required_salt_len 268 ext/standard/password.c size_t salt_len = 0, required_salt_len = 0, hash_format_len; required_salt_len 291 ext/standard/password.c required_salt_len = 22; required_salt_len 332 ext/standard/password.c } else if (ZSTR_LEN(buffer) < required_salt_len) { required_salt_len 333 ext/standard/password.c php_error_docref(NULL, E_WARNING, "Provided salt is too short: %zd expecting %zd", ZSTR_LEN(buffer), required_salt_len); required_salt_len 337 ext/standard/password.c salt = safe_emalloc(required_salt_len, 1, 1); required_salt_len 338 ext/standard/password.c if (php_password_salt_to64(ZSTR_VAL(buffer), ZSTR_LEN(buffer), required_salt_len, salt) == FAILURE) { required_salt_len 344 ext/standard/password.c salt_len = required_salt_len; required_salt_len 346 ext/standard/password.c salt = safe_emalloc(required_salt_len, 1, 1); required_salt_len 347 ext/standard/password.c memcpy(salt, ZSTR_VAL(buffer), required_salt_len); required_salt_len 348 ext/standard/password.c salt_len = required_salt_len; required_salt_len 352 ext/standard/password.c salt = safe_emalloc(required_salt_len, 1, 1); required_salt_len 353 ext/standard/password.c if (php_password_make_salt(required_salt_len, salt) == FAILURE) { required_salt_len 357 ext/standard/password.c salt_len = required_salt_len;