Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 38) sorted by path

12

/PHP-7.4/ext/fileinfo/tests/
H A Dmagic473 #>>>&1 string >\0 \b, PASSWORD salt: "%-128.128s"
474 #>>>&1 regex/1l .* \b, Password salt: %s
476 #>>>>&1 regex/1l .* \b, Master salt: %s
13840 >>>>>>&28 ubequad x \b, salt %llu
26576 # OpenSSL enc file (recognized by a magic string preceding the password's salt)
H A Dmagic私はガラスを食べられます473 #>>>&1 string >\0 \b, PASSWORD salt: "%-128.128s"
474 #>>>&1 regex/1l .* \b, Password salt: %s
476 #>>>>&1 regex/1l .* \b, Master salt: %s
13840 >>>>>>&28 ubequad x \b, salt %llu
26576 # OpenSSL enc file (recognized by a magic string preceding the password's salt)
/PHP-7.4/ext/hash/
H A Dhash.c626 zend_string *returnval, *ikm, *algo, *info = NULL, *salt = NULL; in PHP_FUNCTION() local
634 …if (zend_parse_parameters(ZEND_NUM_ARGS(), "SS|lSS", &algo, &ikm, &length, &info, &salt) == FAILUR… in PHP_FUNCTION()
670 (unsigned char *) (salt ? ZSTR_VAL(salt) : ""), salt ? ZSTR_LEN(salt) : 0); in PHP_FUNCTION()
726 char *algo, *salt, *pass = NULL; in PHP_FUNCTION() local
793 memcpy(computed_salt, (unsigned char *) salt, salt_len); in PHP_FUNCTION()
1045 char *password, *salt; in PHP_FUNCTION() local
1049 …if (zend_parse_parameters(ZEND_NUM_ARGS(), "lssl", &algorithm, &password, &password_len, &salt, &s… in PHP_FUNCTION()
1061 memcpy(padded_salt, salt, salt_len); in PHP_FUNCTION()
1394 ZEND_ARG_INFO(0, salt)
1410 ZEND_ARG_INFO(0, salt)
[all …]
/PHP-7.4/ext/hash/tests/
H A Dbug64745.phpt5 $hash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0);
6 $rawHash = hash_pbkdf2('sha1', 'password', 'salt', 1, 0, true);
H A Dhash_hkdf_basic.phpt6 …g hkdf ( string $algo , string $ikm [, int $length , string $info = '' , string $salt = '' ] )
H A Dhash_hkdf_edges.phpt6 …g hkdf ( string $algo , string $ikm [, int $length , string $info = '' , string $salt = '' ] )
H A Dhash_hkdf_error.phpt6 …g hkdf ( string $algo , string $ikm [, int $length , string $info = '' , string $salt = '' ] )
H A Dhash_hkdf_rfc5869.phpt6 …g hkdf ( string $algo , string $ikm [, int $length , string $info = '' , string $salt = '' ] )
28 echo "Test case 3 (SHA-256 with zero-length salt, info): ",
52 echo "Test case 6 (SHA-1 with zero-length salt, info): ",
60 echo "Test case 7 (SHA-1 with zero-length info, salt not provided): ",
73 Test case 3 (SHA-256 with zero-length salt, info): 8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879e…
76 Test case 6 (SHA-1 with zero-length salt, info): 0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e0…
77 Test case 7 (SHA-1 with zero-length info, salt not provided): 2c91117204d745f3500d636a62f64f0ab3bae…
H A Dhash_pbkdf2_basic.phpt14 echo "sha1: " . hash_pbkdf2('sha1', 'password', 'salt', 1, 20)."\n";
15 echo "sha1(no length): " . hash_pbkdf2('sha1', 'password', 'salt', 1)."\n";
16 echo "sha1(raw): " . bin2hex(hash_pbkdf2('sha1', 'password', 'salt', 1, 20, TRUE))."\n";
19 echo "sha256: " . hash_pbkdf2('sha256', 'password', 'salt', 1, 20)."\n";
20 echo "sha256(no length): " . hash_pbkdf2('sha256', 'password', 'salt', 1)."\n";
21 echo "sha256(raw): " . bin2hex(hash_pbkdf2('sha256', 'password', 'salt', 1, 20, TRUE))."\n";
H A Dhash_pbkdf2_error.phpt6 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int le…
7 Generate a PBKDF2 hash of the given password and salt
13 $salt = 'salt';
19 var_dump(hash_pbkdf2('md5', $password, $salt));
22 var_dump(hash_pbkdf2('md5', $password, $salt, 10, 10, true, 'extra arg'));
25 var_dump(hash_pbkdf2('foo', $password, $salt, 1));
28 var_dump(hash_pbkdf2('crc32', $password, $salt, 1));
31 var_dump(hash_pbkdf2('md5', $password, $salt, 0));
32 var_dump(hash_pbkdf2('md5', $password, $salt, -1));
35 var_dump(hash_pbkdf2('md5', $password, $salt, 1, -1));
H A Dmhash_003.phpt24 $salt = str_repeat($hash, 2);
25 $result = mhash_keygen_s2k(constant($hash), $passwd, $salt, 100);
/PHP-7.4/ext/openssl/
H A Dopenssl.c279 ZEND_ARG_INFO(0, salt)
5094 char *salt; in PHP_FUNCTION() local
5104 &salt, &salt_len, in PHP_FUNCTION()
5128 PHP_OPENSSL_CHECK_SIZE_T_TO_INT(salt_len, salt); in PHP_FUNCTION()
5132 …if (PKCS5_PBKDF2_HMAC(password, (int)password_len, (unsigned char *)salt, (int)salt_len, (int)iter… in PHP_FUNCTION()
/PHP-7.4/ext/openssl/tests/
H A Dopenssl_pbkdf2_basic.phpt8 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 1)));
9 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 2)));
10 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 4096)));
14 var_dump(bin2hex(openssl_pbkdf2('password', 'salt', 20, 16777216)));
/PHP-7.4/ext/sodium/
H A Dlibsodium.c138 ZEND_ARG_INFO(0, salt)
1825 unsigned char *salt; in PHP_FUNCTION() local
1839 &salt, &salt_len, in PHP_FUNCTION()
1890 passwd, (unsigned long long) passwd_len, salt, in PHP_FUNCTION()
1897 passwd, (unsigned long long) passwd_len, salt, in PHP_FUNCTION()
2017 unsigned char *salt; in PHP_FUNCTION() local
2028 &salt, &salt_len, in PHP_FUNCTION()
2065 passwd, (unsigned long long) passwd_len, salt, in PHP_FUNCTION()
3366 salt[0] = (unsigned char) (((uint64_t) subkey_id) ); in PHP_FUNCTION()
3374 memset(salt + 8, 0, (sizeof salt) - 8); in PHP_FUNCTION()
[all …]
/PHP-7.4/ext/sodium/tests/
H A Dpwhash_argon2i.phpt30 $salt = random_bytes(SODIUM_CRYPTO_PWHASH_SALTBYTES);
33 ($out_len, $passwd, $salt,
39 ($out_len, $passwd, $salt,
H A Dpwhash_scrypt.phpt22 $salt = random_bytes(SODIUM_CRYPTO_PWHASH_SCRYPTSALSA208SHA256_SALTBYTES);
25 ($out_len, $passwd, $salt,
/PHP-7.4/ext/standard/
H A Dbasic_functions.c874 ZEND_ARG_INFO(0, salt)
H A Dconfig.m4130 char salt[15], answer[40];
133 salt[0]='$'; salt[1]='1'; salt[2]='$';
134 salt[3]='r'; salt[4]='a'; salt[5]='s';
135 salt[6]='m'; salt[7]='u'; salt[8]='s';
136 salt[9]='l'; salt[10]='e'; salt[11]='$';
137 salt[12]='\0';
138 strcpy(answer,salt);
170salt[0]='$'; salt[1]='2'; salt[2]='a'; salt[3]='$'; salt[4]='0'; salt[5]='7'; salt[6]='$'; salt[7]…
172 strcpy(answer,salt);
205 strcpy(answer, salt);
[all …]
H A Dcrypt.c103 if (salt[0] == '*' && (salt[1] == '0' || salt[1] == '1')) { in php_crypt()
113 if (salt[0]=='$' && salt[1]=='1' && salt[2]=='$') { in php_crypt()
121 } else if (salt[0]=='$' && salt[1]=='6' && salt[2]=='$') { in php_crypt()
136 } else if (salt[0]=='$' && salt[1]=='5' && salt[2]=='$') { in php_crypt()
152 salt[0] == '$' && in php_crypt()
186 if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) { in php_crypt()
196 …if (salt[0] != '$' && salt[0] != '_' && (!IS_VALID_SALT_CHARACTER(salt[0]) || !IS_VALID_SALT_CHARA… in php_crypt()
222 if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) { in php_crypt()
247 salt[0] = salt[PHP_MAX_SALT_LEN] = '\0'; in PHP_FUNCTION()
260 if (!*salt) { in PHP_FUNCTION()
[all …]
H A Dcrypt_blowfish.c668 BF_word salt[4]; in BF_crypt() member
701 BF_swap(data.binary.salt, 4); in BF_crypt()
710 L ^= data.binary.salt[i & 2]; in BF_crypt()
711 R ^= data.binary.salt[(i & 2) + 1]; in BF_crypt()
720 L ^= data.binary.salt[(BF_N + 2) & 3]; in BF_crypt()
721 R ^= data.binary.salt[(BF_N + 3) & 3]; in BF_crypt()
726 L ^= data.binary.salt[(BF_N + 4) & 3]; in BF_crypt()
748 tmp1 = data.binary.salt[0]; in BF_crypt()
749 tmp2 = data.binary.salt[1]; in BF_crypt()
750 tmp3 = data.binary.salt[2]; in BF_crypt()
[all …]
H A Dcrypt_freesec.c351 setup_salt(uint32_t salt, struct php_crypt_extended_data *data) in setup_salt() argument
356 if (salt == data->old_salt) in setup_salt()
358 data->old_salt = salt; in setup_salt()
364 if (salt & saltbit) in setup_salt()
576 des_cipher(const char *in, char *out, uint32_t salt, int count, in des_cipher() argument
582 setup_salt(salt, data); in des_cipher()
614 uint32_t count, salt, l, r0, r1, keybuf[2]; in _crypt_extended_r() local
648 for (i = 5, salt = 0; i < 9; i++) { in _crypt_extended_r()
652 salt |= value << (i - 5) * 6; in _crypt_extended_r()
686 salt = (ascii_to_bin(setting[1]) << 6) in _crypt_extended_r()
[all …]
H A Dcrypt_sha256.c353 salt += sizeof(sha256_salt_prefix) - 1; in php_sha256_crypt_r()
361 salt = endp + 1; in php_sha256_crypt_r()
367 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); in php_sha256_crypt_r()
375 if ((salt - (char *) 0) % __alignof__(uint32_t) != 0) { in php_sha256_crypt_r()
377 salt = copied_salt = in php_sha256_crypt_r()
391 sha256_process_bytes(salt, salt_len, &ctx); in php_sha256_crypt_r()
402 sha256_process_bytes(salt, salt_len, &alt_ctx); in php_sha256_crypt_r()
453 sha256_process_bytes(salt, salt_len, &alt_ctx); in php_sha256_crypt_r()
587 + (int)strlen(salt) + 1 + 43 + 1); in php_sha256_crypt()
599 return php_sha256_crypt_r(key, salt, buffer, buflen); in php_sha256_crypt()
[all …]
H A Dcrypt_sha512.c386 salt += sizeof(sha512_salt_prefix) - 1; in php_sha512_crypt_r()
395 salt = endp + 1; in php_sha512_crypt_r()
401 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); in php_sha512_crypt_r()
412salt = copied_salt = memcpy(tmp + __alignof__(uint64_t) - (tmp - (char *) 0) % __alignof__(uint64_… in php_sha512_crypt_r()
425 sha512_process_bytes(salt, salt_len, &ctx); in php_sha512_crypt_r()
436 sha512_process_bytes(salt, salt_len, &alt_ctx); in php_sha512_crypt_r()
488 sha512_process_bytes(salt, salt_len, &alt_ctx); in php_sha512_crypt_r()
625 php_sha512_crypt(const char *key, const char *salt) { in php_sha512_crypt() argument
634 + strlen(salt) + 1 + 86 + 1); in php_sha512_crypt()
646 return php_sha512_crypt_r (key, salt, buffer, buflen); in php_sha512_crypt()
[all …]
H A Dpassword.c176 zend_string_release_ex(salt, 0); in php_password_get_salt()
181 return salt; in php_password_get_salt()
186 return salt; in php_password_get_salt()
259 zend_string *result, *hash, *salt; in php_password_bcrypt_hash() local
276 ZSTR_VAL(salt)[ZSTR_LEN(salt)] = 0; in php_password_bcrypt_hash() local
282 zend_string_release_ex(salt, 0); in php_password_bcrypt_hash()
379 zend_string *salt, *out, *encoded; in php_password_argon2_hash() local
422 (uint32_t)ZSTR_LEN(salt), in php_password_argon2_hash()
434 ZSTR_VAL(salt), in php_password_argon2_hash()
435 ZSTR_LEN(salt), in php_password_argon2_hash()
[all …]
H A Dphp_crypt.h24 PHPAPI zend_string *php_crypt(const char *password, const int pass_len, const char *salt, int salt_…

Completed in 197 milliseconds

12