/PHP-7.3/ext/standard/ |
H A D | crypt.c | 116 if (salt[0]=='$' && salt[1]=='1' && salt[2]=='$') { in php_crypt() 124 } else if (salt[0]=='$' && salt[1]=='6' && salt[2]=='$') { in php_crypt() 139 } else if (salt[0]=='$' && salt[1]=='5' && salt[2]=='$') { in php_crypt() 155 salt[0] == '$' && in php_crypt() 171 } else if (salt[0] == '*' && (salt[1] == '0' || salt[1] == '1')) { in php_crypt() 191 if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) { in php_crypt() 201 …if (salt[0] != '$' && salt[0] != '_' && (!IS_VALID_SALT_CHARACTER(salt[0]) || !IS_VALID_SALT_CHARA… in php_crypt() 227 if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) { in php_crypt() 252 salt[0] = salt[PHP_MAX_SALT_LEN] = '\0'; in PHP_FUNCTION() 265 if (!*salt) { in PHP_FUNCTION() [all …]
|
H A D | config.m4 | 132 char salt[15], answer[40]; 135 salt[0]='$'; salt[1]='1'; salt[2]='$'; 136 salt[3]='r'; salt[4]='a'; salt[5]='s'; 137 salt[6]='m'; salt[7]='u'; salt[8]='s'; 138 salt[9]='l'; salt[10]='e'; salt[11]='$'; 139 salt[12]='\0'; 140 strcpy(answer,salt); 172 …salt[0]='$'; salt[1]='2'; salt[2]='a'; salt[3]='$'; salt[4]='0'; salt[5]='7'; salt[6]='$'; salt[7]… 174 strcpy(answer,salt); 207 strcpy(answer, salt); [all …]
|
H A D | php_crypt_r.h | 50 extern char * php_md5_crypt_r(const char *pw, const char *salt, char *out); 51 extern char * php_sha512_crypt_r (const char *key, const char *salt, char *buffer, int buflen); 52 extern char * php_sha256_crypt_r (const char *key, const char *salt, char *buffer, int buflen);
|
H A D | password.c | 428 zend_string_release_ex(salt, 0); in php_password_get_salt() 433 return salt; in php_password_get_salt() 438 return salt; in php_password_get_salt() 462 zend_string *result, *hash, *salt; in PHP_FUNCTION() local 479 ZSTR_VAL(salt)[ZSTR_LEN(salt)] = 0; in PHP_FUNCTION() local 485 zend_string_release_ex(salt, 0); in PHP_FUNCTION() 508 zend_string *salt, *out, *encoded; in PHP_FUNCTION() local 557 (uint32_t)ZSTR_LEN(salt), in PHP_FUNCTION() 569 ZSTR_VAL(salt), in PHP_FUNCTION() 570 ZSTR_LEN(salt), in PHP_FUNCTION() [all …]
|
H A D | crypt_sha256.c | 357 salt += sizeof(sha256_salt_prefix) - 1; in php_sha256_crypt_r() 365 salt = endp + 1; in php_sha256_crypt_r() 371 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); in php_sha256_crypt_r() 379 if ((salt - (char *) 0) % __alignof__(uint32_t) != 0) { in php_sha256_crypt_r() 381 salt = copied_salt = in php_sha256_crypt_r() 395 sha256_process_bytes(salt, salt_len, &ctx); in php_sha256_crypt_r() 406 sha256_process_bytes(salt, salt_len, &alt_ctx); in php_sha256_crypt_r() 457 sha256_process_bytes(salt, salt_len, &alt_ctx); in php_sha256_crypt_r() 591 + (int)strlen(salt) + 1 + 43 + 1); in php_sha256_crypt() 603 return php_sha256_crypt_r(key, salt, buffer, buflen); in php_sha256_crypt() [all …]
|
H A D | crypt_sha512.c | 390 salt += sizeof(sha512_salt_prefix) - 1; in php_sha512_crypt_r() 399 salt = endp + 1; in php_sha512_crypt_r() 405 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); in php_sha512_crypt_r() 416 …salt = copied_salt = memcpy(tmp + __alignof__(uint64_t) - (tmp - (char *) 0) % __alignof__(uint64_… in php_sha512_crypt_r() 429 sha512_process_bytes(salt, salt_len, &ctx); in php_sha512_crypt_r() 440 sha512_process_bytes(salt, salt_len, &alt_ctx); in php_sha512_crypt_r() 492 sha512_process_bytes(salt, salt_len, &alt_ctx); in php_sha512_crypt_r() 629 php_sha512_crypt(const char *key, const char *salt) { in php_sha512_crypt() argument 638 + strlen(salt) + 1 + 86 + 1); in php_sha512_crypt() 650 return php_sha512_crypt_r (key, salt, buffer, buflen); in php_sha512_crypt() [all …]
|
H A D | crypt_blowfish.c | 668 BF_word salt[4]; in BF_crypt() member 701 BF_swap(data.binary.salt, 4); in BF_crypt() 710 L ^= data.binary.salt[i & 2]; in BF_crypt() 711 R ^= data.binary.salt[(i & 2) + 1]; in BF_crypt() 720 L ^= data.binary.salt[(BF_N + 2) & 3]; in BF_crypt() 721 R ^= data.binary.salt[(BF_N + 3) & 3]; in BF_crypt() 726 L ^= data.binary.salt[(BF_N + 4) & 3]; in BF_crypt() 748 tmp1 = data.binary.salt[0]; in BF_crypt() 749 tmp2 = data.binary.salt[1]; in BF_crypt() 750 tmp3 = data.binary.salt[2]; in BF_crypt() [all …]
|
H A D | crypt_freesec.c | 351 setup_salt(uint32_t salt, struct php_crypt_extended_data *data) in setup_salt() argument 356 if (salt == data->old_salt) in setup_salt() 358 data->old_salt = salt; in setup_salt() 364 if (salt & saltbit) in setup_salt() 576 des_cipher(const char *in, char *out, uint32_t salt, int count, in des_cipher() argument 582 setup_salt(salt, data); in des_cipher() 614 uint32_t count, salt, l, r0, r1, keybuf[2]; in _crypt_extended_r() local 648 for (i = 5, salt = 0; i < 9; i++) { in _crypt_extended_r() 652 salt |= value << (i - 5) * 6; in _crypt_extended_r() 686 salt = (ascii_to_bin(setting[1]) << 6) in _crypt_extended_r() [all …]
|
H A D | php_crypt_r.c | 126 char * php_md5_crypt_r(const char *pw, const char *salt, char *out) { in php_md5_crypt_r() argument 135 const char *sp = salt; in php_md5_crypt_r() 136 const char *ep = salt; in php_md5_crypt_r() 149 sp = salt; in php_md5_crypt_r() 318 char * php_md5_crypt_r(const char *pw, const char *salt, char *out) in php_md5_crypt_r() argument 331 sp = salt; in php_md5_crypt_r()
|
H A D | php_crypt.h | 24 PHPAPI zend_string *php_crypt(const char *password, const int pass_len, const char *salt, int salt_…
|
/PHP-7.3/ext/standard/tests/strings/ |
H A D | bug73058.phpt | 2 Bug #73058 crypt broken when salt is 'too' long 7 $salt = '$2y$07$usesomesillystringforsalt$'; 8 var_dump(crypt($pass, $salt)); 10 $salt = '$2y$07$usesomesillystringforsaltzzzzzzzzzzzzz$'; 11 var_dump(crypt($pass, $salt)); 13 $salt = '$2y$07$usesomesillystringforx'; 14 var_dump(crypt($pass, $salt));
|
H A D | bug50052.phpt | 5 $salt = '$1$f+uslYF01$'; 7 echo $salt . "\n"; 8 echo crypt($password,$salt) . "\n";
|
H A D | crypt_blowfish_variation1.phpt | 14 foreach($salts as $i=>$salt) { 15 $crypt = crypt('U*U', $salt);
|
H A D | crypt.phpt | 32 Notice: crypt(): No salt parameter was specified. You must use a randomly generated salt and a stro…
|
/PHP-7.3/ext/standard/tests/password/ |
H A D | password_bcrypt_errors.phpt | 11 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => "foo"))); 13 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => "123456789012345678901"))); 15 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => 123))); 27 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 29 Warning: password_hash(): Provided salt is too short: 3 expecting 22 in %s on line %d 32 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 34 Warning: password_hash(): Provided salt is too short: 21 expecting 22 in %s on line %d 37 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 39 Warning: password_hash(): Provided salt is too short: 3 expecting 22 in %s on line %d
|
H A D | password_hash_error.phpt | 19 var_dump(password_hash("123", PASSWORD_BCRYPT, array("salt" => array()))); 21 /* Non-string salt, checking for memory leaks */ 22 var_dump(password_hash('123', PASSWORD_BCRYPT, array('salt' => 1234))); 44 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 46 Warning: password_hash(): Non-string salt parameter supplied in %s on line %d 49 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 51 Warning: password_hash(): Provided salt is too short: 4 expecting 22 in %s on line %d
|
H A D | password_deprecated_salts.phpt | 8 var_dump(password_hash("rasmuslerdorf", PASSWORD_BCRYPT, array("cost" => 7, "salt" => "usesomesilly… 10 var_dump(password_hash("test", PASSWORD_BCRYPT, array("salt" => "123456789012345678901" . chr(0)))); 15 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 18 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line …
|
/PHP-7.3/ext/standard/tests/crypt/ |
H A D | des_fallback_invalid_salt.phpt | 11 Deprecated: crypt(): Supplied salt is not valid for DES. Possible bug in provided salt format. in %… 14 Deprecated: crypt(): Supplied salt is not valid for DES. Possible bug in provided salt format. in %…
|
/PHP-7.3/ext/openssl/tests/ |
H A D | openssl_pbkdf2_basic.phpt | 8 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 1))); 9 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 2))); 10 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 4096))); 14 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 16777216)));
|
/PHP-7.3/ext/hash/tests/ |
H A D | hash_pbkdf2_error.phpt | 8 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int le… 9 Generate a PBKDF2 hash of the given password and salt 15 $salt = 'salt'; 21 var_dump(hash_pbkdf2('md5', $password, $salt)); 24 var_dump(hash_pbkdf2('md5', $password, $salt, 10, 10, true, 'extra arg')); 27 var_dump(hash_pbkdf2('foo', $password, $salt, 1)); 30 var_dump(hash_pbkdf2('crc32', $password, $salt, 1)); 33 var_dump(hash_pbkdf2('md5', $password, $salt, 0)); 34 var_dump(hash_pbkdf2('md5', $password, $salt, -1)); 37 var_dump(hash_pbkdf2('md5', $password, $salt, 1, -1));
|
H A D | hash_pbkdf2_basic.phpt | 16 echo "sha1: " . hash_pbkdf2('sha1', 'password', 'salt', 1, 20)."\n"; 17 echo "sha1(no length): " . hash_pbkdf2('sha1', 'password', 'salt', 1)."\n"; 18 echo "sha1(raw): " . bin2hex(hash_pbkdf2('sha1', 'password', 'salt', 1, 20, TRUE))."\n"; 21 echo "sha256: " . hash_pbkdf2('sha256', 'password', 'salt', 1, 20)."\n"; 22 echo "sha256(no length): " . hash_pbkdf2('sha256', 'password', 'salt', 1)."\n"; 23 echo "sha256(raw): " . bin2hex(hash_pbkdf2('sha256', 'password', 'salt', 1, 20, TRUE))."\n";
|
H A D | bug64745.phpt | 7 $hash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0); 8 $rawHash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0, true);
|
H A D | mhash_003.phpt | 26 $salt = str_repeat($hash, 2); 27 $result = mhash_keygen_s2k(constant($hash), $passwd, $salt, 100);
|
/PHP-7.3/ext/sodium/tests/ |
H A D | pwhash_argon2i.phpt | 30 $salt = random_bytes(SODIUM_CRYPTO_PWHASH_SALTBYTES); 33 ($out_len, $passwd, $salt, 39 ($out_len, $passwd, $salt,
|
H A D | pwhash_scrypt.phpt | 22 $salt = random_bytes(SODIUM_CRYPTO_PWHASH_SCRYPTSALSA208SHA256_SALTBYTES); 25 ($out_len, $passwd, $salt,
|