{
zval *buf_zv;
- if (zend_parse_parameters(ZEND_NUM_ARGS(),
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(),
"z", &buf_zv) == FAILURE) {
return;
}
unsigned char *val;
size_t val_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(),
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(),
"z", &val_zv) == FAILURE) {
return;
}
size_t val_len;
size_t addv_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(),
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(),
"zs", &val_zv, &addv, &addv_len) == FAILURE) {
return;
}
size_t len1;
size_t len2;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&buf1, &len1,
&buf2, &len2) == FAILURE) {
return;
size_t key_len;
size_t msg_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&msg, &msg_len,
&key, &key_len) == FAILURE) {
return;
size_t msg_len;
size_t nonce_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "sss",
&msg, &msg_len,
&nonce, &nonce_len,
&key, &key_len) == FAILURE) {
size_t ciphertext_len;
size_t nonce_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "sss",
&ciphertext, &ciphertext_len,
&nonce, &nonce_len,
&key, &key_len) == FAILURE) {
size_t key_len = 0;
size_t msg_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s|sl",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s|sl",
&msg, &msg_len,
&key, &key_len,
&hash_len) == FAILURE) {
zend_long hash_len = crypto_generichash_BYTES;
size_t key_len = 0;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "|sl",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "|sl",
&key, &key_len,
&hash_len) == FAILURE) {
return;
size_t msg_len;
size_t state_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zs",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "zs",
&state_zv, &msg, &msg_len) == FAILURE) {
return;
}
size_t state_len;
zend_long hash_len = crypto_generichash_BYTES;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "z|l",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "z|l",
&state_zv, &hash_len) == FAILURE) {
return;
}
size_t keypair_len;
size_t seed_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&seed, &seed_len) == FAILURE) {
return;
}
size_t publickey_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&secretkey, &secretkey_len,
&publickey, &publickey_len) == FAILURE) {
return;
unsigned char *keypair;
size_t keypair_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&keypair, &keypair_len) == FAILURE) {
return;
}
unsigned char *keypair;
size_t keypair_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&keypair, &keypair_len) == FAILURE) {
return;
}
unsigned char *secretkey;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&secretkey, &secretkey_len) == FAILURE) {
return;
}
size_t msg_len;
size_t nonce_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "sss",
&msg, &msg_len,
&nonce, &nonce_len,
&keypair, &keypair_len) == FAILURE) {
size_t keypair_len;
size_t nonce_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "sss",
&ciphertext, &ciphertext_len,
&nonce, &nonce_len,
&keypair, &keypair_len) == FAILURE) {
size_t msg_len;
size_t publickey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&msg, &msg_len,
&publickey, &publickey_len) == FAILURE) {
return;
size_t ciphertext_len;
size_t keypair_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&ciphertext, &ciphertext_len,
&keypair, &keypair_len) == FAILURE) {
return;
size_t keypair_len;
size_t seed_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&seed, &seed_len) == FAILURE) {
return;
}
size_t publickey_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&secretkey, &secretkey_len,
&publickey, &publickey_len) == FAILURE) {
return;
char *secretkey;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&secretkey, &secretkey_len) == FAILURE) {
return;
}
unsigned char *keypair;
size_t keypair_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&keypair, &keypair_len) == FAILURE) {
return;
}
unsigned char *keypair;
size_t keypair_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&keypair, &keypair_len) == FAILURE) {
return;
}
size_t msg_signed_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&msg, &msg_len,
&secretkey, &secretkey_len) == FAILURE) {
return;
size_t msg_signed_len;
size_t publickey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&msg_signed, &msg_signed_len,
&publickey, &publickey_len) == FAILURE) {
return;
size_t msg_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&msg, &msg_len,
&secretkey, &secretkey_len) == FAILURE) {
return;
size_t publickey_len;
size_t signature_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "sss",
&signature, &signature_len,
&msg, &msg_len,
&publickey, &publickey_len) == FAILURE) {
size_t key_len;
size_t nonce_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "lss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "lss",
&ciphertext_len,
&nonce, &nonce_len,
&key, &key_len) == FAILURE) {
size_t msg_len;
size_t nonce_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "sss",
&msg, &msg_len,
&nonce, &nonce_len,
&key, &key_len) == FAILURE) {
size_t passwd_len;
size_t salt_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "lssll",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "lssll",
&hash_len,
&passwd, &passwd_len,
&salt, &salt_len,
zend_long opslimit;
size_t passwd_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sll",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "sll",
&passwd, &passwd_len,
&opslimit, &memlimit) == FAILURE ||
opslimit <= 0 || memlimit <= 0 || memlimit > SIZE_MAX) {
size_t hash_str_len;
size_t passwd_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&hash_str, &hash_str_len,
&passwd, &passwd_len) == FAILURE) {
zend_throw_exception(sodium_exception_ce,
size_t salt_len;
alg = (zend_long) crypto_pwhash_ALG_DEFAULT;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "lssll|l",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "lssll|l",
&hash_len,
&passwd, &passwd_len,
&salt, &salt_len,
size_t passwd_len;
size_t len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sll",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "sll",
&passwd, &passwd_len,
&opslimit, &memlimit) == FAILURE ||
opslimit <= 0 || memlimit <= 0 || memlimit > SIZE_MAX ||
size_t hash_str_len;
size_t passwd_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&hash_str, &hash_str_len,
&passwd, &passwd_len) == FAILURE) {
zend_throw_exception(sodium_exception_ce,
size_t npub_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ssss",
&msg, &msg_len,
&ad, &ad_len,
&npub, &npub_len,
size_t npub_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ssss",
&ciphertext, &ciphertext_len,
&ad, &ad_len,
&npub, &npub_len,
size_t npub_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ssss",
&msg, &msg_len,
&ad, &ad_len,
&npub, &npub_len,
size_t npub_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ssss",
&ciphertext, &ciphertext_len,
&ad, &ad_len,
&npub, &npub_len,
size_t npub_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ssss",
&msg, &msg_len,
&ad, &ad_len,
&npub, &npub_len,
size_t npub_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ssss",
&ciphertext, &ciphertext_len,
&ad, &ad_len,
&npub, &npub_len,
size_t npub_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ssss",
&msg, &msg_len,
&ad, &ad_len,
&npub, &npub_len,
size_t npub_len;
size_t secretkey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ssss",
&ciphertext, &ciphertext_len,
&ad, &ad_len,
&npub, &npub_len,
size_t bin_len;
size_t hex_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&bin, &bin_len) == FAILURE) {
return;
}
size_t hex_len;
size_t ignore_len = 0;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s|s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s|s",
&hex, &hex_len,
&ignore, &ignore_len) == FAILURE) {
return;
size_t n_len;
size_t p_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&n, &n_len, &p, &p_len) == FAILURE) {
return;
}
size_t seed_len;
zend_string *keypair;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&seed, &seed_len) == FAILURE) {
return;
}
unsigned char *keypair;
size_t keypair_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&keypair, &keypair_len) == FAILURE) {
return;
}
unsigned char *keypair;
size_t keypair_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&keypair, &keypair_len) == FAILURE) {
return;
}
size_t keypair_len;
size_t server_pk_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&keypair, &keypair_len,
&server_pk, &server_pk_len) == FAILURE) {
return;
size_t keypair_len;
size_t client_pk_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&keypair, &keypair_len,
&client_pk, &client_pk_len) == FAILURE) {
return;
size_t msg_len;
size_t key_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&msg, &msg_len,
&key, &key_len) == FAILURE) {
return;
size_t msg_len;
size_t key_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "sss",
&mac, &mac_len,
&msg, &msg_len,
&key, &key_len) == FAILURE) {
char *eddsakey;
size_t eddsakey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&eddsakey, &eddsakey_len) == FAILURE) {
return;
}
char *eddsakey;
size_t eddsakey_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "s",
&eddsakey, &eddsakey_len) == FAILURE) {
return;
}
size_t len1;
size_t len2;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "ss",
&buf1, &len1,
&buf2, &len2) == FAILURE) {
return;
size_t ctx_len;
size_t key_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "llss",
+ if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "llss",
&subkey_len,
&subkey_id,
&ctx, &ctx_len,