/PHP-5.3/ext/standard/ |
H A D | crypt.c | 156 salt[0] = salt[PHP_MAX_SALT_LEN] = '\0'; in PHP_FUNCTION() 192 if (salt[0]=='$' && salt[1]=='1' && salt[2]=='$') { in PHP_FUNCTION() 196 } else if (salt[0]=='$' && salt[1]=='6' && salt[2]=='$') { in PHP_FUNCTION() 208 if (salt[0]=='*' && salt[1]=='0') { in PHP_FUNCTION() 219 } else if (salt[0]=='$' && salt[1]=='5' && salt[2]=='$') { in PHP_FUNCTION() 231 if (salt[0]=='*' && salt[1]=='0') { in PHP_FUNCTION() 245 salt[2] >= 'a' && salt[2] <= 'z' && in PHP_FUNCTION() 247 salt[4] >= '0' && salt[4] <= '3' && in PHP_FUNCTION() 248 salt[5] >= '0' && salt[5] <= '9' && in PHP_FUNCTION() 256 if (salt[0]=='*' && salt[1]=='0') { in PHP_FUNCTION() [all …]
|
H A D | config.m4 | 126 salt[0]='$'; salt[1]='1'; salt[2]='$'; 127 salt[3]='r'; salt[4]='a'; salt[5]='s'; 128 salt[6]='m'; salt[7]='u'; salt[8]='s'; 129 salt[9]='l'; salt[10]='e'; salt[11]='$'; 130 salt[12]='\0'; 131 strcpy(answer,salt); 159 …salt[0]='$'; salt[1]='2'; salt[2]='a'; salt[3]='$'; salt[4]='0'; salt[5]='7'; salt[6]='$'; salt[7]… 161 strcpy(answer,salt); 189 …salt[0]='$'; salt[1]='6'; salt[2]='$'; salt[3]='$'; salt[4]='b'; salt[5]='a'; salt[6]='r'; salt[7]… 217 …salt[0]='$'; salt[1]='5'; salt[2]='$'; salt[3]='$'; salt[4]='s'; salt[5]='a'; salt[6]='l'; salt[7]… [all …]
|
H A D | php_crypt_r.h | 51 extern char * php_md5_crypt_r(const char *pw, const char *salt, char *out); 52 extern char * php_sha512_crypt_r (const char *key, const char *salt, char *buffer, int buflen); 53 extern char * php_sha256_crypt_r (const char *key, const char *salt, char *buffer, int buflen);
|
H A D | crypt_sha256.c | 375 salt += sizeof(sha256_salt_prefix) - 1; in php_sha256_crypt_r() 383 salt = endp + 1; in php_sha256_crypt_r() 389 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); in php_sha256_crypt_r() 397 if ((salt - (char *) 0) % __alignof__(uint32_t) != 0) { in php_sha256_crypt_r() 399 salt = copied_salt = in php_sha256_crypt_r() 413 sha256_process_bytes(salt, salt_len, &ctx); in php_sha256_crypt_r() 424 sha256_process_bytes(salt, salt_len, &alt_ctx); in php_sha256_crypt_r() 475 sha256_process_bytes(salt, salt_len, &alt_ctx); in php_sha256_crypt_r() 610 + strlen(salt) + 1 + 43 + 1); in php_sha256_crypt() 622 return php_sha256_crypt_r(key, salt, buffer, buflen); in php_sha256_crypt() [all …]
|
H A D | crypt_sha512.c | 408 salt += sizeof(sha512_salt_prefix) - 1; in php_sha512_crypt_r() 417 salt = endp + 1; in php_sha512_crypt_r() 423 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); in php_sha512_crypt_r() 434 …salt = copied_salt = memcpy(tmp + __alignof__(uint64_t) - (tmp - (char *) 0) % __alignof__(uint64_… in php_sha512_crypt_r() 447 sha512_process_bytes(salt, salt_len, &ctx); in php_sha512_crypt_r() 458 sha512_process_bytes(salt, salt_len, &alt_ctx); in php_sha512_crypt_r() 510 sha512_process_bytes(salt, salt_len, &alt_ctx); in php_sha512_crypt_r() 647 php_sha512_crypt(const char *key, const char *salt) { in php_sha512_crypt() argument 656 + strlen(salt) + 1 + 86 + 1); in php_sha512_crypt() 668 return php_sha512_crypt_r (key, salt, buffer, buflen); in php_sha512_crypt() [all …]
|
H A D | crypt_blowfish.c | 663 BF_word salt[4]; in BF_crypt() member 696 BF_swap(data.binary.salt, 4); in BF_crypt() 705 L ^= data.binary.salt[i & 2]; in BF_crypt() 706 R ^= data.binary.salt[(i & 2) + 1]; in BF_crypt() 715 L ^= data.binary.salt[(BF_N + 2) & 3]; in BF_crypt() 716 R ^= data.binary.salt[(BF_N + 3) & 3]; in BF_crypt() 721 L ^= data.binary.salt[(BF_N + 4) & 3]; in BF_crypt() 743 tmp1 = data.binary.salt[0]; in BF_crypt() 744 tmp2 = data.binary.salt[1]; in BF_crypt() 745 tmp3 = data.binary.salt[2]; in BF_crypt() [all …]
|
H A D | crypt_freesec.c | 357 setup_salt(uint32_t salt, struct php_crypt_extended_data *data) in setup_salt() argument 362 if (salt == data->old_salt) in setup_salt() 364 data->old_salt = salt; in setup_salt() 370 if (salt & saltbit) in setup_salt() 582 des_cipher(const char *in, char *out, uint32_t salt, int count, in des_cipher() argument 588 setup_salt(salt, data); in des_cipher() 620 uint32_t count, salt, l, r0, r1, keybuf[2]; in _crypt_extended_r() local 654 for (i = 5, salt = 0; i < 9; i++) { in _crypt_extended_r() 658 salt |= value << (i - 5) * 6; in _crypt_extended_r() 692 salt = (ascii_to_bin(setting[1]) << 6) in _crypt_extended_r() [all …]
|
H A D | php_crypt_r.c | 127 char * php_md5_crypt_r(const char *pw, const char *salt, char *out) { in php_md5_crypt_r() argument 136 const char *sp = salt; in php_md5_crypt_r() 137 const char *ep = salt; in php_md5_crypt_r() 150 sp = salt; in php_md5_crypt_r() 324 char * php_md5_crypt_r(const char *pw, const char *salt, char *out) in php_md5_crypt_r() argument 337 sp = salt; in php_md5_crypt_r()
|
H A D | basic_functions.c | 906 ZEND_ARG_INFO(0, salt)
|
/PHP-5.3/ext/standard/tests/strings/ |
H A D | bug50052.phpt | 5 $salt = '$1$f+uslYF01$'; 7 echo $salt . "\n"; 8 echo crypt($password,$salt) . "\n";
|
H A D | crypt_blowfish_variation1.phpt | 20 foreach($salts as $i=>$salt) { 21 $crypt = crypt(b'U*U', $salt);
|
H A D | crypt_variation1.phpt | 2 crypt() function - long salt
|
H A D | crypt_sha256.phpt | 40 b'we have a short salt string but not a short password',
|
H A D | crypt_sha512.phpt | 35 b'we have a short salt string but not a short password',
|
/PHP-5.3/ext/hash/tests/ |
H A D | mhash_003.phpt | 26 $salt = str_repeat($hash, 2); 27 $result = mhash_keygen_s2k(constant($hash), $passwd, $salt, 100);
|
/PHP-5.3/ext/hash/ |
H A D | hash.c | 746 char *password, *salt; in PHP_FUNCTION() local 750 …ZEND_NUM_ARGS() TSRMLS_CC, "lssl", &algorithm, &password, &password_len, &salt, &salt_len, &l_byte… in PHP_FUNCTION() 762 memcpy(padded_salt, salt, salt_len); in PHP_FUNCTION() 1010 ZEND_ARG_INFO(0, salt)
|
/PHP-5.3/ |
H A D | NEWS | 984 . Fixed bug #55439 (crypt() returns only the salt for MD5). (Stas) 1024 . Fixed buffer overflow on overlog salt in crypt(). (Clément LECIGNE, Stas) 2207 - Fixed bug #51059 (crypt crashes when invalid salt are given). (Pierre)
|
/PHP-5.3/ext/fileinfo/tests/ |
H A D | magic | 7520 >>>>>>&28 ubequad x \b, salt %llu
|