Lines Matching refs:unserialize
57 …err, "UNSERIALIZE_INIT == lock: %u, level: %u\n", BG(serialize_lock), BG(unserialize).level); */
58 if (BG(serialize_lock) || !BG(unserialize).level) {
69 BG(unserialize).data = d;
70 BG(unserialize).level = 1;
73 d = BG(unserialize).data;
74 ++BG(unserialize).level;
80 …err, "UNSERIALIZE_DESTROY == lock: %u, level: %u\n", BG(serialize_lock), BG(unserialize).level); */
81 if (BG(serialize_lock) || BG(unserialize).level == 1) {
85 if (!BG(serialize_lock) && !--BG(unserialize).level) {
86 BG(unserialize).data = NULL;
455 "The depth limit can be changed using the max_depth unserialize() option "
594 /* Add type source even if we failed to unserialize.
624 if (BG(unserialize).level > 1) {
670 /* Check that '}' is present before calling ce->unserialize() to mitigate issues
671 * with unserialize reading past the end of the passed buffer if the string is not
677 if (ce->unserialize == NULL) {
680 …} else if (ce->unserialize(rval, ce, (const unsigned char*)*p, datalen, (zend_unserialize_data *)v…
766 * as NULL. This will forbid their use by other unserialize() calls in the same
1020 * unserialize (in practice unserialization handlers also see it). Ideally we should
1101 /* Check for unserialize callback */
1108 /* Call unserialize callback */
1166 zend_error(E_WARNING, "Bad unserialize data");
1183 * there is both Serializable::unserialize() and __unserialize(), then both may be used,