)); mcrypt_module_close(td); } else { - php_error_docref(NULL TSRMLS_CC, E_WARNING, MCRYPT_OPEN_MODULE_FAILED); + php_error_docref(NULL, E_WARNING, MCRYPT_OPEN_MODULE_FAILED); RETURN_FALSE; } } @@ -1043,7 +1043,7 @@ PHP_FUNCTION(mcrypt_get_block_size) MCRYPT_GET_INI - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", + if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss", &cipher, &cipher_len, &module, &module_len) == FAILURE) { return; } @@ -1053,7 +1053,7 @@ PHP_FUNCTION(mcrypt_get_block_size) RETVAL_LONG(mcrypt_enc_get_block_size(td)); mcrypt_module_close(td); } else { - php_error_docref(NULL TSRMLS_CC, E_WARNING, MCRYPT_OPEN_MODULE_FAILED); + php_error_docref(NULL, E_WARNING, MCRYPT_OPEN_MODULE_FAILED); RETURN_FALSE; } } @@ -1072,7 +1072,7 @@ PHP_FUNCTION(mcrypt_get_iv_size) MCRYPT_GET_INI - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", + if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss", &cipher, &cipher_len, &module, &module_len) == FAILURE) { return; } @@ -1082,7 +1082,7 @@ PHP_FUNCTION(mcrypt_get_iv_size) RETVAL_LONG(mcrypt_enc_get_iv_size(td)); mcrypt_module_close(td); } else { - php_error_docref(NULL TSRMLS_CC, E_WARNING, MCRYPT_OPEN_MODULE_FAILED); + php_error_docref(NULL, E_WARNING, MCRYPT_OPEN_MODULE_FAILED); RETURN_FALSE; } } @@ -1101,7 +1101,7 @@ PHP_FUNCTION(mcrypt_get_cipher_name) MCRYPT_GET_INI - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", + if (zend_parse_parameters(ZEND_NUM_ARGS(), "s", &cipher, &cipher_len) == FAILURE) { return; } @@ -1122,7 +1122,7 @@ PHP_FUNCTION(mcrypt_get_cipher_name) RETVAL_STRING(cipher_name); mcrypt_free(cipher_name); } else { - php_error_docref(NULL TSRMLS_CC, E_WARNING, MCRYPT_OPEN_MODULE_FAILED); + php_error_docref(NULL, E_WARNING, MCRYPT_OPEN_MODULE_FAILED); RETURN_FALSE; } } @@ -1190,7 +1190,7 @@ static zend_bool php_mcrypt_is_valid_key_size( } /* }}} */ -static int php_mcrypt_ensure_valid_key_size(MCRYPT td, int key_size TSRMLS_DC) /* {{{ */ +static int php_mcrypt_ensure_valid_key_size(MCRYPT td, int key_size) /* {{{ */ { int key_size_count; int max_key_size = mcrypt_enc_get_key_size(td); @@ -1203,7 +1203,7 @@ static int php_mcrypt_ensure_valid_key_size(MCRYPT td, int key_size TSRMLS_DC) / char *key_size_str = php_mcrypt_get_key_size_str( max_key_size, key_sizes, key_size_count ); - php_error_docref(NULL TSRMLS_CC, E_WARNING, + php_error_docref(NULL, E_WARNING, "Key of size %d not supported by this algorithm. %s", key_size, key_size_str ); efree(key_size_str); @@ -1217,20 +1217,20 @@ static int php_mcrypt_ensure_valid_key_size(MCRYPT td, int key_size TSRMLS_DC) / } /* }}} */ -static int php_mcrypt_ensure_valid_iv(MCRYPT td, const char *iv, int iv_size TSRMLS_DC) /* {{{ */ +static int php_mcrypt_ensure_valid_iv(MCRYPT td, const char *iv, int iv_size) /* {{{ */ { if (mcrypt_enc_mode_has_iv(td) == 1) { int expected_iv_size = mcrypt_enc_get_iv_size(td); if (!iv) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, + php_error_docref(NULL, E_WARNING, "Encryption mode requires an initialization vector of size %d", expected_iv_size ); return FAILURE; } if (iv_size != expected_iv_size) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, + php_error_docref(NULL, E_WARNING, "Received initialization vector of size %d, but size %d is required " "for this encryption mode", iv_size, expected_iv_size ); @@ -1242,7 +1242,7 @@ static int php_mcrypt_ensure_valid_iv(MCRYPT td, const char *iv, int iv_size TSR } /* }}} */ -static void php_mcrypt_do_crypt(char* cipher, const char *key, size_t key_len, const char *data, size_t data_len, char *mode, const char *iv, size_t iv_len, size_t dencrypt, zval* return_value TSRMLS_DC) /* {{{ */ +static void php_mcrypt_do_crypt(char* cipher, const char *key, size_t key_len, const char *data, size_t data_len, char *mode, const char *iv, size_t iv_len, size_t dencrypt, zval* return_value) /* {{{ */ { char *cipher_dir_string; char *module_dir_string; @@ -1254,16 +1254,16 @@ static void php_mcrypt_do_crypt(char* cipher, const char *key, size_t key_len, c td = mcrypt_module_open(cipher, cipher_dir_string, mode, module_dir_string); if (td == MCRYPT_FAILED) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, MCRYPT_OPEN_MODULE_FAILED); + php_error_docref(NULL, E_WARNING, MCRYPT_OPEN_MODULE_FAILED); RETURN_FALSE; } - if (php_mcrypt_ensure_valid_key_size(td, (int)key_len TSRMLS_CC) == FAILURE) { + if (php_mcrypt_ensure_valid_key_size(td, (int)key_len) == FAILURE) { mcrypt_module_close(td); RETURN_FALSE; } - if (php_mcrypt_ensure_valid_iv(td, iv, (int)iv_len TSRMLS_CC) == FAILURE) { + if (php_mcrypt_ensure_valid_iv(td, iv, (int)iv_len) == FAILURE) { mcrypt_module_close(td); RETURN_FALSE; } @@ -1282,7 +1282,7 @@ static void php_mcrypt_do_crypt(char* cipher, const char *key, size_t key_len, c } if (mcrypt_generic_init(td, (void *) key, (int)key_len, (void *) iv) < 0) { - php_error_docref(NULL TSRMLS_CC, E_RECOVERABLE_ERROR, "Mcrypt initialisation failed"); + php_error_docref(NULL, E_RECOVERABLE_ERROR, "Mcrypt initialisation failed"); mcrypt_module_close(td); RETURN_FALSE; } @@ -1310,12 +1310,12 @@ PHP_FUNCTION(mcrypt_encrypt) char *cipher, *key, *data, *mode, *iv = NULL; size_t cipher_len, key_len, data_len, mode_len, iv_len = 0; - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ssss|s", &cipher, &cipher_len, + if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssss|s", &cipher, &cipher_len, &key, &key_len, &data, &data_len, &mode, &mode_len, &iv, &iv_len) == FAILURE) { return; } - php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, mode, iv, iv_len, MCRYPT_ENCRYPT, return_value TSRMLS_CC); + php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, mode, iv, iv_len, MCRYPT_ENCRYPT, return_value); } /* }}} */ @@ -1326,12 +1326,12 @@ PHP_FUNCTION(mcrypt_decrypt) char *cipher, *key, *data, *mode, *iv = NULL; size_t cipher_len, key_len, data_len, mode_len, iv_len = 0; - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ssss|s", &cipher, &cipher_len, + if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssss|s", &cipher, &cipher_len, &key, &key_len, &data, &data_len, &mode, &mode_len, &iv, &iv_len) == FAILURE) { return; } - php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, mode, iv, iv_len, MCRYPT_DECRYPT, return_value TSRMLS_CC); + php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, mode, iv, iv_len, MCRYPT_DECRYPT, return_value); } /* }}} */ @@ -1347,7 +1347,7 @@ PHP_FUNCTION(mcrypt_ecb) convert_to_long_ex(mode); - php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "ecb", iv, iv_len, Z_LVAL_P(mode), return_value TSRMLS_CC); + php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "ecb", iv, iv_len, Z_LVAL_P(mode), return_value); } /* }}} */ @@ -1363,7 +1363,7 @@ PHP_FUNCTION(mcrypt_cbc) convert_to_long_ex(mode); - php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "cbc", iv, iv_len, Z_LVAL_P(mode), return_value TSRMLS_CC); + php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "cbc", iv, iv_len, Z_LVAL_P(mode), return_value); } /* }}} */ @@ -1379,7 +1379,7 @@ PHP_FUNCTION(mcrypt_cfb) convert_to_long_ex(mode); - php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "cfb", iv, iv_len, Z_LVAL_P(mode), return_value TSRMLS_CC); + php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "cfb", iv, iv_len, Z_LVAL_P(mode), return_value); } /* }}} */ @@ -1395,7 +1395,7 @@ PHP_FUNCTION(mcrypt_ofb) convert_to_long_ex(mode); - php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "ofb", iv, iv_len, Z_LVAL_P(mode), return_value TSRMLS_CC); + php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "ofb", iv, iv_len, Z_LVAL_P(mode), return_value); } /* }}} */ @@ -1408,12 +1408,12 @@ PHP_FUNCTION(mcrypt_create_iv) zend_long size; int n = 0; - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l|l", &size, &source) == FAILURE) { + if (zend_parse_parameters(ZEND_NUM_ARGS(), "l|l", &size, &source) == FAILURE) { return; } if (size <= 0 || size >= INT_MAX) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Cannot create an IV with a size of less than 1 or greater than %d", INT_MAX); + php_error_docref(NULL, E_WARNING, "Cannot create an IV with a size of less than 1 or greater than %d", INT_MAX); RETURN_FALSE; } @@ -1425,7 +1425,7 @@ PHP_FUNCTION(mcrypt_create_iv) BYTE *iv_b = (BYTE *) iv; if (php_win32_get_random_bytes(iv_b, (size_t) size) == FAILURE){ efree(iv); - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Could not gather sufficient random data"); + php_error_docref(NULL, E_WARNING, "Could not gather sufficient random data"); RETURN_FALSE; } n = (int)size; @@ -1436,7 +1436,7 @@ PHP_FUNCTION(mcrypt_create_iv) fd = open(source == RANDOM ? "/dev/random" : "/dev/urandom", O_RDONLY); if (fd < 0) { efree(iv); - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Cannot open source device"); + php_error_docref(NULL, E_WARNING, "Cannot open source device"); RETURN_FALSE; } while (read_bytes < size) { @@ -1450,14 +1450,14 @@ PHP_FUNCTION(mcrypt_create_iv) close(fd); if (n < size) { efree(iv); - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Could not gather sufficient random data"); + php_error_docref(NULL, E_WARNING, "Could not gather sufficient random data"); RETURN_FALSE; } #endif } else { n = (int)size; while (size) { - iv[--size] = (char) (255.0 * php_rand(TSRMLS_C) / RAND_MAX); + iv[--size] = (char) (255.0 * php_rand() / RAND_MAX); } } RETVAL_STRINGL(iv, n); diff --git a/ext/mcrypt/mcrypt_filter.c b/ext/mcrypt/mcrypt_filter.c index c36e9494e3..ed3aba22cc 100644 --- a/ext/mcrypt/mcrypt_filter.c +++ b/ext/mcrypt/mcrypt_filter.c @@ -39,7 +39,7 @@ static php_stream_filter_status_t php_mcrypt_filter( php_stream_bucket_brigade *buckets_in, php_stream_bucket_brigade *buckets_out, size_t *bytes_consumed, - int flags TSRMLS_DC) + int flags) { php_mcrypt_filter_data *data; php_stream_bucket *bucket; @@ -80,22 +80,22 @@ static php_stream_filter_status_t php_mcrypt_filter( data->block_used = chunklen - n; memcpy(data->block_buffer, outchunk + n, data->block_used); - newbucket = php_stream_bucket_new(stream, outchunk, n, 1, data->persistent TSRMLS_CC); - php_stream_bucket_append(buckets_out, newbucket TSRMLS_CC); + newbucket = php_stream_bucket_new(stream, outchunk, n, 1, data->persistent); + php_stream_bucket_append(buckets_out, newbucket); exit_status = PSFS_PASS_ON; - php_stream_bucket_unlink(bucket TSRMLS_CC); - php_stream_bucket_delref(bucket TSRMLS_CC); + php_stream_bucket_unlink(bucket); + php_stream_bucket_delref(bucket); } else { /* Stream cipher */ - php_stream_bucket_make_writeable(bucket TSRMLS_CC); + php_stream_bucket_make_writeable(bucket); if (data->encrypt) { mcrypt_generic(data->module, bucket->buf, (int)bucket->buflen); } else { mdecrypt_generic(data->module, bucket->buf, (int)bucket->buflen); } - php_stream_bucket_append(buckets_out, bucket TSRMLS_CC); + php_stream_bucket_append(buckets_out, bucket); exit_status = PSFS_PASS_ON; } @@ -111,8 +111,8 @@ static php_stream_filter_status_t php_mcrypt_filter( mdecrypt_generic(data->module, data->block_buffer, data->blocksize); } - newbucket = php_stream_bucket_new(stream, data->block_buffer, data->blocksize, 0, data->persistent TSRMLS_CC); - php_stream_bucket_append(buckets_out, newbucket TSRMLS_CC); + newbucket = php_stream_bucket_new(stream, data->block_buffer, data->blocksize, 0, data->persistent); + php_stream_bucket_append(buckets_out, newbucket); exit_status = PSFS_PASS_ON; } @@ -124,7 +124,7 @@ static php_stream_filter_status_t php_mcrypt_filter( return exit_status; } -static void php_mcrypt_filter_dtor(php_stream_filter *thisfilter TSRMLS_DC) +static void php_mcrypt_filter_dtor(php_stream_filter *thisfilter) { if (thisfilter && Z_PTR(thisfilter->abstract)) { php_mcrypt_filter_data *data = (php_mcrypt_filter_data*) Z_PTR(thisfilter->abstract); @@ -149,7 +149,7 @@ static php_stream_filter_ops php_mcrypt_filter_ops = { /* {{{ php_mcrypt_filter_create * Instantiate mcrypt filter */ -static php_stream_filter *php_mcrypt_filter_create(const char *filtername, zval *filterparams, int persistent TSRMLS_DC) +static php_stream_filter *php_mcrypt_filter_create(const char *filtername, zval *filterparams, int persistent) { int encrypt = 1, iv_len, key_len, keyl, result; const char *cipher = filtername + sizeof("mcrypt.") - 1; @@ -170,7 +170,7 @@ static php_stream_filter *php_mcrypt_filter_create(const char *filtername, zval } if (!filterparams || Z_TYPE_P(filterparams) != IS_ARRAY) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Filter parameters for %s must be an array", filtername); + php_error_docref(NULL, E_WARNING, "Filter parameters for %s must be an array", filtername); return NULL; } @@ -178,7 +178,7 @@ static php_stream_filter *php_mcrypt_filter_create(const char *filtername, zval if (Z_TYPE_P(tmpzval) == IS_STRING) { mode = Z_STRVAL_P(tmpzval); } else { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "mode is not a string, ignoring"); + php_error_docref(NULL, E_WARNING, "mode is not a string, ignoring"); } } @@ -186,7 +186,7 @@ static php_stream_filter *php_mcrypt_filter_create(const char *filtername, zval if (Z_TYPE_P(tmpzval) == IS_STRING) { algo_dir = Z_STRVAL_P(tmpzval); } else { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "algorithms_dir is not a string, ignoring"); + php_error_docref(NULL, E_WARNING, "algorithms_dir is not a string, ignoring"); } } @@ -194,7 +194,7 @@ static php_stream_filter *php_mcrypt_filter_create(const char *filtername, zval if (Z_TYPE_P(tmpzval) == IS_STRING) { mode_dir = Z_STRVAL_P(tmpzval); } else { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "modes_dir is not a string, ignoring"); + php_error_docref(NULL, E_WARNING, "modes_dir is not a string, ignoring"); } } @@ -203,13 +203,13 @@ static php_stream_filter *php_mcrypt_filter_create(const char *filtername, zval key = Z_STRVAL_P(tmpzval); key_len = (int)Z_STRLEN_P(tmpzval); } else { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "key not specified or is not a string"); + php_error_docref(NULL, E_WARNING, "key not specified or is not a string"); return NULL; } mcrypt_module = mcrypt_module_open((char *)cipher, algo_dir, mode, mode_dir); if (mcrypt_module == MCRYPT_FAILED) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Could not open encryption module"); + php_error_docref(NULL, E_WARNING, "Could not open encryption module"); return NULL; } iv_len = mcrypt_enc_get_iv_size(mcrypt_module); @@ -220,7 +220,7 @@ static php_stream_filter *php_mcrypt_filter_create(const char *filtername, zval if (!(tmpzval = zend_hash_str_find(HASH_OF(filterparams), ZEND_STRL("iv"))) || Z_TYPE_P(tmpzval) != IS_STRING) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Filter parameter[iv] not provided or not of type: string"); + php_error_docref(NULL, E_WARNING, "Filter parameter[iv] not provided or not of type: string"); mcrypt_module_close(mcrypt_module); return NULL; } @@ -238,14 +238,14 @@ static php_stream_filter *php_mcrypt_filter_create(const char *filtername, zval if (result < 0) { switch (result) { case -3: - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Key length incorrect"); + php_error_docref(NULL, E_WARNING, "Key length incorrect"); break; case -4: - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Memory allocation error"); + php_error_docref(NULL, E_WARNING, "Memory allocation error"); break; case -1: default: - php_error_docref(NULL TSRMLS_CC, E_WARNING, "Unknown error"); + php_error_docref(NULL, E_WARNING, "Unknown error"); break; } mcrypt_module_close(mcrypt_module); |