Searched refs:rounds (Results 1 – 12 of 12) sorted by relevance
/PHP-8.0/ext/standard/tests/strings/ |
H A D | crypt_sha256.phpt | 13 '$5$rounds=10000$saltstringsaltstring', 18 '$5$rounds=10000$saltstringsaltstring', 23 '$5$rounds=5000$toolongsaltstring', 28 '$5$rounds=1400$anotherlongsaltstring', 33 '$5$rounds=77777$short', 35 '$5$rounds=77777$short$JiO1O3ZpDAxGJeaDIuqCoEFysAe1mZNJRs3pw0KQRd/' 38 '$5$rounds=123456$asaltof16chars..', 43 '$5$rounds=10$roundstoolow', 44 'the number of rounds is too low', 48 '$5$rounds=1000000000$roundstoohigh', [all …]
|
H A D | crypt_sha512.phpt | 13 '$6$rounds=10000$saltstringsaltstring', 15 …'$6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sbHbbMCVNSnCM/UrjmM0Dp8vOuZeHBy/… 18 '$6$rounds=5000$toolongsaltstring', 23 '$6$rounds=1400$anotherlongsaltstring', 28 '$6$rounds=77777$short', 30 …'$6$rounds=77777$short$WuQyW2YR.hBNpjjRhpYD/ifIw05xdfeEyQoMxIXbkvr0gge1a1x3yRULJ5CCaUeOxFmtlcGZelF… 33 '$6$rounds=123456$asaltof16chars..', 43 '$6$rounds=10$roundstoolow', 44 'the number of rounds is too low', 48 '$6$rounds=1000000000$roundstoohigh', [all …]
|
H A D | crypt_blowfish_variation2.phpt | 2 Test Blowfish crypt() does not fall back to DES when rounds are not specified,
|
H A D | crypt_blowfish_variation1.phpt | 2 Test Blowfish crypt() with invalid rounds
|
/PHP-8.0/ext/hash/tests/ |
H A D | hash_pbkdf2_basic.phpt | 11 echo "sha1(rounds): " . hash_pbkdf2('sha1', 'passwordPASSWORDpassword', 'saltSALTsaltSALTsaltSALTsa… 12 echo "sha1(rounds)(raw): " . bin2hex(hash_pbkdf2('sha1', 'passwordPASSWORDpassword', 'saltSALTsaltS… 16 echo "sha256(rounds): " . hash_pbkdf2('sha256', 'passwordPASSWORDpassword', 'saltSALTsaltSALTsaltSA… 17 echo "sha256(rounds)(raw): " . bin2hex(hash_pbkdf2('sha256', 'passwordPASSWORDpassword', 'saltSALTs… 25 sha1(rounds): 3d2eec4fe41c849b80c8d8366 26 sha1(rounds)(raw): 3d2eec4fe41c849b80c8d83662c0e44a8b291a964cf2f07038 30 sha256(rounds): 348c89dbcbd32b2f32d814b8116e84cf2b17347e 31 sha256(rounds)(raw): 348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd53e1c635518c7dac47…
|
/PHP-8.0/ext/standard/ |
H A D | crypt_sha256.c | 346 size_t rounds = ROUNDS_DEFAULT; in php_sha256_crypt_r() local 366 rounds = srounds; in php_sha256_crypt_r() 472 for (cnt = 0; cnt < rounds; ++cnt) { in php_sha256_crypt_r() 511 int n = _snprintf(cp, MAX(0, buflen), "%s" ZEND_ULONG_FMT "$", sha256_rounds_prefix, rounds); in php_sha256_crypt_r() 513 int n = snprintf(cp, MAX(0, buflen), "%s%zu$", sha256_rounds_prefix, rounds); in php_sha256_crypt_r()
|
H A D | crypt_sha512.c | 379 size_t rounds = ROUNDS_DEFAULT; in php_sha512_crypt_r() local 400 rounds = srounds; in php_sha512_crypt_r() 507 for (cnt = 0; cnt < rounds; ++cnt) { in php_sha512_crypt_r() 546 int n = _snprintf(cp, MAX(0, buflen), "%s" ZEND_ULONG_FMT "$", sha512_rounds_prefix, rounds); in php_sha512_crypt_r() 548 int n = snprintf(cp, MAX(0, buflen), "%s%zu$", sha512_rounds_prefix, rounds); in php_sha512_crypt_r()
|
/PHP-8.0/ext/standard/tests/password/ |
H A D | password_needs_rehash.phpt | 40 var_dump(password_needs_rehash(crypt('Example', '$6$rounds=5000$aa$'), PASSWORD_DEFAULT));
|
/PHP-8.0/ext/hash/ |
H A D | hash.c | 886 size_t rounds; in PHP_FUNCTION() local 932 for (i = 1, rounds = (length - 1) / ops->digest_size + 1; i <= rounds; i++) { in PHP_FUNCTION() 956 (i == rounds ? length - ((i - 1) * ops->digest_size) : ops->digest_size) in PHP_FUNCTION()
|
/PHP-8.0/ |
H A D | UPGRADING | 600 . Specifying out of range rounds for sha256/sha512 crypt() will now fail with
|
/PHP-8.0/ext/fileinfo/tests/ |
H A D | magic私はガラスを食べられます | 481 #>>>>>&1 regex/1l .* \b, PBKDF2 rounds: %s 19162 >>120 lelong >0 \b, %d key transformation rounds 26262 >0 byte 0x04 Blowfish (128 bit key, 16 rounds)
|
H A D | magic | 481 #>>>>>&1 regex/1l .* \b, PBKDF2 rounds: %s 19162 >>120 lelong >0 \b, %d key transformation rounds 26262 >0 byte 0x04 Blowfish (128 bit key, 16 rounds)
|
Completed in 154 milliseconds