/PHP-7.2/ext/standard/tests/strings/ |
H A D | crypt.phpt | 2 crypt() function 5 if (!function_exists('crypt')) { 6 die("SKIP crypt() is not available"); 22 echo (CRYPT_STD_DES) ? ((crypt($str, $salt1) === $res_1) ? 'STD' : 'STD - ERROR') : 'STD', "\n"; 23 echo (CRYPT_EXT_DES) ? ((crypt($str, $salt2) === $res_2) ? 'EXT' : 'EXT - ERROR') : 'EXT', "\n"; 24 echo (CRYPT_MD5) ? ((crypt($str, $salt3) === $res_3) ? 'MD5' : 'MD5 - ERROR') : 'MD5', "\n"; 27 var_dump(crypt($str)); 28 var_dump(crypt()); 29 var_dump(crypt("", "", "")); 41 Warning: crypt() expects at least 1 parameter, 0 given in %s on line %d [all …]
|
H A D | crypt_chars.phpt | 2 crypt() function - characters > 0x80 5 if (!function_exists('crypt')) { 6 die("SKIP crypt() is not available"); 11 var_dump(crypt("À1234abcd", "99")); 12 var_dump(crypt("À9234abcd", "99")); 13 var_dump(crypt("À1234abcd", "_01234567")); 14 var_dump(crypt("À9234abcd", "_01234567"));
|
H A D | crypt_blowfish_variation1.phpt | 2 Test Blowfish crypt() with invalid rounds 5 if (!function_exists('crypt') || !defined("CRYPT_BLOWFISH")) { 6 die("SKIP crypt()-blowfish is not available"); 21 $crypt = crypt('U*U', $salt); 22 if ($crypt === '*0' || $crypt === '*1') {
|
H A D | crypt_variation1.phpt | 2 crypt() function - long salt 5 if (!function_exists('crypt')) { 6 die("SKIP crypt() is not available"); 13 echo crypt("A", "$5$" . $b)."\n"; 15 echo crypt("A", "$5$" . $b)."\n"; 17 echo crypt("A", "$5$" . $b)."\n";
|
H A D | bug73058.phpt | 2 Bug #73058 crypt broken when salt is 'too' long 5 if (!function_exists('crypt'))) { 6 die("SKIP crypt() is not available"); 14 var_dump(crypt($pass, $salt)); 17 var_dump(crypt($pass, $salt)); 20 var_dump(crypt($pass, $salt));
|
H A D | bug54721.phpt | 5 echo crypt("", '$1$dW0.is5.$10CH101gGOr1677ZYd517.') . "\n"; 6 echo crypt("b", '$1$dW0.is5.$10CH101gGOr1677ZYd517.') . "\n"; 7 echo crypt("bu", '$1$dW0.is5.$10CH101gGOr1677ZYd517.') . "\n"; 8 echo crypt("bug", '$1$dW0.is5.$10CH101gGOr1677ZYd517.') . "\n"; 9 echo crypt("pass", '$1$dW0.is5.$10CH101gGOr1677ZYd517.') . "\n"; 10 echo crypt("buged", '$1$dW0.is5.$10CH101gGOr1677ZYd517.') . "\n"; 11 echo crypt("aaaaaaaaaaaaaaaaaaaaaaaaa ", '$1$dW0.is5.$10CH101gGOr1677ZYd517.') . "\n";
|
H A D | crypt_des_error.phpt | 2 crypt(): *0 should return *1 5 if (!function_exists('crypt')) { 6 die("SKIP crypt() is not available"); 12 var_dump(crypt('foo', '*0'));
|
H A D | crypt_blowfish_variation2.phpt | 2 Test Blowfish crypt() does not fall back to DES when rounds are not specified, 6 $crypt = crypt('U*U', '$2a$CCCCCCCCCCCCCCCCCCCCC.E5YPO9kmyuRGyh0XouQYb4YMJKvyOeW'); 7 if ($crypt==='*0') {
|
H A D | bug62443.phpt | 5 crypt("foo", '$5$'.chr(0).'abc'); 6 crypt("foo", '$6$'.chr(0).'abc');
|
H A D | crypt_sha512.phpt | 2 crypt() SHA-512 5 if (!function_exists('crypt') || !defined("CRYPT_SHA512")) { 6 die("SKIP crypt()-sha512 is not available"); 56 $res = crypt($t[1], $t[0]);
|
H A D | bug51059.phpt | 2 Bug #51059 crypt() segfaults on certain salts 5 $res = crypt('a', '_');
|
H A D | crypt_sha256.phpt | 2 crypt() SHA-256 5 if (!function_exists('crypt') || !defined("CRYPT_SHA256")) { 6 die("SKIP crypt()-sha256 is not available"); 56 $res = crypt($t[1], $t[0]);
|
H A D | bug50052.phpt | 8 echo crypt($password,$salt) . "\n";
|
H A D | crypt_blowfish.phpt | 5 if (!function_exists('crypt') || !defined("CRYPT_BLOWFISH")) { 6 die("SKIP crypt()-blowfish is not available"); 55 $result = crypt($test[1], $test[0]); 65 $result = crypt('', $test[0]);
|
/PHP-7.2/ext/standard/tests/crypt/ |
H A D | bcrypt_invalid_cost.phpt | 5 var_dump(crypt("test", "$2a$4$1234567891234567891234567")); 6 var_dump(crypt("test", "$2a$00$1234567891234567891234567")); 7 var_dump(crypt("test", "$2a$01$1234567891234567891234567")); 8 var_dump(crypt("test", "$2a$02$1234567891234567891234567")); 9 var_dump(crypt("test", "$2a$03$1234567891234567891234567")); 10 var_dump(crypt("test", "$2a$32$1234567891234567891234567")); 11 var_dump(crypt("test", "$2a$40$1234567891234567891234567"));
|
H A D | des_fallback_invalid_salt.phpt | 6 var_dump(crypt("test", "$#")); 7 var_dump(crypt("test", "$5zd$01")); 11 Deprecated: crypt(): Supplied salt is not valid for DES. Possible bug in provided salt format. in %… 14 Deprecated: crypt(): Supplied salt is not valid for DES. Possible bug in provided salt format. in %…
|
H A D | bcrypt_invalid_algorithm.phpt | 5 var_dump(crypt("test", "$23$04$1234567890123456789012345")); 6 var_dump(crypt("test", "$20$04$1234567890123456789012345")); 7 var_dump(crypt("test", "$2g$04$1234567890123456789012345"));
|
/PHP-7.2/ext/standard/ |
H A D | php_crypt.h | 27 PHP_FUNCTION(crypt); 28 PHP_MINIT_FUNCTION(crypt); 29 PHP_MSHUTDOWN_FUNCTION(crypt); 30 PHP_RINIT_FUNCTION(crypt);
|
H A D | config.m4 | 53 dnl Check for crypt() capabilities 56 AC_CHECK_LIB(crypt, crypt, [ 69 #include <crypt.h> 94 #include <crypt.h> 119 #include <crypt.h> 134 encrypted = crypt("rasmuslerdorf",salt); 154 #include <crypt.h> 166 encrypted = crypt("rasmuslerdorf",salt); 186 #include <crypt.h> 197 encrypted = crypt("rasmuslerdorf",salt); [all …]
|
H A D | crypt.c | 69 PHP_MINIT_FUNCTION(crypt) /* {{{ */ in PHP_MINIT_FUNCTION() argument 87 PHP_MSHUTDOWN_FUNCTION(crypt) /* {{{ */ in PHP_MSHUTDOWN_FUNCTION() argument 223 crypt_res = crypt(password, salt); in php_crypt() 225 # error No crypt() implementation in php_crypt() 241 PHP_FUNCTION(crypt) in PHP_FUNCTION() argument
|
H A D | config.w32 | 26 crc32.c crypt.c crypt_freesec.c crypt_blowfish.c crypt_sha256.c \
|
/PHP-7.2/ext/zip/ |
H A D | TODO | 3 - crypt support for zip (read and write)
|
/PHP-7.2/ext/standard/tests/password/ |
H A D | password_hash.phpt | 11 var_dump($hash === crypt("foo", $hash));
|
/PHP-7.2/ext/imap/ |
H A D | config.m4 | 189 PHP_CHECK_LIBRARY(crypt, crypt, 191 PHP_ADD_LIBRARY(crypt,, IMAP_SHARED_LIBADD)
|
/PHP-7.2/ext/openssl/tests/ |
H A D | openssl_error_string_basic.phpt | 122 expect_openssl_errors('openssl_private_(en|de)crypt padding', [$err_pem_no_start_line, '04068076', … 173 openssl_private_(en|de)crypt padding: ok
|