/php-src/ext/standard/tests/strings/ |
H A D | crypt_sha256.phpt | 13 '$5$rounds=10000$saltstringsaltstring', 15 '$5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2.opqey6IcA' 18 '$5$rounds=10000$saltstringsaltstring', 23 '$5$rounds=5000$toolongsaltstring', 28 '$5$rounds=1400$anotherlongsaltstring', 33 '$5$rounds=77777$short', 35 '$5$rounds=77777$short$JiO1O3ZpDAxGJeaDIuqCoEFysAe1mZNJRs3pw0KQRd/' 38 '$5$rounds=123456$asaltof16chars..', 43 // The "too many rounds" behavior depends on the crypt() 46 '$5$rounds=1000000000$roundstoohigh', [all …]
|
H A D | crypt_sha512.phpt | 13 '$6$rounds=10000$saltstringsaltstring', 15 …'$6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sbHbbMCVNSnCM/UrjmM0Dp8vOuZeHBy/… 18 '$6$rounds=5000$toolongsaltstring', 23 '$6$rounds=1400$anotherlongsaltstring', 28 '$6$rounds=77777$short', 30 …'$6$rounds=77777$short$WuQyW2YR.hBNpjjRhpYD/ifIw05xdfeEyQoMxIXbkvr0gge1a1x3yRULJ5CCaUeOxFmtlcGZelF… 33 '$6$rounds=123456$asaltof16chars..', 43 '$6$rounds=10$roundstoolow', 44 'the number of rounds is too low', 48 '$6$rounds=1000000000$roundstoohigh', [all …]
|
H A D | crypt_blowfish_variation2.phpt | 2 Test Blowfish crypt() does not fall back to DES when rounds are not specified,
|
H A D | crypt_blowfish_variation1.phpt | 2 Test Blowfish crypt() with invalid rounds
|
/php-src/ext/hash/tests/ |
H A D | hash_pbkdf2_basic.phpt | 11 echo "sha1(rounds): " . hash_pbkdf2('sha1', 'passwordPASSWORDpassword', 'saltSALTsaltSALTsaltSALTsa… 12 echo "sha1(rounds)(raw): " . bin2hex(hash_pbkdf2('sha1', 'passwordPASSWORDpassword', 'saltSALTsaltS… 16 echo "sha256(rounds): " . hash_pbkdf2('sha256', 'passwordPASSWORDpassword', 'saltSALTsaltSALTsaltSA… 17 echo "sha256(rounds)(raw): " . bin2hex(hash_pbkdf2('sha256', 'passwordPASSWORDpassword', 'saltSALTs… 25 sha1(rounds): 3d2eec4fe41c849b80c8d8366 26 sha1(rounds)(raw): 3d2eec4fe41c849b80c8d83662c0e44a8b291a964cf2f07038 30 sha256(rounds): 348c89dbcbd32b2f32d814b8116e84cf2b17347e 31 sha256(rounds)(raw): 348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd53e1c635518c7dac47…
|
/php-src/ext/pdo_pgsql/tests/ |
H A D | issue78621.inc | 7 if (!isset($rounds) || empty($rounds)) { 8 $rounds = [ null, 'Re' ]; 11 attach($db, array_shift($rounds)); 19 while (count($rounds)) { 21 attach($db, array_shift($rounds));
|
H A D | issue78621_method.phpt | 33 $rounds = [ 'disp', 'dispRe' ]; 36 $rounds = [ 'whatever', 'whateverRe', 'unexisting' ];
|
H A D | pdopgsql_setNoticeCallback.phpt | 21 $rounds = [
|
H A D | pdopgsql_setNoticeCallback_trampoline_no_leak.phpt | 31 $rounds = [
|
/php-src/ext/standard/ |
H A D | crypt_sha256.c | 340 size_t rounds = ROUNDS_DEFAULT; in php_sha256_crypt_r() local 360 rounds = srounds; in php_sha256_crypt_r() 475 for (cnt = 0; cnt < rounds; ++cnt) { in php_sha256_crypt_r() 514 int n = _snprintf(cp, MAX(0, buflen), "%s" ZEND_ULONG_FMT "$", sha256_rounds_prefix, rounds); in php_sha256_crypt_r() 516 int n = snprintf(cp, MAX(0, buflen), "%s%zu$", sha256_rounds_prefix, rounds); in php_sha256_crypt_r()
|
H A D | crypt_sha512.c | 377 size_t rounds = ROUNDS_DEFAULT; in php_sha512_crypt_r() local 398 rounds = srounds; in php_sha512_crypt_r() 514 for (cnt = 0; cnt < rounds; ++cnt) { in php_sha512_crypt_r() 553 int n = _snprintf(cp, MAX(0, buflen), "%s" ZEND_ULONG_FMT "$", sha512_rounds_prefix, rounds); in php_sha512_crypt_r() 555 int n = snprintf(cp, MAX(0, buflen), "%s%zu$", sha512_rounds_prefix, rounds); in php_sha512_crypt_r()
|
/php-src/ext/standard/tests/password/ |
H A D | password_needs_rehash.phpt | 40 var_dump(password_needs_rehash(crypt('Example', '$6$rounds=5000$aa$'), PASSWORD_DEFAULT));
|
/php-src/ext/hash/ |
H A D | hash.c | 902 size_t rounds; in PHP_FUNCTION() local 948 for (i = 1, rounds = (length - 1) / ops->digest_size + 1; i <= rounds; i++) { in PHP_FUNCTION() 972 (i == rounds ? length - ((i - 1) * ops->digest_size) : ops->digest_size) in PHP_FUNCTION()
|
/php-src/ext/opcache/jit/ir/ |
H A D | ir_x86.dasc | 9565 | ASM_SSE2_REG_REG_TXT_OP rounds, insn->type, def_reg, op3_reg, round_op
|
/php-src/ext/fileinfo/tests/ |
H A D | magic私はガラスを食べられます | 663 #>>>>>&1 regex/1l .* \b, PBKDF2 rounds: %s 23240 >>120 lelong >0 \b, %d key transformation rounds 32064 >0 byte 0x04 Blowfish (128 bit key, 16 rounds)
|
H A D | magic | 663 #>>>>>&1 regex/1l .* \b, PBKDF2 rounds: %s 23240 >>120 lelong >0 \b, %d key transformation rounds 32064 >0 byte 0x04 Blowfish (128 bit key, 16 rounds)
|