Lines Matching refs:unserialize
62 …err, "UNSERIALIZE_INIT == lock: %u, level: %u\n", BG(serialize_lock), BG(unserialize).level); */
63 if (BG(serialize_lock) || !BG(unserialize).level) {
74 BG(unserialize).data = d;
75 BG(unserialize).level = 1;
78 d = BG(unserialize).data;
79 ++BG(unserialize).level;
85 …err, "UNSERIALIZE_DESTROY == lock: %u, level: %u\n", BG(serialize_lock), BG(unserialize).level); */
86 if (BG(serialize_lock) || BG(unserialize).level == 1) {
90 if (!BG(serialize_lock) && !--BG(unserialize).level) {
91 BG(unserialize).data = NULL;
469 "The depth limit can be changed using the max_depth unserialize() option "
564 "Cannot unserialize value for virtual property %s::$%s",
581 "The depth limit can be changed using the max_depth unserialize() option "
683 /* Add type source even if we failed to unserialize.
765 /* Check that '}' is present before calling ce->unserialize() to mitigate issues
766 * with unserialize reading past the end of the passed buffer if the string is not
773 if (ce->unserialize == NULL) {
776 …} else if (ce->unserialize(rval, ce, (const unsigned char*)*p, datalen, (zend_unserialize_data *)v…
862 * as NULL. This will forbid their use by other unserialize() calls in the same
1120 * unserialize (in practice unserialization handlers also see it). Ideally we should
1245 /* Check for unserialize callback */
1252 /* Call unserialize callback */
1301 zend_error(E_WARNING, "Bad unserialize data");
1328 * there is both Serializable::unserialize() and __unserialize(), then both may be used,