Searched refs:salt_len (Results 1 - 7 of 7) sorted by relevance

/PHP_5_5/ext/standard/
H A Dcrypt_sha256.c359 size_t salt_len; local
389 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX);
398 char *tmp = (char *) alloca(salt_len + 1 + __alignof__(uint32_t));
400 memcpy(tmp + __alignof__(uint32_t) - (tmp - (char *) 0) % __alignof__ (uint32_t), salt, salt_len);
401 copied_salt[salt_len] = 0;
413 sha256_process_bytes(salt, salt_len, &ctx);
424 sha256_process_bytes(salt, salt_len, &alt_ctx);
475 sha256_process_bytes(salt, salt_len, &alt_ctx);
482 cp = s_bytes = alloca(salt_len);
483 for (cnt = salt_len; cn
[all...]
H A Dcrypt_sha512.c392 size_t salt_len; local
423 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX);
433 char *tmp = (char *) alloca(salt_len + 1 + __alignof__(uint64_t));
434 salt = copied_salt = memcpy(tmp + __alignof__(uint64_t) - (tmp - (char *) 0) % __alignof__(uint64_t), salt, salt_len);
435 copied_salt[salt_len] = 0;
447 sha512_process_bytes(salt, salt_len, &ctx);
458 sha512_process_bytes(salt, salt_len, &alt_ctx);
510 sha512_process_bytes(salt, salt_len, &alt_ctx);
517 cp = s_bytes = alloca(salt_len);
518 for (cnt = salt_len; cn
[all...]
H A Dcrypt.c148 PHPAPI int php_crypt(const char *password, const int pass_len, const char *salt, int salt_len, char **result) argument
H A Dpassword.c313 size_t salt_len = 0, required_salt_len = 0, hash_format_len; local
407 salt_len = required_salt_len;
411 salt_len = required_salt_len;
421 salt_len = required_salt_len;
424 salt[salt_len] = 0;
426 hash = safe_emalloc(salt_len + hash_format_len, 1, 1);
428 hash[hash_format_len + salt_len] = 0;
434 hash_len = (int) (hash_format_len + salt_len);
H A Dphp_crypt.h26 PHPAPI int php_crypt(const char *password, const int pass_len, const char *salt, int salt_len, char **result);
/PHP_5_5/ext/hash/
H A Dhash.c615 int algo_len, pass_len, salt_len; local
620 if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sssl|lb", &algo, &algo_len, &pass, &pass_len, &salt, &salt_len, &iterations, &length, &raw_output) == FAILURE) {
640 if (salt_len > INT_MAX - 4) {
641 php_error_docref(NULL TSRMLS_CC, E_WARNING, "Supplied salt is too long, max of INT_MAX - 4 bytes: %d supplied", salt_len);
674 computed_salt = safe_emalloc(salt_len, 1, 4);
675 memcpy(computed_salt, (unsigned char *) salt, salt_len);
681 computed_salt[salt_len] = (unsigned char) (i >> 24);
682 computed_salt[salt_len + 1] = (unsigned char) ((i & 0xFF0000) >> 16);
683 computed_salt[salt_len + 2] = (unsigned char) ((i & 0xFF00) >> 8);
684 computed_salt[salt_len
892 int password_len, salt_len; local
[all...]
/PHP_5_5/ext/openssl/
H A Dopenssl.c3480 char *salt; int salt_len; local
3488 &salt, &salt_len,
3512 if (PKCS5_PBKDF2_HMAC(password, password_len, (unsigned char *)salt, salt_len, iterations, digest, key_length, out_buffer) == 1) {

Completed in 30 milliseconds