/PHP-7.4/ext/openssl/ |
H A D | openssl.c | 279 ZEND_ARG_INFO(0, salt) 5094 char *salt; in PHP_FUNCTION() local 5104 &salt, &salt_len, in PHP_FUNCTION() 5128 PHP_OPENSSL_CHECK_SIZE_T_TO_INT(salt_len, salt); in PHP_FUNCTION() 5132 …if (PKCS5_PBKDF2_HMAC(password, (int)password_len, (unsigned char *)salt, (int)salt_len, (int)iter… in PHP_FUNCTION()
|
/PHP-7.4/ext/standard/ |
H A D | config.m4 | 130 char salt[15], answer[40]; 133 salt[0]='$'; salt[1]='1'; salt[2]='$'; 134 salt[3]='r'; salt[4]='a'; salt[5]='s'; 135 salt[6]='m'; salt[7]='u'; salt[8]='s'; 136 salt[9]='l'; salt[10]='e'; salt[11]='$'; 137 salt[12]='\0'; 138 strcpy(answer,salt); 170 …salt[0]='$'; salt[1]='2'; salt[2]='a'; salt[3]='$'; salt[4]='0'; salt[5]='7'; salt[6]='$'; salt[7]… 172 strcpy(answer,salt); 205 strcpy(answer, salt); [all …]
|
H A D | crypt.c | 103 if (salt[0] == '*' && (salt[1] == '0' || salt[1] == '1')) { in php_crypt() 113 if (salt[0]=='$' && salt[1]=='1' && salt[2]=='$') { in php_crypt() 121 } else if (salt[0]=='$' && salt[1]=='6' && salt[2]=='$') { in php_crypt() 136 } else if (salt[0]=='$' && salt[1]=='5' && salt[2]=='$') { in php_crypt() 152 salt[0] == '$' && in php_crypt() 186 if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) { in php_crypt() 196 …if (salt[0] != '$' && salt[0] != '_' && (!IS_VALID_SALT_CHARACTER(salt[0]) || !IS_VALID_SALT_CHARA… in php_crypt() 222 if (!crypt_res || (salt[0] == '*' && salt[1] == '0')) { in php_crypt() 247 salt[0] = salt[PHP_MAX_SALT_LEN] = '\0'; in PHP_FUNCTION() 260 if (!*salt) { in PHP_FUNCTION() [all …]
|
H A D | basic_functions.c | 874 ZEND_ARG_INFO(0, salt)
|
H A D | password.c | 176 zend_string_release_ex(salt, 0); in php_password_get_salt() 181 return salt; in php_password_get_salt() 186 return salt; in php_password_get_salt() 259 zend_string *result, *hash, *salt; in php_password_bcrypt_hash() local 276 ZSTR_VAL(salt)[ZSTR_LEN(salt)] = 0; in php_password_bcrypt_hash() local 282 zend_string_release_ex(salt, 0); in php_password_bcrypt_hash() 379 zend_string *salt, *out, *encoded; in php_password_argon2_hash() local 422 (uint32_t)ZSTR_LEN(salt), in php_password_argon2_hash() 434 ZSTR_VAL(salt), in php_password_argon2_hash() 435 ZSTR_LEN(salt), in php_password_argon2_hash() [all …]
|
H A D | php_crypt.h | 24 PHPAPI zend_string *php_crypt(const char *password, const int pass_len, const char *salt, int salt_…
|
H A D | php_crypt_r.c | 126 char * php_md5_crypt_r(const char *pw, const char *salt, char *out) { in php_md5_crypt_r() argument 135 const char *sp = salt; in php_md5_crypt_r() 136 const char *ep = salt; in php_md5_crypt_r() 149 sp = salt; in php_md5_crypt_r() 316 char * php_md5_crypt_r(const char *pw, const char *salt, char *out) in php_md5_crypt_r() argument 329 sp = salt; in php_md5_crypt_r()
|
H A D | php_crypt_r.h | 50 extern char * php_md5_crypt_r(const char *pw, const char *salt, char *out); 51 extern char * php_sha512_crypt_r (const char *key, const char *salt, char *buffer, int buflen); 52 extern char * php_sha256_crypt_r (const char *key, const char *salt, char *buffer, int buflen);
|
/PHP-7.4/ext/sodium/ |
H A D | libsodium.c | 138 ZEND_ARG_INFO(0, salt) 1825 unsigned char *salt; in PHP_FUNCTION() local 1839 &salt, &salt_len, in PHP_FUNCTION() 1890 passwd, (unsigned long long) passwd_len, salt, in PHP_FUNCTION() 1897 passwd, (unsigned long long) passwd_len, salt, in PHP_FUNCTION() 2017 unsigned char *salt; in PHP_FUNCTION() local 2028 &salt, &salt_len, in PHP_FUNCTION() 2065 passwd, (unsigned long long) passwd_len, salt, in PHP_FUNCTION() 3366 salt[0] = (unsigned char) (((uint64_t) subkey_id) ); in PHP_FUNCTION() 3374 memset(salt + 8, 0, (sizeof salt) - 8); in PHP_FUNCTION() [all …]
|
/PHP-7.4/ext/standard/tests/strings/ |
H A D | crypt.phpt | 32 Notice: crypt(): No salt parameter was specified. You must use a randomly generated salt and a stro…
|
H A D | bug50052.phpt | 5 $salt = '$1$f+uslYF01$'; 7 echo $salt . "\n"; 8 echo crypt($password,$salt) . "\n";
|
H A D | bug73058.phpt | 2 Bug #73058 crypt broken when salt is 'too' long 7 $salt = '$2y$07$usesomesillystringforsalt$'; 8 var_dump(crypt($pass, $salt)); 10 $salt = '$2y$07$usesomesillystringforsaltzzzzzzzzzzzzz$'; 11 var_dump(crypt($pass, $salt)); 13 $salt = '$2y$07$usesomesillystringforx'; 14 var_dump(crypt($pass, $salt));
|
H A D | crypt_sha256.phpt | 34 'we have a short salt string but not a short password',
|
H A D | crypt_sha512.phpt | 29 'we have a short salt string but not a short password',
|
H A D | crypt_variation1.phpt | 2 crypt() function - long salt
|
H A D | crypt_blowfish_variation1.phpt | 14 foreach($salts as $i=>$salt) { 15 $crypt = crypt('U*U', $salt);
|
/PHP-7.4/ext/standard/tests/password/ |
H A D | password_bcrypt_errors.phpt | 11 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => "foo"))); 13 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => "123456789012345678901"))); 15 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => 123))); 27 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 29 Warning: password_hash(): Provided salt is too short: 3 expecting 22 in %s on line %d 32 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 34 Warning: password_hash(): Provided salt is too short: 21 expecting 22 in %s on line %d 37 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 39 Warning: password_hash(): Provided salt is too short: 3 expecting 22 in %s on line %d
|
H A D | password_deprecated_salts.phpt | 8 var_dump(password_hash("rasmuslerdorf", PASSWORD_BCRYPT, array("cost" => 7, "salt" => "usesomesilly… 10 var_dump(password_hash("test", PASSWORD_BCRYPT, array("salt" => "123456789012345678901" . chr(0)))); 15 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 18 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line …
|
H A D | password_hash_error.phpt | 19 var_dump(password_hash("123", PASSWORD_BCRYPT, array("salt" => array()))); 21 /* Non-string salt, checking for memory leaks */ 22 var_dump(password_hash('123', PASSWORD_BCRYPT, array('salt' => 1234))); 46 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 48 Warning: password_hash(): Non-string salt parameter supplied in %s on line %d 51 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 53 Warning: password_hash(): Provided salt is too short: 4 expecting 22 in %s on line %d
|
/PHP-7.4/ext/hash/tests/ |
H A D | hash_hkdf_edges.phpt | 6 …g hkdf ( string $algo , string $ikm [, int $length , string $info = '' , string $salt = '' ] )
|
H A D | hash_hkdf_error.phpt | 6 …g hkdf ( string $algo , string $ikm [, int $length , string $info = '' , string $salt = '' ] )
|
H A D | hash_hkdf_rfc5869.phpt | 6 …g hkdf ( string $algo , string $ikm [, int $length , string $info = '' , string $salt = '' ] ) 28 echo "Test case 3 (SHA-256 with zero-length salt, info): ", 52 echo "Test case 6 (SHA-1 with zero-length salt, info): ", 60 echo "Test case 7 (SHA-1 with zero-length info, salt not provided): ", 73 Test case 3 (SHA-256 with zero-length salt, info): 8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879e… 76 Test case 6 (SHA-1 with zero-length salt, info): 0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e0… 77 Test case 7 (SHA-1 with zero-length info, salt not provided): 2c91117204d745f3500d636a62f64f0ab3bae…
|
H A D | hash_pbkdf2_basic.phpt | 14 echo "sha1: " . hash_pbkdf2('sha1', 'password', 'salt', 1, 20)."\n"; 15 echo "sha1(no length): " . hash_pbkdf2('sha1', 'password', 'salt', 1)."\n"; 16 echo "sha1(raw): " . bin2hex(hash_pbkdf2('sha1', 'password', 'salt', 1, 20, TRUE))."\n"; 19 echo "sha256: " . hash_pbkdf2('sha256', 'password', 'salt', 1, 20)."\n"; 20 echo "sha256(no length): " . hash_pbkdf2('sha256', 'password', 'salt', 1)."\n"; 21 echo "sha256(raw): " . bin2hex(hash_pbkdf2('sha256', 'password', 'salt', 1, 20, TRUE))."\n";
|
H A D | hash_pbkdf2_error.phpt | 6 /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int le… 7 Generate a PBKDF2 hash of the given password and salt 13 $salt = 'salt'; 19 var_dump(hash_pbkdf2('md5', $password, $salt)); 22 var_dump(hash_pbkdf2('md5', $password, $salt, 10, 10, true, 'extra arg')); 25 var_dump(hash_pbkdf2('foo', $password, $salt, 1)); 28 var_dump(hash_pbkdf2('crc32', $password, $salt, 1)); 31 var_dump(hash_pbkdf2('md5', $password, $salt, 0)); 32 var_dump(hash_pbkdf2('md5', $password, $salt, -1)); 35 var_dump(hash_pbkdf2('md5', $password, $salt, 1, -1));
|
/PHP-7.4/ext/hash/ |
H A D | hash.c | 626 zend_string *returnval, *ikm, *algo, *info = NULL, *salt = NULL; in PHP_FUNCTION() local 634 …if (zend_parse_parameters(ZEND_NUM_ARGS(), "SS|lSS", &algo, &ikm, &length, &info, &salt) == FAILUR… in PHP_FUNCTION() 670 (unsigned char *) (salt ? ZSTR_VAL(salt) : ""), salt ? ZSTR_LEN(salt) : 0); in PHP_FUNCTION() 726 char *algo, *salt, *pass = NULL; in PHP_FUNCTION() local 793 memcpy(computed_salt, (unsigned char *) salt, salt_len); in PHP_FUNCTION() 1045 char *password, *salt; in PHP_FUNCTION() local 1049 …if (zend_parse_parameters(ZEND_NUM_ARGS(), "lssl", &algorithm, &password, &password_len, &salt, &s… in PHP_FUNCTION() 1061 memcpy(padded_salt, salt, salt_len); in PHP_FUNCTION() 1394 ZEND_ARG_INFO(0, salt) 1410 ZEND_ARG_INFO(0, salt) [all …]
|