required_salt_len  268 ext/standard/password.c 	size_t salt_len = 0, required_salt_len = 0, hash_format_len;
required_salt_len  291 ext/standard/password.c 			required_salt_len = 22;
required_salt_len  332 ext/standard/password.c 		} else if (ZSTR_LEN(buffer) < required_salt_len) {
required_salt_len  333 ext/standard/password.c 			php_error_docref(NULL, E_WARNING, "Provided salt is too short: %zd expecting %zd", ZSTR_LEN(buffer), required_salt_len);
required_salt_len  337 ext/standard/password.c 			salt = safe_emalloc(required_salt_len, 1, 1);
required_salt_len  338 ext/standard/password.c 			if (php_password_salt_to64(ZSTR_VAL(buffer), ZSTR_LEN(buffer), required_salt_len, salt) == FAILURE) {
required_salt_len  344 ext/standard/password.c 			salt_len = required_salt_len;
required_salt_len  346 ext/standard/password.c 			salt = safe_emalloc(required_salt_len, 1, 1);
required_salt_len  347 ext/standard/password.c 			memcpy(salt, ZSTR_VAL(buffer), required_salt_len);
required_salt_len  348 ext/standard/password.c 			salt_len = required_salt_len;
required_salt_len  352 ext/standard/password.c 		salt = safe_emalloc(required_salt_len, 1, 1);
required_salt_len  353 ext/standard/password.c 		if (php_password_make_salt(required_salt_len, salt) == FAILURE) {
required_salt_len  357 ext/standard/password.c 		salt_len = required_salt_len;